Skip to main content

Showing 1–50 of 57 results for author: Motani, M

  1. arXiv:2310.05146  [pdf, other

    cs.AI cs.CL

    Large Language Model (LLM) as a System of Multiple Expert Agents: An Approach to solve the Abstraction and Reasoning Corpus (ARC) Challenge

    Authors: John Chong Min Tan, Mehul Motani

    Abstract: We attempt to solve the Abstraction and Reasoning Corpus (ARC) Challenge using Large Language Models (LLMs) as a system of multiple expert agents. Using the flexibility of LLMs to be prompted to do various novel tasks using zero-shot, few-shot, context-grounded prompting, we explore the feasibility of using LLMs to solve the ARC Challenge. We firstly convert the input image into multiple suitable… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

    Comments: 6 main pages, 1 page references, 18 pages appendix

  2. arXiv:2304.02223  [pdf, other

    cs.LG cs.IT

    Local Intrinsic Dimensional Entropy

    Authors: Rohan Ghosh, Mehul Motani

    Abstract: Most entropy measures depend on the spread of the probability distribution over the sample space $\mathcal{X}$, and the maximum entropy achievable scales proportionately with the sample space cardinality $|\mathcal{X}|$. For a finite $|\mathcal{X}|$, this yields robust entropy measures which satisfy many important properties, such as invariance to bijections, while the same is not true for continu… ▽ More

    Submitted 24 May, 2023; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: Proceedings of the AAAI Conference on Artificial Intelligence 2023

  3. arXiv:2301.13758  [pdf, other

    cs.AI cs.LG

    Learning, Fast and Slow: A Goal-Directed Memory-Based Approach for Dynamic Environments

    Authors: John Chong Min Tan, Mehul Motani

    Abstract: Model-based next state prediction and state value prediction are slow to converge. To address these challenges, we do the following: i) Instead of a neural network, we do model-based planning using a parallel memory retrieval system (which we term the slow mechanism); ii) Instead of learning state values, we guide the agent's actions using goal-directed exploration, by using a neural network to ch… ▽ More

    Submitted 1 February, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: 22 pages

  4. On Finite Blocklength Lossy Source Coding

    Authors: Lin Zhou, Mehul Motani

    Abstract: In this monograph, we review recent advances in second-order asymptotics for lossy source coding, which provides approximations to the finite blocklength performance of optimal codes. The monograph is divided into three parts. In part I, we motivate the monograph, present basic definitions, introduce mathematical tools and illustrate the motivation of non-asymptotic and second-order asymptotics vi… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: Submitted to FnT CIT. Comments are welcome

    Journal ref: Foundations and Trends in Communications and Information Theory, 2023

  5. arXiv:2212.06145  [pdf, other

    cs.LG cs.AI cs.CV

    AP: Selective Activation for De-sparsifying Pruned Neural Networks

    Authors: Shiyu Liu, Rohan Ghosh, Dylan Tan, Mehul Motani

    Abstract: The rectified linear unit (ReLU) is a highly successful activation function in neural networks as it allows networks to easily obtain sparse representations, which reduces overfitting in overparameterized networks. However, in network pruning, we find that the sparsity introduced by ReLU, which we quantify by a term called dynamic dead neuron rate (DNR), is not beneficial for the pruned network. I… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: 16 Pages

  6. arXiv:2212.06144  [pdf, other

    cs.LG cs.AI

    Optimizing Learning Rate Schedules for Iterative Pruning of Deep Neural Networks

    Authors: Shiyu Liu, Rohan Ghosh, John Tan Chong Min, Mehul Motani

    Abstract: The importance of learning rate (LR) schedules on network pruning has been observed in a few recent works. As an example, Frankle and Carbin (2019) highlighted that winning tickets (i.e., accuracy preserving subnetworks) can not be found without applying a LR warmup schedule and Renda, Frankle and Carbin (2020) demonstrated that rewinding the LR to its initial state at the end of each pruning cycl… ▽ More

    Submitted 30 December, 2022; v1 submitted 9 December, 2022; originally announced December 2022.

    Comments: 23 Pages. arXiv admin note: text overlap with arXiv:2110.08764

  7. arXiv:2212.06143  [pdf, other

    cs.LG cs.AI

    Improving Mutual Information based Feature Selection by Boosting Unique Relevance

    Authors: Shiyu Liu, Mehul Motani

    Abstract: Mutual Information (MI) based feature selection makes use of MI to evaluate each feature and eventually shortlists a relevant feature subset, in order to address issues associated with high-dimensional datasets. Despite the effectiveness of MI in feature selection, we notice that many state-of-the-art algorithms disregard the so-called unique relevance (UR) of features, and arrive at a suboptimal… ▽ More

    Submitted 17 December, 2022; v1 submitted 9 December, 2022; originally announced December 2022.

    Comments: 13 pages

  8. arXiv:2212.06142  [pdf, other

    cs.LG cs.AI

    Towards Better Long-range Time Series Forecasting using Generative Forecasting

    Authors: Shiyu Liu, Rohan Ghosh, Mehul Motani

    Abstract: Long-range time series forecasting is usually based on one of two existing forecasting strategies: Direct Forecasting and Iterative Forecasting, where the former provides low bias, high variance forecasts and the latter leads to low variance, high bias forecasts. In this paper, we propose a new forecasting strategy called Generative Forecasting (GenF), which generates synthetic data for the next f… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: 14 pages. arXiv admin note: substantial text overlap with arXiv:2110.08770

  9. DropNet: Reducing Neural Network Complexity via Iterative Pruning

    Authors: John Tan Chong Min, Mehul Motani

    Abstract: Modern deep neural networks require a significant amount of computing time and power to train and deploy, which limits their usage on edge devices. Inspired by the iterative weight pruning in the Lottery Ticket Hypothesis, we propose DropNet, an iterative pruning method which prunes nodes/filters to reduce network complexity. DropNet iteratively removes nodes/filters with the lowest average post-a… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

    Comments: Published at ICML 2020. Code can be found at https://github.com/tanchongmin/DropNet

    Journal ref: Proceedings of the 37th International Conference on Machine Learning, PMLR 119:9356-9366, 2020 https://proceedings.mlr.press/v119/tan20a.html

  10. arXiv:2207.05991  [pdf, other

    cs.LG cs.AI

    Brick Tic-Tac-Toe: Exploring the Generalizability of AlphaZero to Novel Test Environments

    Authors: John Tan Chong Min, Mehul Motani

    Abstract: Traditional reinforcement learning (RL) environments typically are the same for both the training and testing phases. Hence, current RL methods are largely not generalizable to a test environment which is conceptually similar but different from what the method has been trained on, which we term the novel test environment. As an effort to push RL research towards algorithms which can generalize to… ▽ More

    Submitted 13 July, 2022; v1 submitted 13 July, 2022; originally announced July 2022.

    Comments: AlphaZero, Generalization

  11. arXiv:2112.06044  [pdf, other

    cs.LG cs.IT

    Achieving Low Complexity Neural Decoders via Iterative Pruning

    Authors: Vikrant Malik, Rohan Ghosh, Mehul Motani

    Abstract: The advancement of deep learning has led to the development of neural decoders for low latency communications. However, neural decoders can be very complex which can lead to increased computation and latency. We consider iterative pruning approaches (such as the lottery ticket hypothesis algorithm) to prune weights in neural decoders. Decoders with fewer number of weights can have lower latency an… ▽ More

    Submitted 16 November, 2022; v1 submitted 11 December, 2021; originally announced December 2021.

    Comments: Machine Learning For Systems Workshop at NeurIPS 2021

  12. arXiv:2110.08770  [pdf, ps, other

    cs.LG cs.AI

    Towards Better Long-range Time Series Forecasting using Generative Adversarial Networks

    Authors: Shiyu Liu, Rohan Ghosh, Mehul Motani

    Abstract: Long-range time series forecasting is usually based on one of two existing forecasting strategies: Direct Forecasting and Iterative Forecasting, where the former provides low bias, high variance forecasts and the later leads to low variance, high bias forecasts. In this paper, we propose a new forecasting strategy called Generative Forecasting (GenF), which generates synthetic data for the next fe… ▽ More

    Submitted 4 August, 2022; v1 submitted 17 October, 2021; originally announced October 2021.

    Comments: 20 pages paper including 9 pages appendix

  13. arXiv:2110.08764  [pdf, other

    cs.LG cs.NE

    S-Cyc: A Learning Rate Schedule for Iterative Pruning of ReLU-based Networks

    Authors: Shiyu Liu, Chong Min John Tan, Mehul Motani

    Abstract: We explore a new perspective on adapting the learning rate (LR) schedule to improve the performance of the ReLU-based network as it is iteratively pruned. Our work and contribution consist of four parts: (i) We find that, as the ReLU-based network is iteratively pruned, the distribution of weight gradients tends to become narrower. This leads to the finding that as the network becomes more sparse,… ▽ More

    Submitted 17 October, 2021; originally announced October 2021.

    Comments: 7 pages main paper with 5 pages appendix

  14. arXiv:1911.07499  [pdf, ps, other

    cs.IT

    Throughput Maximization with an Average Age of Information Constraint in Fading Channels

    Authors: Rajshekhar Vishweshwar Bhat, Rahul Vaze, Mehul Motani

    Abstract: In the emerging fifth generation (5G) technology, communication nodes are expected to support two crucial classes of information traffic, namely, the enhanced mobile broadband (eMBB) traffic with high data rate requirements, and ultra-reliable low-latency communications (URLLC) traffic with strict requirements on latency and reliability. The URLLC traffic, which is usually analyzed by a metric cal… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

  15. arXiv:1911.06621  [pdf, ps, other

    cs.LG eess.SP

    Long-range Prediction of Vital Signs Using Generative Boosting via LSTM Networks

    Authors: Shiyu Liu, Mehul Motani

    Abstract: Vital signs including heart rate, respiratory rate, body temperature and blood pressure, are critical in the clinical decision making process. Effective early prediction of vital signs help to alert medical practitioner ahead of time and may prevent adverse health outcomes. In this paper, we suggest a new approach called generative boosting, in order to effectively perform early prediction of vita… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: Machine Learning for Health (ML4H) at NeurIPS 2019 - Extended Abstract

  16. arXiv:1908.06416  [pdf, other

    cs.LG cs.CV stat.ML

    Investigating Convolutional Neural Networks using Spatial Orderness

    Authors: Rohan Ghosh, Anupam K. Gupta, Mehul Motani

    Abstract: Convolutional Neural Networks (CNN) have been pivotal to the success of many state-of-the-art classification problems, in a wide variety of domains (for e.g. vision, speech, graphs and medical imaging). A commonality within those domains is the presence of hierarchical, spatially agglomerative local-to-global interactions within the data. For two-dimensional images, such interactions may induce an… ▽ More

    Submitted 29 November, 2019; v1 submitted 18 August, 2019; originally announced August 2019.

    Comments: Presented at BMVC 2019: Workshop on Interpretable and Explainable Machine Vision, Cardiff, UK

  17. arXiv:1901.00387  [pdf, ps, other

    cs.IT

    Generalized Sphere-Packing Bound for Subblock-Constrained Codes

    Authors: Han Mao Kiah, Anshoo Tandon, Mehul Motani

    Abstract: We apply the generalized sphere-packing bound to two classes of subblock-constrained codes. A la Fazeli et al. (2015), we made use of automorphism to significantly reduce the number of variables in the associated linear programming problem. In particular, we study binary constant subblock-composition codes (CSCCs), characterized by the property that the number of ones in each subblock is constant,… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

  18. arXiv:1812.00415  [pdf, other

    cs.LG stat.ML

    Feature Selection Based on Unique Relevant Information for Health Data

    Authors: Shiyu Liu, Mehul Motani

    Abstract: Feature selection, which searches for the most representative features in observed data, is critical for health data analysis. Unlike feature extraction, such as PCA and autoencoder based methods, feature selection preserves interpretability, meaning that the selected features provide direct information about certain health conditions (i.e., the label). Thus, feature selection allows domain expert… ▽ More

    Submitted 2 December, 2018; originally announced December 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216

    Report number: ML4H/2018/172

  19. arXiv:1807.09040  [pdf, ps, other

    cs.IT

    Are RLL Codes Suitable for Simultaneous Energy and Information Transfer?

    Authors: Anshoo Tandon, Mehul Motani, Lav R. Varshney

    Abstract: Run-length limited (RLL) codes are a well-studied class of constrained codes having application in diverse areas such as optical and magnetic data recording systems, DNA-based storage, and visible light communication. RLL codes have also been proposed for the emerging area of simultaneous energy and information transfer, where the receiver uses the received signal for decoding information as well… ▽ More

    Submitted 24 July, 2018; originally announced July 2018.

  20. arXiv:1806.11271  [pdf, other

    cs.IT

    Multicasting Energy and Information Simultaneously

    Authors: Ting-Yi Wu, Anshoo Tandon, Lav R. Varshney, Mehul Motani

    Abstract: Communication systems for multicasting information and energy simultaneously to more than one user are investigated. In the system under study, a transmitter sends the same message and signal to multiple receivers over distinct and independent channels. The fundamental communication limit under a received energy constraint, called the multicast capacity-energy function, is studied and a single-let… ▽ More

    Submitted 13 March, 2019; v1 submitted 29 June, 2018; originally announced June 2018.

    Comments: 6 pages, 5 figures, parts of results have submitted to 2019 IEEE International Symposium on Information Theory

  21. arXiv:1806.00739  [pdf, ps, other

    cs.IT cs.LG

    Second-Order Asymptotically Optimal Statistical Classification

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: Motivated by real-world machine learning applications, we analyze approximations to the non-asymptotic fundamental limits of statistical classification. In the binary version of this problem, given two training sequences generated according to two {\em unknown} distributions $P_1$ and $P_2$, one is tasked to classify a test sequence which is known to be generated according to either $P_1$ or… ▽ More

    Submitted 6 December, 2018; v1 submitted 3 June, 2018; originally announced June 2018.

    Comments: To appear in Information and Inference: A Journal of the IMA (https://academic.oup.com/imaiai)

  22. arXiv:1801.03813  [pdf, ps, other

    cs.IT

    Energy Harvesting Communications Using Dual Alternating Batteries

    Authors: Rajshekhar Vishweshwar Bhat, Mehul Motani, Chandra R Murthy, Rahul Vaze

    Abstract: Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (disch… ▽ More

    Submitted 18 December, 2018; v1 submitted 11 January, 2018; originally announced January 2018.

    Comments: A single battery case is added and its performance is compared with that of the dual-battery case, with additional simulation results

  23. arXiv:1801.03794  [pdf, ps, other

    cs.IT

    Hybrid NOMA-TDMA for Multiple Access Channels with Non-Ideal Batteries and Circuit Cost

    Authors: Rajshekhar Vishweshwar Bhat, Mehul Motani, Teng Joon Lim

    Abstract: We consider a multiple-access channel where the users are powered from batteries having non-negligible internal resistance. When power is drawn from the battery, a variable fraction of the power, which is a function of the power drawn from the battery, is lost across the internal resistance. Hence, the power delivered to the load is less than the power drawn from the battery. The users consume a c… ▽ More

    Submitted 15 January, 2018; v1 submitted 11 January, 2018; originally announced January 2018.

  24. arXiv:1711.11206  [pdf, ps, other

    cs.IT

    The Dispersion of Mismatched Joint Source-Channel Coding for Arbitrary Sources and Additive Channels

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: We consider a joint source channel coding (JSCC) problem in which we desire to transmit an arbitrary memoryless source over an arbitrary additive channel. We propose a mismatched coding architecture that consists of Gaussian codebooks for both the source reproduction sequences and channel codewords. The natural nearest neighbor encoder and decoder, however, need to be judiciously modified to obtai… ▽ More

    Submitted 31 August, 2018; v1 submitted 29 November, 2017; originally announced November 2017.

  25. arXiv:1711.09494  [pdf, ps, other

    cs.IT

    Skip-Sliding Window Codes

    Authors: Ting-Yi Wu, Anshoo Tandon, Lav R. Varshney, Mehul Motani

    Abstract: Constrained coding is used widely in digital communication and storage systems. In this paper, we study a generalized sliding window constraint called the skip-sliding window. A skip-sliding window (SSW) code is defined in terms of the length $L$ of a sliding window, skip length $J$, and cost constraint $E$ in each sliding window. Each valid codeword of length $L + kJ$ is determined by $k+1$ windo… ▽ More

    Submitted 10 January, 2018; v1 submitted 26 November, 2017; originally announced November 2017.

    Comments: 28 pages, 11 figures

  26. arXiv:1708.05496  [pdf, ps, other

    cs.IT

    Non-Asymptotic Converse Bounds and Refined Asymptotics for Two Lossy Source Coding Problems

    Authors: Lin Zhou, Mehul Motani

    Abstract: In this paper, we revisit two multi-terminal lossy source coding problems: the lossy source coding problem with side information available at the encoder and one of the two decoders, which we term as the Kaspi problem (Kaspi, 1994), and the multiple description coding problem with one semi-deterministic distortion measure, which we refer to as the Fu-Yeung problem (Fu and Yeung, 2002). For the Kas… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: 34 pages, to be submitted to IEEE Transactions on Information Theory, extended version of two papers accepted by Globecom 2017

  27. arXiv:1708.04778  [pdf, ps, other

    cs.IT

    Refined Asymptotics for Rate-Distortion using Gaussian Codebooks for Arbitrary Sources

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: The rate-distortion saddle-point problem considered by Lapidoth (1997) consists in finding the minimum rate to compress an arbitrary ergodic source when one is constrained to use a random Gaussian codebook and minimum (Euclidean) distance encoding is employed. We extend Lapidoth's analysis in several directions in this paper. Firstly, we consider refined asymptotics. In particular, when the source… ▽ More

    Submitted 31 August, 2018; v1 submitted 16 August, 2017; originally announced August 2017.

    Comments: Under review with TIT

  28. arXiv:1704.04584  [pdf, other

    cs.IT

    Performance of Energy Harvesting Receivers with Power Optimization

    Authors: Zhengwei Ni, Mehul Motani

    Abstract: The difficulty of modeling energy consumption in communication systems leads to challenges in energy harvesting (EH) systems, in which nodes scavenge energy from their environment. An EH receiver must harvest enough energy for demodulating and decoding. The energy required depends upon factors, like code rate and signal-to-noise ratio, which can be adjusted dynamically. We consider a receiver whic… ▽ More

    Submitted 15 April, 2017; originally announced April 2017.

    Comments: 28 pages

  29. arXiv:1702.06649  [pdf, ps, other

    cs.IT

    Exponential Strong Converse for Content Identification with Lossy Recovery

    Authors: Lin Zhou, Vincent Y. F. Tan, Lei Yu, Mehul Motani

    Abstract: We revisit the high-dimensional content identification with lossy recovery problem (Tuncel and Gündüz, 2014) and establish an exponential strong converse theorem. As a corollary of the exponential strong converse theorem, we derive an upper bound on the joint identification-error and excess-distortion exponent for the problem. Our main results can be specialized to the biometrical identification p… ▽ More

    Submitted 25 December, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: Changed parts compared to v1 are in blue. Under revision with TIT

  30. arXiv:1702.04258  [pdf, other

    cs.IT

    Layered Coding for Energy Harvesting Communication Without CSIT

    Authors: Rajshekhar Vishweshwar Bhat, Mehul Motani, Teng Joon Lim

    Abstract: Due to stringent constraints on resources, it may be infeasible to acquire the current channel state information at the transmitter in energy harvesting communication systems. In this paper, we optimize an energy harvesting transmitter, communicating over a slow fading channel, using layered coding. The transmitter has access to the channel statistics, but does not know the exact channel state. In… ▽ More

    Submitted 14 April, 2017; v1 submitted 14 February, 2017; originally announced February 2017.

    Comments: Elaborated on the system model, added a result (Lemma 1), added 2 more references

  31. arXiv:1701.04954  [pdf, ps, other

    cs.IT

    Bounds on the Size and Asymptotic Rate of Subblock-Constrained Codes

    Authors: Anshoo Tandon, Han Mao Kiah, Mehul Motani

    Abstract: The study of subblock-constrained codes has recently gained attention due to their application in diverse fields. We present bounds on the size and asymptotic rate for two classes of subblock-constrained codes. The first class is binary constant subblock-composition codes (CSCCs), where each codeword is partitioned into equal sized subblocks, and every subblock has the same fixed weight. The secon… ▽ More

    Submitted 18 January, 2017; originally announced January 2017.

  32. arXiv:1701.02444  [pdf, ps, other

    cs.IT

    Energy Harvesting Communication Using Finite-Capacity Batteries with Internal Resistance

    Authors: Rajshekhar Vishweshwar Bhat, Mehul Motani, Teng Joon Lim

    Abstract: Modern systems will increasingly rely on energy harvested from their environment. Such systems utilize batteries to smoothen out the random fluctuations in harvested energy. These fluctuations induce highly variable battery charge and discharge rates, which affect the efficiencies of practical batteries that typically have non-zero internal resistances. In this paper, we study an energy harvesting… ▽ More

    Submitted 10 January, 2017; originally announced January 2017.

    Comments: 30 single column pages

  33. arXiv:1701.01938  [pdf, other

    cs.IT

    Polar Coding for the Binary Erasure Channel with Deletions

    Authors: Eldho K. Thomas, Vincent Y. F. Tan, Alexander Vardy, Mehul Motani

    Abstract: We study the application of polar codes in deletion channels by analyzing the cascade of a binary erasure channel (BEC) and a deletion channel. We show how polar codes can be used effectively on a BEC with a single deletion, and propose a list decoding algorithm with a cyclic redundancy check for this case. The decoding complexity is $O(N^2\log N)$, where $N$ is the blocklength of the code. An imp… ▽ More

    Submitted 8 January, 2017; originally announced January 2017.

    Comments: 4 pages; 1 figure; To appear in the IEEE Communication Letters

  34. arXiv:1604.07151  [pdf, ps, other

    cs.IT

    Achievable Moderate Deviations Asymptotics for Streaming Compression of Correlated Sources

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: Motivated by streaming multi-view video coding and wireless sensor networks, we consider the problem of blockwise streaming compression of a pair of correlated sources, which we term streaming Slepian-Wolf coding. We study the moderate deviations regime in which the rate pairs of a sequence of codes converge, along a straight line, to various points on the boundary of the Slepian-Wolf region at a… ▽ More

    Submitted 20 September, 2017; v1 submitted 25 April, 2016; originally announced April 2016.

    Comments: 31 pages, 6 figures, under revision with IEEE Transactions on Information Theory; short version presented ISIT 2017

  35. arXiv:1601.04500  [pdf, ps, other

    cs.IT

    Second-Order and Moderate Deviation Asymptotics for Successive Refinement

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: We derive the optimal second-order coding region and moderate deviations constant for successive refinement source coding with a joint excess-distortion probability constraint. We consider two scenarios: (i) a discrete memoryless source (DMS) and arbitrary distortion measures at the decoders and (ii) a Gaussian memoryless source (GMS) and quadratic distortion measures at the decoders. For a DMS wi… ▽ More

    Submitted 26 August, 2016; v1 submitted 18 January, 2016; originally announced January 2016.

    Comments: Part of this paper has beed presented at ISIT 2016. Submitted to IEEE Transactions on Information Theory in Jan, 2016. Revised in Aug. 2016

  36. Discrete Lossy Gray-Wyner Revisited: Second-Order Asymptotics, Large and Moderate Deviations

    Authors: Lin Zhou, Vincent Y. F. Tan, Mehul Motani

    Abstract: In this paper, we revisit the discrete lossy Gray-Wyner problem. In particular, we derive its optimal second-order coding rate region, its error exponent (reliability function) and its moderate deviations constant under mild conditions on the source. To obtain the second-order asymptotics, we extend some ideas from Watanabe's work (2015). In particular, we leverage the properties of an appropriate… ▽ More

    Submitted 4 January, 2017; v1 submitted 3 December, 2015; originally announced December 2015.

    Comments: 33 pages, accepted to IEEE Transactions on Information Theory; Short version v_1 presented at IEEE ISIT 2016, Barcelona, Spain

  37. arXiv:1507.03190   

    cs.IT

    On Error Exponents and Moderate Deviations for Lossless Streaming Compression of Correlated Sources

    Authors: Lin Zhou, Vincent Yan Fu Tan, Mehul Motani

    Abstract: We derive upper and lower bounds for the error exponents of lossless streaming compression of two correlated sources under the blockwise and symbolwise settings. We consider the linear scaling regime in which the delay is a scalar multiple of the number of symbol pairs of interest. We show that for rate pairs satisfying certain constraints, the upper and lower bounds for the error exponent of bloc… ▽ More

    Submitted 22 February, 2016; v1 submitted 12 July, 2015; originally announced July 2015.

    Comments: The paper has been withdrawn due to an error in the achievability proof

  38. arXiv:1506.00213  [pdf, ps, other

    cs.IT

    Subblock-Constrained Codes for Real-Time Simultaneous Energy and Information Transfer

    Authors: Anshoo Tandon, Mehul Motani, Lav R. Varshney

    Abstract: Consider an energy-harvesting receiver that uses the same received signal both for decoding information and for harvesting energy, which is employed to power its circuitry. In the scenario where the receiver has limited battery size, a signal with bursty energy content may cause power outage at the receiver since the battery will drain during intervals with low signal energy. In this paper, we con… ▽ More

    Submitted 31 May, 2015; originally announced June 2015.

  39. A Metric for DISH Networks: Analysis, Implications, and Applications

    Authors: Tie Luo, Vikram Srinivasan, Mehul Motani

    Abstract: In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes. In particular, Distributed Information SHaring (DISH) represents a new improvement to multi-channel MAC protocol design by using a cooperative element at the control plane. In this approach, nodes exchange control informat… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: Cooperative protocol, availability of cooperation, multi-channel multi-hop wireless network, multi-channel MAC protocols, distributed information sharing (DISH), channel bandwidth allocation

    Journal ref: IEEE Transactions on Mobile Computing, vol. 9, no. 3, pp. 376--389, March 2010

  40. arXiv:1411.6749  [pdf, other

    cs.NI cs.PF

    Analyzing DISH for Multi-Channel MAC Protocols in Wireless Networks

    Authors: Tie Luo, Mehul Motani, Vikram Srinivasan

    Abstract: For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in a multi-channel environment, where transmitter-receiver pairs may make incorrect decisions (e.g., in selecting channels) but idle neighbors could help by sharing information to prevent undesirable consequences (e.g., dat… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: Multi-channel multi-hop networks, availability of cooperation, cooperative protocol, distributed information sharing, ACM MobiHoc, May 2008

  41. Energy-Efficient Strategies for Cooperative Multi-Channel MAC Protocols

    Authors: Tie Luo, Mehul Motani, Vikram Srinivasan

    Abstract: Distributed Information SHaring (DISH) is a new cooperative approach to designing multi-channel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However, a critical issue for ad h… ▽ More

    Submitted 24 November, 2014; v1 submitted 24 November, 2014; originally announced November 2014.

    Comments: Energy efficiency, cost efficiency, distributed information sharing, DISH, altruistic cooperation

    Journal ref: IEEE Transactions on Mobile Computing (TMC), vol. 11, no. 4, pp. 553-566, April 2012

  42. arXiv:1410.2687  [pdf, other

    cs.IT

    Second-Order Coding Rates for Conditional Rate-Distortion

    Authors: Sy-Quoc Le, Vincent Y. F. Tan, Mehul Motani

    Abstract: This paper characterizes the second-order coding rates for lossy source coding with side information available at both the encoder and the decoder. We first provide non-asymptotic bounds for this problem and then specialize the non-asymptotic bounds for three different scenarios: discrete memoryless sources, Gaussian sources, and Markov sources. We obtain the second-order coding rates for these se… ▽ More

    Submitted 10 October, 2014; originally announced October 2014.

    Comments: 20 pages, 2 figures, second-order coding rates, finite blocklength, network information theory

  43. arXiv:1406.1140  [pdf, ps, other

    cs.IT

    Fading Two-Way Relay Channels: Physical-Layer Versus Digital Network Coding

    Authors: Zhi Chen, Tengjoon Lim, Mehul Motani

    Abstract: In this paper, we consider three transmit strategies for the fading three-node, two-way relay network (TWRN) -- physical-layer network coding (PNC), digital network coding (DNC) and codeword superposition (CW-Sup). The aim is to minimize the total average energy needed to deliver a given pair of required average rates. Full channel state information is assumed to be available at all transmitters a… ▽ More

    Submitted 4 June, 2014; originally announced June 2014.

    Comments: 25 pages, 5 figures

  44. arXiv:1404.0255  [pdf, other

    cs.IT

    A Case Where Interference Does Not Affect The Channel Dispersion

    Authors: Sy-Quoc Le, Vincent Y. F. Tan, Mehul Motani

    Abstract: In 1975, Carleial presented a special case of an interference channel in which the interference does not reduce the capacity of the constituent point-to-point Gaussian channels. In this work, we show that if the inequalities in the conditions that Carleial stated are strict, the dispersions are similarly unaffected. More precisely, in this work, we characterize the second-order coding rates of the… ▽ More

    Submitted 1 April, 2014; originally announced April 2014.

    Comments: Submitted to Transactions on Information Theory

  45. arXiv:1210.3512  [pdf, ps, other

    cs.IT

    Digital Network Coding Aided Two-way Relaying: Energy Minimization and Queue Analysis

    Authors: Zhi Chen, Teng Joon Lim, Mehul Motani

    Abstract: In this paper, we consider a three node, two-way relay system with digital network coding over static channels where all link gains are assumed to be constant during transmission. The aim is to minimize total energy consumption while ensuring queue stability at all nodes, for a given pair of random packet arrival rates. Specifically, we allow for a set of transmission modes and solve for the optim… ▽ More

    Submitted 25 October, 2012; v1 submitted 12 October, 2012; originally announced October 2012.

  46. On Capacity and Optimal Scheduling for the Half-Duplex Multiple-Relay Channel

    Authors: Lawrence Ong, Mehul Motani, Sarah J. Johnson

    Abstract: We study the half-duplex multiple-relay channel (HD-MRC) where every node can either transmit or listen but cannot do both at the same time. We obtain a capacity upper bound based on a max-flow min-cut argument and achievable transmission rates based on the decode-forward (DF) coding strategy, for both the discrete memoryless HD-MRC and the phase-fading HD-MRC. We discover that both the upper boun… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: Author's final version (to appear in IEEE Transactions on Information Theory)

    Journal ref: IEEE Transactions on Information Theory, Vol. 58, No. 9, pp. 5770-5784, 2012

  47. arXiv:1103.2240  [pdf, ps, other

    cs.IT

    Price-Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game Approach

    Authors: Xin Kang, Rui Zhang, Mehul Motani

    Abstract: This paper investigates the price-based resource allocation strategies for the uplink transmission of a spectrum-sharing femtocell network, in which a central macrocell is underlaid with distributed femtocells, all operating over the same frequency band as the macrocell. Assuming that the macrocell base station (MBS) protects itself by pricing the interference from the femtocell users, a Stackelbe… ▽ More

    Submitted 11 March, 2011; originally announced March 2011.

    Comments: 27 pages, 7 figures, Submitted to JSAC

  48. arXiv:0807.2328  [pdf, ps, other

    cs.NI cs.MM

    Avatar Mobility in Networked Virtual Environments: Measurements, Analysis, and Implications

    Authors: Huiguang Liang, Ian Tay, Ming Feng Neo, Wei Tsang Ooi, Mehul Motani

    Abstract: We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual environment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both temporally and spatially. We discuss the implications of the our findings to the design of peer-to-peer networked virtual environments, interest management, mobili… ▽ More

    Submitted 15 July, 2008; originally announced July 2008.

    ACM Class: H.5.1; C.2.4

  49. Myopic Coding in Multiterminal Networks

    Authors: Lawrence Ong, Mehul Motani

    Abstract: This paper investigates the interplay between cooperation and achievable rates in multi-terminal networks. Cooperation refers to the process of nodes working together to relay data toward the destination. There is an inherent tradeoff between achievable information transmission rates and the level of cooperation, which is determined by how many nodes are involved and how the nodes encode/decode… ▽ More

    Submitted 30 June, 2008; originally announced June 2008.

    Journal ref: IEEE Transactions on Information Theory, Vol. 54, No. 7, pp. 3295-3314, Jul. 2008

  50. Optimal Routing for the Gaussian Multiple-Relay Channel with Decode-and-Forward

    Authors: Lawrence Ong, Mehul Motani

    Abstract: In this paper, we study a routing problem on the Gaussian multiple relay channel, in which nodes employ a decode-and-forward coding strategy. We are interested in routes for the information flow through the relays that achieve the highest DF rate. We first construct an algorithm that provably finds optimal DF routes. As the algorithm runs in factorial time in the worst case, we propose a polynom… ▽ More

    Submitted 23 April, 2007; originally announced April 2007.

    Comments: Accepted and to be presented at the 2007 IEEE International Symposium on Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center, Nice, France, June 24-29 2007

    Journal ref: Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center, Nice, France, pp. 1061-1065, Jun. 24-29 2007.