-
Visual-band brightnesses of Near Earth Objects that will be discovered in the infrared by NEO Surveyor
Authors:
Joseph R. Masiero,
Tyler Linder,
Amy Mainzer,
Dar W. Dahlen,
Yuna G. Kwon
Abstract:
NEO Surveyor will detect asteroids and comets using mid-infrared thermal emission, however ground-based followup resources will require knowledge of the expected visible light brightness in order to plan characterization observations. Here we describe the range of visual-to-infrared colors that the NEOs detected by Surveyor will span, and demonstrate that for objects that have no previously report…
▽ More
NEO Surveyor will detect asteroids and comets using mid-infrared thermal emission, however ground-based followup resources will require knowledge of the expected visible light brightness in order to plan characterization observations. Here we describe the range of visual-to-infrared colors that the NEOs detected by Surveyor will span, and demonstrate that for objects that have no previously reported Visual band observations, estimates of the Johnson Visual-band brightness based on infrared flux alone will have significant uncertainty. Incidental or targeted photometric followup of objects discovered by Surveyor enables predictions of the fraction of reflected light visible and near-infrared wavelengths, supporting additional detailed characterization.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
Reinforcement Learning for Near-Optimal Design of Zero-Delay Codes for Markov Sources
Authors:
Liam Cregg,
Tamas Linder,
Serdar Yuksel
Abstract:
In the classical lossy source coding problem, one encodes long blocks of source symbols that enables the distortion to approach the ultimate Shannon limit. Such a block-coding approach introduces large delays, which is undesirable in many delay-sensitive applications. We consider the zero-delay case, where the goal is to encode and decode a finite-alphabet Markov source without any delay. It has b…
▽ More
In the classical lossy source coding problem, one encodes long blocks of source symbols that enables the distortion to approach the ultimate Shannon limit. Such a block-coding approach introduces large delays, which is undesirable in many delay-sensitive applications. We consider the zero-delay case, where the goal is to encode and decode a finite-alphabet Markov source without any delay. It has been shown that this problem lends itself to stochastic control techniques, which lead to existence, structural, and general structural approximation results. However, these techniques so far have resulted only in computationally prohibitive algorithmic implementations for code design. To address this problem, we present a reinforcement learning design algorithm and rigorously prove its asymptotic optimality. In particular, we show that a quantized Q-learning algorithm can be used to obtain a near-optimal coding policy for this problem. The proof builds on recent results on quantized Q-learning for weakly Feller controlled Markov chains whose application necessitates the development of supporting technical results on regularity and stability properties, and relating the optimal solutions for discounted and average cost infinite horizon criteria problems. These theoretical results are supported by simulations.
△ Less
Submitted 17 June, 2024; v1 submitted 21 November, 2023;
originally announced November 2023.
-
Distribution-free tests for lossless feature selection in classification and regression
Authors:
László Györfi,
Tamás Linder,
Harro Walk
Abstract:
We study the problem of lossless feature selection for a $d$-dimensional feature vector $X=(X^{(1)},\dots ,X^{(d)})$ and label $Y$ for binary classification as well as nonparametric regression. For an index set $S\subset \{1,\dots ,d\}$, consider the selected $|S|$-dimensional feature subvector $X_S=(X^{(i)}, i\in S)$. If $L^*$ and $L^*(S)$ stand for the minimum risk based on $X$ and $X_S$, respec…
▽ More
We study the problem of lossless feature selection for a $d$-dimensional feature vector $X=(X^{(1)},\dots ,X^{(d)})$ and label $Y$ for binary classification as well as nonparametric regression. For an index set $S\subset \{1,\dots ,d\}$, consider the selected $|S|$-dimensional feature subvector $X_S=(X^{(i)}, i\in S)$. If $L^*$ and $L^*(S)$ stand for the minimum risk based on $X$ and $X_S$, respectively, then $X_S$ is called lossless if $L^*=L^*(S)$. For classification, the minimum risk is the Bayes error probability, while in regression, the minimum risk is the residual variance. We introduce nearest-neighbor based test statistics to test the hypothesis that $X_S$ is lossless. For the threshold $a_n=\log n/\sqrt{n}$, the corresponding tests are proved to be consistent under conditions on the distribution of $(X,Y)$ that are significantly milder than in previous work. Also, our threshold is dimension-independent, in contrast to earlier methods where for large $d$ the threshold becomes too large to be useful in practice.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Lossless Transformations and Excess Risk Bounds in Statistical Inference
Authors:
László Györfi,
Tamás Linder,
Harro Walk
Abstract:
We study the excess minimum risk in statistical inference, defined as the difference between the minimum expected loss in estimating a random variable from an observed feature vector and the minimum expected loss in estimating the same random variable from a transformation (statistic) of the feature vector. After characterizing lossless transformations, i.e., transformations for which the excess r…
▽ More
We study the excess minimum risk in statistical inference, defined as the difference between the minimum expected loss in estimating a random variable from an observed feature vector and the minimum expected loss in estimating the same random variable from a transformation (statistic) of the feature vector. After characterizing lossless transformations, i.e., transformations for which the excess risk is zero for all loss functions, we construct a partitioning test statistic for the hypothesis that a given transformation is lossless and show that for i.i.d. data the test is strongly consistent. More generally, we develop information-theoretic upper bounds on the excess risk that uniformly hold over fairly general classes of loss functions. Based on these bounds, we introduce the notion of a delta-lossless transformation and give sufficient conditions for a given transformation to be universally delta-lossless. Applications to classification, nonparametric regression, portfolio strategies, information bottleneck, and deep learning, are also surveyed.
△ Less
Submitted 27 September, 2023; v1 submitted 31 July, 2023;
originally announced July 2023.
-
Logarithmic Regret in Adaptive Control of Noisy Linear Quadratic Regulator Systems Using Hints
Authors:
Mohammad Akbari,
Bahman Gharesifard,
Tamas Linder
Abstract:
The problem of regret minimization for online adaptive control of linear-quadratic systems is studied. In this problem, the true system transition parameters (matrices $A$ and $B$) are unknown, and the objective is to design and analyze algorithms that generate control policies with sublinear regret. Recent studies show that when the system parameters are fully unknown, there exists a choice of th…
▽ More
The problem of regret minimization for online adaptive control of linear-quadratic systems is studied. In this problem, the true system transition parameters (matrices $A$ and $B$) are unknown, and the objective is to design and analyze algorithms that generate control policies with sublinear regret. Recent studies show that when the system parameters are fully unknown, there exists a choice of these parameters such that any algorithm that only uses data from the past system trajectory at best achieves a square root of time horizon regret bound, providing a hard fundamental limit on the achievable regret in general. However, it is also known that (poly)-logarithmic regret is achievable when only matrix $A$ or only matrix $B$ is unknown. We present a result, encompassing both scenarios, showing that (poly)-logarithmic regret is achievable when both of these matrices are unknown, but a hint is periodically given to the controller.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Optical Time-Series Photometry of the Symbiotic Nova V1835 Aquilae
Authors:
Robert V. Caddy,
Andrew C. Layden,
Daniel E. Reichart,
Joshua B. Haislip,
Vladimir V. Kouprianov,
Kevin M. Ivarsen,
Justin P. Moore,
Aaron P. LaCluyze,
Tyler R. Linder,
Melissa C. Nysewander
Abstract:
We present time-series CCD photometry in the $BVRI$ passbands of the recently identified symbiotic nova V1835 Aquilae (NSV 11749) over an interval of 5.1 years with 7-14 day cadence, observed during its quiescence. We find slow light variations with a range of $\sim$0.9 mag in $V$ and $\sim$0.3 mag in $I$. Analysis of these data show strong periodicity at $419 \pm 10$ days, which we interpret to b…
▽ More
We present time-series CCD photometry in the $BVRI$ passbands of the recently identified symbiotic nova V1835 Aquilae (NSV 11749) over an interval of 5.1 years with 7-14 day cadence, observed during its quiescence. We find slow light variations with a range of $\sim$0.9 mag in $V$ and $\sim$0.3 mag in $I$. Analysis of these data show strong periodicity at $419 \pm 10$ days, which we interpret to be the system's orbital period. A dip in the otherwise-sinusoidal phased light curve suggests a weak ellipsoidal effect due to tidal distortion of the giant star, which in turn opens the possibility that V1835 Aql transfers some of its mass to the hot component via Roche lobe overflow rather than via a stellar wind. We also find evidence that V1835 Aql is an S-type symbiotic star, relatively free of circumstellar dust, and include it among the nuclear burning group of symbiotics. Finally, we provide photometry, periods, and light curve classifications for 22 variable stars in the field around V1835 Aql, about half of which are newly identified.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Rényi Cross-Entropy Measures for Common Distributions and Processes with Memory
Authors:
Ferenc Cole Thierrin,
Fady Alajaji,
Tamás Linder
Abstract:
Two Rényi-type generalizations of the Shannon cross-entropy, the Rényi cross-entropy and the Natural Rényi cross-entropy, were recently used as loss functions for the improved design of deep learning generative adversarial networks. In this work, we build upon our results in [1] by deriving the Rényi and Natural Rényi differential cross-entropy measures in closed form for a wide class of common co…
▽ More
Two Rényi-type generalizations of the Shannon cross-entropy, the Rényi cross-entropy and the Natural Rényi cross-entropy, were recently used as loss functions for the improved design of deep learning generative adversarial networks. In this work, we build upon our results in [1] by deriving the Rényi and Natural Rényi differential cross-entropy measures in closed form for a wide class of common continuous distributions belonging to the exponential family and tabulating the results for ease of reference. We also summarise the Rényi-type cross-entropy rates between stationary Gaussian processes and between finite-alphabet time-invariant Markov sources.
△ Less
Submitted 19 August, 2022; v1 submitted 14 August, 2022;
originally announced August 2022.
-
On the Rényi Cross-Entropy
Authors:
Ferenc Cole Thierrin,
Fady Alajaji,
Tamás Linder
Abstract:
The Rényi cross-entropy measure between two distributions, a generalization of the Shannon cross-entropy, was recently used as a loss function for the improved design of deep learning generative adversarial networks. In this work, we examine the properties of this measure and derive closed-form expressions for it when one of the distributions is fixed and when both distributions belong to the expo…
▽ More
The Rényi cross-entropy measure between two distributions, a generalization of the Shannon cross-entropy, was recently used as a loss function for the improved design of deep learning generative adversarial networks. In this work, we examine the properties of this measure and derive closed-form expressions for it when one of the distributions is fixed and when both distributions belong to the exponential family. We also analytically determine a formula for the cross-entropy rate for stationary Gaussian processes and for finite-alphabet Markov sources.
△ Less
Submitted 6 August, 2022; v1 submitted 28 June, 2022;
originally announced June 2022.
-
NEOWISE Observations Of The Potentially Hazardous Asteroid (99942) Apophis
Authors:
Akash Satpathy,
Amy Mainzer,
Joseph R. Masiero,
Tyler Linder,
Roc M. Cutri,
Edward L. Wright,
Jana Pittichova,
Tommy Grav,
Emily Kramer
Abstract:
Large potentially hazardous asteroids (PHAs) are capable of causing a global catastrophe in the event of a planetary collision. Thus, rapid assessment of such an object's physical characteristics is crucial for determining its potential risk scale. We treated the near-Earth asteroid (99942) Apophis as a newly discovered object during its 2020-2021 close-approach as part of a mock planetary defense…
▽ More
Large potentially hazardous asteroids (PHAs) are capable of causing a global catastrophe in the event of a planetary collision. Thus, rapid assessment of such an object's physical characteristics is crucial for determining its potential risk scale. We treated the near-Earth asteroid (99942) Apophis as a newly discovered object during its 2020-2021 close-approach as part of a mock planetary defense exercise. The object was detected by the Near-Earth Object Wide-field Infrared Survey Explorer (NEOWISE), and data collected by the two active bands (3.4 $μ$m and 4.6 $μ$m) were analyzed using thermal and thermophysical modeling. Our results indicate that Apophis is an elongated object with an effective spherical diameter D$_{eff}$ = 340 $\pm$ 70 m, a geometric visual albedo p$_{V}$ = 0.31 $\pm$ 0.09, and a thermal inertia $Γ$ $\sim$ 150 - 2850 Jm$^{-2}$s$^{-0.5}$K$^{-1}$ with a best-fit value of 550 Jm$^{-2}$s$^{-0.5}$K$^{-1}$. NEOWISE "discovery" observations reveal that (99942) Apophis is a potentially hazardous asteroid that would likely cause damage at a regional level and not a global one.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
An Asymptotically Optimal Two-Part Fixed-Rate Coding Scheme for Networked Control with Unbounded Noise
Authors:
Jonathan Keeler,
Tamás Linder,
Serdar Yüksel
Abstract:
It is known that under fixed-rate information constraints, adaptive quantizers can be used to stabilize an open-loop-unstable linear system on $\mathbb{R}^n$ driven by unbounded noise. These adaptive schemes can be designed so that they have near-optimal rate, and the resulting system will be stable in the sense of having an invariant probability measure, or ergodicity, as well as boundedness of t…
▽ More
It is known that under fixed-rate information constraints, adaptive quantizers can be used to stabilize an open-loop-unstable linear system on $\mathbb{R}^n$ driven by unbounded noise. These adaptive schemes can be designed so that they have near-optimal rate, and the resulting system will be stable in the sense of having an invariant probability measure, or ergodicity, as well as boundedness of the state second moment. Although structural results and information theoretic bounds of encoders have been studied, the performance of such adaptive fixed-rate quantizers beyond stabilization has not been addressed. In this paper, we propose a two-part adaptive (fixed-rate) coding scheme that achieves state second moment convergence to the classical optimum (i.e., for the fully observed setting) under mild moment conditions on the noise process. The first part, as in prior work, leads to ergodicity (via positive Harris recurrence) and the second part ensures that the state second moment converges to the classical optimum at high rates. These results are established using an intricate analysis which uses random-time state-dependent Lyapunov stochastic drift criteria as a core tool.
△ Less
Submitted 11 January, 2023; v1 submitted 6 February, 2022;
originally announced February 2022.
-
Cross-Modal Analysis of Human Detection for Robotics: An Industrial Case Study
Authors:
Timm Linder,
Narunas Vaskevicius,
Robert Schirmer,
Kai O. Arras
Abstract:
Advances in sensing and learning algorithms have led to increasingly mature solutions for human detection by robots, particularly in selected use-cases such as pedestrian detection for self-driving cars or close-range person detection in consumer settings. Despite this progress, the simple question "which sensor-algorithm combination is best suited for a person detection task at hand?" remains har…
▽ More
Advances in sensing and learning algorithms have led to increasingly mature solutions for human detection by robots, particularly in selected use-cases such as pedestrian detection for self-driving cars or close-range person detection in consumer settings. Despite this progress, the simple question "which sensor-algorithm combination is best suited for a person detection task at hand?" remains hard to answer. In this paper, we tackle this issue by conducting a systematic cross-modal analysis of sensor-algorithm combinations typically used in robotics. We compare the performance of state-of-the-art person detectors for 2D range data, 3D lidar, and RGB-D data as well as selected combinations thereof in a challenging industrial use-case.
We further address the related problems of data scarcity in the industrial target domain, and that recent research on human detection in 3D point clouds has mostly focused on autonomous driving scenarios. To leverage these methodological advances for robotics applications, we utilize a simple, yet effective multi-sensor transfer learning strategy by extending a strong image-based RGB-D detector to provide cross-modal supervision for lidar detectors in the form of weak 3D bounding box labels.
Our results show a large variance among the different approaches in terms of detection performance, generalization, frame rates and computational requirements. As our use-case contains difficulties representative for a wide range of service robot applications, we believe that these results point to relevant open challenges for further research and provide valuable support to practitioners for the design of their robot system.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
Refined physical parameters for Chariklo's body and rings from stellar occultations observed between 2013 and 2020
Authors:
B. E. Morgado,
B. Sicardy,
F. Braga-Ribas,
J. Desmars,
A. R. Gomes-Júnior,
D. Bérard,
R. Leiva,
J. L. Ortiz,
R. Vieira-Martins,
G. Benedetti-Rossi,
P. Santos-Sanz,
J. I. B. Camargo,
R. Duffard,
F. L. Rommel,
M. Assafin,
R. C. Boufleur,
F. Colas,
M. Kretlow,
W. Beisker,
R. Sfair,
C. Snodgrass,
N. Morales,
E. Fernández-Valenzuela,
L. S. Amaral,
A. Amarante
, et al. (56 additional authors not shown)
Abstract:
The Centaur (10199) Chariklo has the first rings system discovered around a small object. It was first observed using stellar occultation in 2013. Stellar occultations allow the determination of sizes and shapes with kilometre accuracy and obtain characteristics of the occulting object and its vicinity. Using stellar occultations observed between 2017 and 2020, we aim at constraining Chariklo's an…
▽ More
The Centaur (10199) Chariklo has the first rings system discovered around a small object. It was first observed using stellar occultation in 2013. Stellar occultations allow the determination of sizes and shapes with kilometre accuracy and obtain characteristics of the occulting object and its vicinity. Using stellar occultations observed between 2017 and 2020, we aim at constraining Chariklo's and its rings physical parameters. We also determine the rings' structure, and obtain precise astrometrical positions of Chariklo. We predicted and organised several observational campaigns of stellar occultations by Chariklo. Occultation light curves were measured from the data sets, from which ingress and egress times, and rings' width and opacity were obtained. These measurements, combined with results from previous works, allow us to obtain significant constraints on Chariklo's shape and rings' structure. We characterise Chariklo's ring system (C1R and C2R), and obtain radii and pole orientations that are consistent with, but more accurate than, results from previous occultations. We confirmed the detection of W-shaped structures within C1R and an evident variation of radial width. The observed width ranges between 4.8 and 9.1 km with a mean value of 6.5 km. One dual observation (visible and red) does not reveal any differences in the C1R opacity profiles, indicating ring particle's size larger than a few microns. The C1R ring eccentricity is found to be smaller than 0.022 (3-sigma), and its width variations may indicate an eccentricity higher than 0.005. We fit a tri-axial shape to Chariklo's detections over eleven occultations and determine that Chariklo is consistent with an ellipsoid with semi-axes of 143.8, 135.2 and 99.1 km. Ultimately, we provided seven astrometric positions at a milliarcseconds accuracy level, based on Gaia EDR3, and use it to improve Chariklo's ephemeris.
△ Less
Submitted 16 July, 2021;
originally announced July 2021.
-
Zero-Delay Lossy Coding of Linear Vector Markov Sources: Optimality of Stationary Codes and Near Optimality of Finite Memory Codes
Authors:
Meysam Ghomi,
Tamas Linder,
Serdar Yuksel
Abstract:
Optimal zero-delay coding (quantization) of $\mathbb{R}^d$-valued linearly generated Markov sources is studied under quadratic distortion. The structure and existence of deterministic and stationary coding policies that are optimal for the infinite horizon average cost (distortion) problem are established. Prior results studying the optimality of zero-delay codes for Markov sources for infinite ho…
▽ More
Optimal zero-delay coding (quantization) of $\mathbb{R}^d$-valued linearly generated Markov sources is studied under quadratic distortion. The structure and existence of deterministic and stationary coding policies that are optimal for the infinite horizon average cost (distortion) problem are established. Prior results studying the optimality of zero-delay codes for Markov sources for infinite horizons either considered finite alphabet sources or, for the $\mathbb{R}^d$-valued case, only showed the existence of deterministic and non-stationary Markov coding policies or those which are randomized. In addition to existence results, for finite blocklength (horizon) $T$ the performance of an optimal coding policy is shown to approach the infinite time horizon optimum at a rate $O(\frac{1}{T})$. This gives an explicit rate of convergence that quantifies the near-optimality of finite window (finite-memory) codes among all optimal zero-delay codes.
△ Less
Submitted 13 January, 2022; v1 submitted 19 March, 2021;
originally announced March 2021.
-
An Information Bottleneck Problem with Rényi's Entropy
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
This paper considers an information bottleneck problem with the objective of obtaining a most informative representation of a hidden feature subject to a Rényi entropy complexity constraint. The optimal bottleneck trade-off between relevance (measured via Shannon's mutual information) and Rényi entropy cost is defined and an iterative algorithm for finding approximate solutions is provided. We als…
▽ More
This paper considers an information bottleneck problem with the objective of obtaining a most informative representation of a hidden feature subject to a Rényi entropy complexity constraint. The optimal bottleneck trade-off between relevance (measured via Shannon's mutual information) and Rényi entropy cost is defined and an iterative algorithm for finding approximate solutions is provided. We also derive an operational characterization for the optimal trade-off by demonstrating that the optimal Rényi entropy-relevance trade-off is achievable by a simple time-sharing scalar coding scheme and that no coding scheme can provide better performance. Two examples where the optimal Shannon entropy-relevance trade-off can be exactly determined are further given.
△ Less
Submitted 29 January, 2021;
originally announced January 2021.
-
Space Weathering within C-Complex Main Belt Asteroid Families
Authors:
Cristina A. Thomas,
David E. Trilling,
Andrew S. Rivkin,
Tyler Linder
Abstract:
Using data from the Sloan Digital Sky Survey Moving Object Catalog, we study color as a function of size for C-complex families in the Main Asteroid Belt to improve our understanding of space weathering of carbonaceous materials. We find two distinct spectral slope trends: Hygiea-type and Themis-type. The Hygiea-type families exhibit a reduction in spectral slope with increasing object size until…
▽ More
Using data from the Sloan Digital Sky Survey Moving Object Catalog, we study color as a function of size for C-complex families in the Main Asteroid Belt to improve our understanding of space weathering of carbonaceous materials. We find two distinct spectral slope trends: Hygiea-type and Themis-type. The Hygiea-type families exhibit a reduction in spectral slope with increasing object size until a minimum slope value is reached and the trend reverses with increasing slope with increasing object size. The Themis family shows an increase in spectral slope with increasing object size until a maximum slope is reached and the spectral slope begins to decrease slightly or plateaus for the largest objects. Most families studied show the Hygiea-type trend. The processes responsible for these distinct changes in spectral slope affect several different taxonomic classes within the C-complex and appear to act quickly to alter the spectral slopes of the family members.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Signaling Games for Log-Concave Distributions: Number of Bins and Properties of Equilibria
Authors:
Ertan Kazıklı,
Serkan Sarıtaş,
Sinan Gezici,
Tamás Linder,
Serdar Yüksel
Abstract:
We investigate the equilibrium behavior for the decentralized cheap talk problem for real random variables and quadratic cost criteria in which an encoder and a decoder have misaligned objective functions. In prior work, it has been shown that the number of bins in any equilibrium has to be countable, generalizing a classical result due to Crawford and Sobel who considered sources with density sup…
▽ More
We investigate the equilibrium behavior for the decentralized cheap talk problem for real random variables and quadratic cost criteria in which an encoder and a decoder have misaligned objective functions. In prior work, it has been shown that the number of bins in any equilibrium has to be countable, generalizing a classical result due to Crawford and Sobel who considered sources with density supported on $[0,1]$. In this paper, we first refine this result in the context of log-concave sources. For sources with two-sided unbounded support, we prove that, for any finite number of bins, there exists a unique equilibrium. In contrast, for sources with semi-unbounded support, there may be a finite upper bound on the number of bins in equilibrium depending on certain conditions stated explicitly. Moreover, we prove that for log-concave sources, the expected costs of the encoder and the decoder in equilibrium decrease as the number of bins increases. Furthermore, for strictly log-concave sources with two-sided unbounded support, we prove convergence to the unique equilibrium under best response dynamics which starts with a given number of bins, making a connection with the classical theory of optimal quantization and convergence results of Lloyd's method. In addition, we consider more general sources which satisfy certain assumptions on the tail(s) of the distribution and we show that there exist equilibria with infinitely many bins for sources with two-sided unbounded support. Further explicit characterizations are provided for sources with exponential, Gaussian, and compactly-supported probability distributions.
△ Less
Submitted 14 November, 2021; v1 submitted 15 December, 2020;
originally announced December 2020.
-
On the lack of monotonicity of Newton-Hewer updates for Riccati equations
Authors:
Mohammad Akbari,
Bahman Gharesifard,
Tamas Linder
Abstract:
We provide a set of counterexamples for the monotonicity of the Newton-Hewer method for solving the discrete-time algebraic Riccati equation in dynamic settings, drawing a contrast with the Riccati difference equation.
We provide a set of counterexamples for the monotonicity of the Newton-Hewer method for solving the discrete-time algebraic Riccati equation in dynamic settings, drawing a contrast with the Riccati difference equation.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
MeTRAbs: Metric-Scale Truncation-Robust Heatmaps for Absolute 3D Human Pose Estimation
Authors:
István Sárándi,
Timm Linder,
Kai O. Arras,
Bastian Leibe
Abstract:
Heatmap representations have formed the basis of human pose estimation systems for many years, and their extension to 3D has been a fruitful line of recent research. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and Z to metric depth around the subject. To obtain metric-scale predictions, 2.5D methods need a separate post-processing step to resolve scale ambi…
▽ More
Heatmap representations have formed the basis of human pose estimation systems for many years, and their extension to 3D has been a fruitful line of recent research. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and Z to metric depth around the subject. To obtain metric-scale predictions, 2.5D methods need a separate post-processing step to resolve scale ambiguity. Further, they cannot localize body joints outside the image boundaries, leading to incomplete estimates for truncated images. To address these limitations, we propose metric-scale truncation-robust (MeTRo) volumetric heatmaps, whose dimensions are all defined in metric 3D space, instead of being aligned with image space. This reinterpretation of heatmap dimensions allows us to directly estimate complete, metric-scale poses without test-time knowledge of distance or relying on anthropometric heuristics, such as bone lengths. To further demonstrate the utility our representation, we present a differentiable combination of our 3D metric-scale heatmaps with 2D image-space ones to estimate absolute 3D pose (our MeTRAbs architecture). We find that supervision via absolute pose loss is crucial for accurate non-root-relative localization. Using a ResNet-50 backbone without further learned layers, we obtain state-of-the-art results on Human3.6M, MPI-INF-3DHP and MuPoTS-3D. Our code will be made publicly available to facilitate further research.
△ Less
Submitted 14 November, 2020; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Two-Way Source-Channel Coding
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
We propose an adaptive lossy joint source-channel coding (JSCC) scheme for sending correlated sources over two-terminal discrete-memoryless two-way channels (DM-TWCs). The main idea is to couple the independent operations of the terminals via an adaptive coding mechanism, which can mitigate cross-interference resulting from simultaneous channel transmissions and concurrently exploit the sources' c…
▽ More
We propose an adaptive lossy joint source-channel coding (JSCC) scheme for sending correlated sources over two-terminal discrete-memoryless two-way channels (DM-TWCs). The main idea is to couple the independent operations of the terminals via an adaptive coding mechanism, which can mitigate cross-interference resulting from simultaneous channel transmissions and concurrently exploit the sources' correlation to reduce the end-to-end reconstruction distortions. Our adaptive JSCC scheme not only subsumes existing lossy coding methods for two-way simultaneous communication but also improves their performance. Furthermore, we derive outer bounds for our two-way lossy transmission problem and establish complete JSCC theorems in some special settings. In these special cases, a non-adaptive separate source-channel coding (SSCC) scheme achieves the optimal performance, thus simplifying the design of the source-channel communication system.
△ Less
Submitted 26 June, 2020;
originally announced June 2020.
-
A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
Channel symmetry properties that imply the tightness of Shannon's random coding inner bound have recently been used to determine the capacity region of discrete-memoryless two-way channels (DM-TWCs). For channels without such symmetry properties, outer bounds are often needed to estimate the capacity region. However, validating symmetry conditions and/or evaluating non-trivial outer bounds are com…
▽ More
Channel symmetry properties that imply the tightness of Shannon's random coding inner bound have recently been used to determine the capacity region of discrete-memoryless two-way channels (DM-TWCs). For channels without such symmetry properties, outer bounds are often needed to estimate the capacity region. However, validating symmetry conditions and/or evaluating non-trivial outer bounds are computationally demanding, especially for channels with large input and output alphabets. In this paper, three easy-to-check conditions that identify DM-TWCs with no such symmetry properties as well as an easy-to-compute outer bound are derived. The bound is obtained from Shannon's inner bound computation but is non-trivial. Using this outer bound, approximate capacity results can be established for certain DM-TWCs. The results are illustrated by two examples.
△ Less
Submitted 24 September, 2020; v1 submitted 8 April, 2020;
originally announced April 2020.
-
Metric-Scale Truncation-Robust Heatmaps for 3D Human Pose Estimation
Authors:
István Sárándi,
Timm Linder,
Kai O. Arras,
Bastian Leibe
Abstract:
Heatmap representations have formed the basis of 2D human pose estimation systems for many years, but their generalizations for 3D pose have only recently been considered. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and the Z axis to metric depth around the subject. To obtain metric-scale predictions, these methods must include a separate, explicit post-pro…
▽ More
Heatmap representations have formed the basis of 2D human pose estimation systems for many years, but their generalizations for 3D pose have only recently been considered. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and the Z axis to metric depth around the subject. To obtain metric-scale predictions, these methods must include a separate, explicit post-processing step to resolve scale ambiguity. Further, they cannot encode body joint positions outside of the image boundaries, leading to incomplete pose estimates in case of image truncation. We address these limitations by proposing metric-scale truncation-robust (MeTRo) volumetric heatmaps, whose dimensions are defined in metric 3D space near the subject, instead of being aligned with image space. We train a fully-convolutional network to estimate such heatmaps from monocular RGB in an end-to-end manner. This reinterpretation of the heatmap dimensions allows us to estimate complete metric-scale poses without test-time knowledge of the focal length or person distance and without relying on anthropometric heuristics in post-processing. Furthermore, as the image space is decoupled from the heatmap space, the network can learn to reason about joints beyond the image boundary. Using ResNet-50 without any additional learned layers, we obtain state-of-the-art results on the Human3.6M and MPI-INF-3DHP benchmarks. As our method is simple and fast, it can become a useful component for real-time top-down multi-person pose estimation systems. We make our code publicly available to facilitate further research (see https://vision.rwth-aachen.de/metro-pose3d).
△ Less
Submitted 5 March, 2020;
originally announced March 2020.
-
Adaptive Coding for Two-Way Lossy Source-Channel Communication
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
An adaptive joint source-channel coding (JSCC) scheme is presented for transmitting correlated sources over discrete-memoryless two-way channels subject to distortion constraints. The proposed JSCC scheme makes use of the previously transmitted and received channel signals as well as the sources' correlation to facilitate coordination between terminals. It is shown that the adaptive scheme strictl…
▽ More
An adaptive joint source-channel coding (JSCC) scheme is presented for transmitting correlated sources over discrete-memoryless two-way channels subject to distortion constraints. The proposed JSCC scheme makes use of the previously transmitted and received channel signals as well as the sources' correlation to facilitate coordination between terminals. It is shown that the adaptive scheme strictly subsumes prior lossy coding methods for two-way simultaneous transmission and yields a new adaptive separate source-channel coding result. Two examples are given to show the scheme's advantages.
△ Less
Submitted 12 August, 2020; v1 submitted 8 January, 2020;
originally announced January 2020.
-
An Iterative Riccati Algorithm for Online Linear Quadratic Control
Authors:
Mohammad Akbari,
Bahman Gharesifard,
Tamas Linder
Abstract:
An online policy learning problem of linear control systems is studied. In this problem, the control system is known and linear, and a sequence of quadratic cost functions is revealed to the controller in hindsight, and the controller updates its policy to achieve a sublinear regret, similar to online optimization. A modified online Riccati algorithm is introduced that under some boundedness assum…
▽ More
An online policy learning problem of linear control systems is studied. In this problem, the control system is known and linear, and a sequence of quadratic cost functions is revealed to the controller in hindsight, and the controller updates its policy to achieve a sublinear regret, similar to online optimization. A modified online Riccati algorithm is introduced that under some boundedness assumption leads to logarithmic regret bound. In particular, the logarithmic regret for the scalar case is achieved without boundedness assumption. Our algorithm, while achieving a better regret bound, also has reduced complexity compared to earlier algorithms which rely on solving semi-definite programs at each stage.
△ Less
Submitted 25 January, 2021; v1 submitted 19 December, 2019;
originally announced December 2019.
-
Physical Characterization of Active Asteroid (6478) Gault
Authors:
Juan A. Sanchez,
Vishnu Reddy,
Audrey Thirouin,
Edward L. Wright,
Tyler R. Linder,
Theodore Kareta,
Benjamin Sharkey
Abstract:
Main belt asteroid (6478) Gault has been dynamically linked with two overlapping asteroid families: Phocaea, dominated by S-type asteroids, and Tamara, dominated by low-albedo C-types. This object has recently become an interesting case for study, after images obtained in late 2018 revealed that it was active and displaying a comet-like tail. Previous authors have proposed that the most likely sce…
▽ More
Main belt asteroid (6478) Gault has been dynamically linked with two overlapping asteroid families: Phocaea, dominated by S-type asteroids, and Tamara, dominated by low-albedo C-types. This object has recently become an interesting case for study, after images obtained in late 2018 revealed that it was active and displaying a comet-like tail. Previous authors have proposed that the most likely scenarios to explain the observed activity on Gault were rotational excitation or merger of near-contact binaries. Here we use new photometric and spectroscopic data of Gault to determine its physical and compositional properties. Lightcurves derived from the photometric data showed little variation over three nights of observations, which prevented us from determining the rotation period of the asteroid. Using WISE observations of Gault and the near-Earth Asteroid Thermal Model (NEATM) we determined that this asteroid has a diameter $<$6 km. NIR spectroscopic data obtained with the Infrared Telescope Facility (IRTF) showed a spectrum similar to that of S-complex asteroids, and a surface composition consistent with H chondrite meteorites. These results favor a compositional affinity between Gault and asteroid (25) Phocaea, and rules out a compositional link with the Tamara family. From the spectroscopic data we found no evidence of fresh material that could have been exposed during the outburst episodes.
△ Less
Submitted 15 July, 2019;
originally announced July 2019.
-
Capacity of Generalized Discrete-Memoryless Push-to-Talk Two-Way Channels
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
In this report, we generalize Shannon's push-to-talk two-way channel (PTT-TWC) by allowing reliable full-duplex transmission as well as noisy reception in the half-duplex (PTT) mode. Viewing a PTT-TWC as two state-dependent one-way channels, we introduce a channel symmetry property pertaining to the one-way channels. Shannon's TWC capacity inner bound is shown to be tight for the generalized model…
▽ More
In this report, we generalize Shannon's push-to-talk two-way channel (PTT-TWC) by allowing reliable full-duplex transmission as well as noisy reception in the half-duplex (PTT) mode. Viewing a PTT-TWC as two state-dependent one-way channels, we introduce a channel symmetry property pertaining to the one-way channels. Shannon's TWC capacity inner bound is shown to be tight for the generalized model under this symmetry property. We also analytically derive the capacity region, which is shown to be the convex hull of (at most) 4 rate pairs. Examples that illustrate different shapes of the capacity region are given, and efficient transmission schemes are discussed via the examples.
△ Less
Submitted 28 January, 2021; v1 submitted 2 April, 2019;
originally announced April 2019.
-
On the Number of Bins in Equilibria for Signaling Games
Authors:
Serkan Sarıtaş,
Philippe Furrer,
Sinan Gezici,
Tamás Linder,
Serdar Yüksel
Abstract:
We investigate the equilibrium behavior for the decentralized quadratic cheap talk problem in which an encoder and a decoder, viewed as two decision makers, have misaligned objective functions. In prior work, we have shown that the number of bins under any equilibrium has to be at most countable, generalizing a classical result due to Crawford and Sobel who considered sources with density supporte…
▽ More
We investigate the equilibrium behavior for the decentralized quadratic cheap talk problem in which an encoder and a decoder, viewed as two decision makers, have misaligned objective functions. In prior work, we have shown that the number of bins under any equilibrium has to be at most countable, generalizing a classical result due to Crawford and Sobel who considered sources with density supported on $[0,1]$. In this paper, we refine this result in the context of exponential and Gaussian sources. For exponential sources, a relation between the upper bound on the number of bins and the misalignment in the objective functions is derived, the equilibrium costs are compared, and it is shown that there also exist equilibria with infinitely many bins under certain parametric assumptions. For Gaussian sources, it is shown that there exist equilibria with infinitely many bins.
△ Less
Submitted 23 January, 2019; v1 submitted 20 January, 2019;
originally announced January 2019.
-
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
A joint source-channel coding (JSCC) scheme based on hybrid digital/analog coding is proposed for the transmission of correlated sources over discrete-memoryless two-way channels (DM-TWCs). The scheme utilizes the correlation between the sources in generating channel inputs, thus enabling the users to coordinate their transmission to combat channel noise. The hybrid scheme also subsumes prior codi…
▽ More
A joint source-channel coding (JSCC) scheme based on hybrid digital/analog coding is proposed for the transmission of correlated sources over discrete-memoryless two-way channels (DM-TWCs). The scheme utilizes the correlation between the sources in generating channel inputs, thus enabling the users to coordinate their transmission to combat channel noise. The hybrid scheme also subsumes prior coding methods such as rate-one separate source-channel coding and uncoded schemes for two-way lossy transmission, as well as the correlation-preserving coding scheme for (almost) lossless transmission. Moreover, we derive a distortion outer bound for the source-channel system using a genie-aided argument. A complete JSSC theorem for a class of correlated sources and DM-TWCs whose capacity region cannot be enlarged via interactive adaptive coding is also established. Examples that illustrate the theorem are given.
△ Less
Submitted 12 August, 2020; v1 submitted 6 January, 2019;
originally announced January 2019.
-
Synthetic Occlusion Augmentation with Volumetric Heatmaps for the 2018 ECCV PoseTrack Challenge on 3D Human Pose Estimation
Authors:
István Sárándi,
Timm Linder,
Kai O. Arras,
Bastian Leibe
Abstract:
In this paper we present our winning entry at the 2018 ECCV PoseTrack Challenge on 3D human pose estimation. Using a fully-convolutional backbone architecture, we obtain volumetric heatmaps per body joint, which we convert to coordinates using soft-argmax. Absolute person center depth is estimated by a 1D heatmap prediction head. The coordinates are back-projected to 3D camera space, where we mini…
▽ More
In this paper we present our winning entry at the 2018 ECCV PoseTrack Challenge on 3D human pose estimation. Using a fully-convolutional backbone architecture, we obtain volumetric heatmaps per body joint, which we convert to coordinates using soft-argmax. Absolute person center depth is estimated by a 1D heatmap prediction head. The coordinates are back-projected to 3D camera space, where we minimize the L1 loss. Key to our good results is the training data augmentation with randomly placed occluders from the Pascal VOC dataset. In addition to reaching first place in the Challenge, our method also surpasses the state-of-the-art on the full Human3.6M benchmark among methods that use no additional pose datasets in training. Code for applying synthetic occlusions is availabe at https://github.com/isarandi/synthetic-occlusion.
△ Less
Submitted 6 November, 2018; v1 submitted 13 September, 2018;
originally announced September 2018.
-
How Robust is 3D Human Pose Estimation to Occlusion?
Authors:
István Sárándi,
Timm Linder,
Kai O. Arras,
Bastian Leibe
Abstract:
Occlusion is commonplace in realistic human-robot shared environments, yet its effects are not considered in standard 3D human pose estimation benchmarks. This leaves the question open: how robust are state-of-the-art 3D pose estimation methods against partial occlusions? We study several types of synthetic occlusions over the Human3.6M dataset and find a method with state-of-the-art benchmark per…
▽ More
Occlusion is commonplace in realistic human-robot shared environments, yet its effects are not considered in standard 3D human pose estimation benchmarks. This leaves the question open: how robust are state-of-the-art 3D pose estimation methods against partial occlusions? We study several types of synthetic occlusions over the Human3.6M dataset and find a method with state-of-the-art benchmark performance to be sensitive even to low amounts of occlusion. Addressing this issue is key to progress in applications such as collaborative and service robotics. We take a first step in this direction by improving occlusion-robustness through training data augmentation with synthetic occlusions. This also turns out to be an effective regularizer that is beneficial even for non-occluded test cases.
△ Less
Submitted 29 August, 2018; v1 submitted 28 August, 2018;
originally announced August 2018.
-
Capacity of Two-Way Channels with Symmetry Properties
Authors:
Jian-Jia Weng,
Lin Song,
Fady Alajaji,
Tamás Linder
Abstract:
In this paper, we make use of channel symmetry properties to determine the capacity region of three types of two-way networks: (a) two-user memoryless two-way channels (TWCs), (b) two-user TWCs with memory, and (c) three-user multiaccess/degraded broadcast (MA/DB) TWCs. For each network, symmetry conditions under which a Shannon-type random coding inner bound (under independent non-adaptive inputs…
▽ More
In this paper, we make use of channel symmetry properties to determine the capacity region of three types of two-way networks: (a) two-user memoryless two-way channels (TWCs), (b) two-user TWCs with memory, and (c) three-user multiaccess/degraded broadcast (MA/DB) TWCs. For each network, symmetry conditions under which a Shannon-type random coding inner bound (under independent non-adaptive inputs) is tight are given. For two-user memoryless TWCs, prior results are substantially generalized by viewing a TWC as two interacting state-dependent one-way channels. The capacity of symmetric TWCs with memory, whose outputs are functions of the inputs and independent stationary and ergodic noise processes, is also obtained. Moreover, various channel symmetry properties under which the Shannon-type inner bound is tight are identified for three-user MA/DB TWCs. The results not only enlarge the class of symmetric TWCs whose capacity region can be exactly determined but also imply that interactive adaptive coding, not improving capacity, is unnecessary for such channels.
△ Less
Submitted 30 September, 2019; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Lossy Transmission of Correlated Sources over Two-Way Channels
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
Achievability and converse results for the lossy transmission of correlated sources over Shannon's two-way channels (TWCs) are presented. A joint source-channel coding theorem for independent sources and TWCs for which adaptation cannot enlarge the capacity region is also established. We further investigate the optimality of scalar coding for TWCs with discrete modulo additive noise as well as add…
▽ More
Achievability and converse results for the lossy transmission of correlated sources over Shannon's two-way channels (TWCs) are presented. A joint source-channel coding theorem for independent sources and TWCs for which adaptation cannot enlarge the capacity region is also established. We further investigate the optimality of scalar coding for TWCs with discrete modulo additive noise as well as additive white Gaussian noise. Comparing the distortion of scalar coding with the derived bounds, we observe that scalar coding achieves the minimum distortion over both families of TWCs for independent and uniformly distributed sources and independent Gaussian sources.
△ Less
Submitted 4 May, 2018;
originally announced May 2018.
-
Deep Person Detection in 2D Range Data
Authors:
Lucas Beyer,
Alexander Hermans,
Timm Linder,
Kai O. Arras,
Bastian Leibe
Abstract:
Detecting humans is a key skill for mobile robots and intelligent vehicles in a large variety of applications. While the problem is well studied for certain sensory modalities such as image data, few works exist that address this detection task using 2D range data. However, a widespread sensory setup for many mobile robots in service and domestic applications contains a horizontally mounted 2D las…
▽ More
Detecting humans is a key skill for mobile robots and intelligent vehicles in a large variety of applications. While the problem is well studied for certain sensory modalities such as image data, few works exist that address this detection task using 2D range data. However, a widespread sensory setup for many mobile robots in service and domestic applications contains a horizontally mounted 2D laser scanner. Detecting people from 2D range data is challenging due to the speed and dynamics of human leg motion and the high levels of occlusion and self-occlusion particularly in crowds of people. While previous approaches mostly relied on handcrafted features, we recently developed the deep learning based wheelchair and walker detector DROW. In this paper, we show the generalization to people, including small modifications that significantly boost DROW's performance. Additionally, by providing a small, fully online temporal window in our network, we further boost our score. We extend the DROW dataset with person annotations, making this the largest dataset of person annotations in 2D range data, recorded during several days in a real-world environment with high diversity. Extensive experiments with three current baseline methods indicate it is a challenging dataset, on which our improved DROW detector beats the current state-of-the-art.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
On the Noise-Information Separation of a Private Principal Component Analysis Scheme
Authors:
Mario Diaz,
Shahab Asoodeh,
Fady Alajaji,
Tamás Linder,
Serban Belinschi,
James Mingo
Abstract:
In a survey disclosure model, we consider an additive noise privacy mechanism and study the trade-off between privacy guarantees and statistical utility. Privacy is approached from two different but complementary viewpoints: information and estimation theoretic. Motivated by the performance of principal component analysis, statistical utility is measured via the spectral gap of a certain covarianc…
▽ More
In a survey disclosure model, we consider an additive noise privacy mechanism and study the trade-off between privacy guarantees and statistical utility. Privacy is approached from two different but complementary viewpoints: information and estimation theoretic. Motivated by the performance of principal component analysis, statistical utility is measured via the spectral gap of a certain covariance matrix. This formulation and its motivation rely on classical results from random matrix theory. We prove some properties of this statistical utility function and discuss a simple numerical method to evaluate it.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
Sufficient Conditions for the Tightness of Shannon's Capacity Bounds for Two-Way Channels
Authors:
Jian-Jia Weng,
Lin Song,
Fady Alajaji,
Tamás Linder
Abstract:
New sufficient conditions for determining in closed form the capacity region of point-to-point memoryless two-way channels (TWCs) are derived. The proposed conditions not only relax Shannon's condition which can identify only TWCs with a certain symmetry property but also generalize other existing results. Examples are given to demonstrate the advantages of the proposed conditions.
New sufficient conditions for determining in closed form the capacity region of point-to-point memoryless two-way channels (TWCs) are derived. The proposed conditions not only relax Shannon's condition which can identify only TWCs with a certain symmetry property but also generalize other existing results. Examples are given to demonstrate the advantages of the proposed conditions.
△ Less
Submitted 4 May, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
New Pulse Timing Measurements of the sdBV Star CS 1246
Authors:
Zackary L. Hutchens,
Brad N. Barlow,
Alan Vasquez Soto,
Dan E. Reichart,
Josh B. Haislip,
Vladimir V. Kouprianov,
Tyler R. Linder,
Justin P. Moore
Abstract:
CS 1246 is a hot subdwarf B star discovered in 2009 to exhibit a single, large-amplitude radial pulsation. An O-C diagram constructed from this mode revealed reflex motion due to the presence of a low-mass M dwarf, as well as a long-term trend consistent with a decrease in the pulsational period. The orbital reflex motion was later confirmed with radial velocity measurements. Using eight years of…
▽ More
CS 1246 is a hot subdwarf B star discovered in 2009 to exhibit a single, large-amplitude radial pulsation. An O-C diagram constructed from this mode revealed reflex motion due to the presence of a low-mass M dwarf, as well as a long-term trend consistent with a decrease in the pulsational period. The orbital reflex motion was later confirmed with radial velocity measurements. Using eight years of data collected with the Skynet Robotic Telescope Network, we show that the pulsation amplitude of CS 1246 is decaying nonlinearly. We also present an updated O-C diagram, which might now indicate a positive $\dot P$ and a new $2.09 \pm 0.05$ yr oscillation consistent with orbital reflex motion of the entire inner sdB+dM binary, possibly due to the gravitational influence of a circumbinary planet with minimum mass $m\sin i = 3.3 \, \pm \, ^{2.1}_{1.2}$ $M_{\rm Jup}$. However, unlike the presence of the M dwarf, we hesitate to claim this object as a definitive detection since intrinsic variability of the pulsation phase could theoretically produce a similar effect.
△ Less
Submitted 6 December, 2017;
originally announced December 2017.
-
Finite Model Approximations for Partially Observed Markov Decision Processes with Discounted Cost
Authors:
Naci Saldi,
Serdar Yüksel,
Tamás Linder
Abstract:
We consider finite model approximations of discrete-time partially observed Markov decision processes (POMDPs) under the discounted cost criterion. After converting the original partially observed stochastic control problem to a fully observed one on the belief space, the finite models are obtained through the uniform quantization of the state and action spaces of the belief space Markov decision…
▽ More
We consider finite model approximations of discrete-time partially observed Markov decision processes (POMDPs) under the discounted cost criterion. After converting the original partially observed stochastic control problem to a fully observed one on the belief space, the finite models are obtained through the uniform quantization of the state and action spaces of the belief space Markov decision process (MDP). Under mild assumptions on the components of the original model, it is established that the policies obtained from these finite models are nearly optimal for the belief space MDP, and so, for the original partially observed problem. The assumptions essentially require that the belief space MDP satisfies a mild weak continuity condition. We provide examples and introduce explicit approximation procedures for the quantization of the set of probability measures on the state space of POMDP (i.e., belief space).
△ Less
Submitted 19 October, 2017;
originally announced October 2017.
-
Push-sum on random graphs
Authors:
Pouya Rezaeinia,
Bahman Gharesifard,
Tamas Linder,
Behrouz Touri
Abstract:
In this paper, we study the problem of achieving average consensus over a random time-varying sequence of directed graphs by extending the class of so-called push-sum algorithms to such random scenarios. Provided that an ergodicity notion, which we term the directed infinite flow property, holds and the auxiliary states of agents are uniformly bounded away from zero infinitely often, we prove the…
▽ More
In this paper, we study the problem of achieving average consensus over a random time-varying sequence of directed graphs by extending the class of so-called push-sum algorithms to such random scenarios. Provided that an ergodicity notion, which we term the directed infinite flow property, holds and the auxiliary states of agents are uniformly bounded away from zero infinitely often, we prove the almost sure convergence of the evolutions of this class of algorithms to the average of initial states. Moreover, for a random sequence of graphs generated using a time-varying B-irreducible probability matrix, we establish convergence rates for the proposed push-sum algorithm.
△ Less
Submitted 3 August, 2017; v1 submitted 2 August, 2017;
originally announced August 2017.
-
A search for rapidly pulsating hot subdwarf stars in the GALEX survey
Authors:
Emily M. Boudreaux,
Brad N. Barlow,
Scott W. Fleming,
Alan Vasquez Soto,
Chase Million,
Dan E. Reichart,
Josh B. Haislip,
Tyler R. Linder,
Justin P. Moore
Abstract:
NASA's Galaxy Evolution Explorer (GALEX) provided near- and far-UV observations for approximately 77 percent of the sky over a ten-year period; however, the data reduction pipeline initially only released single NUV and FUV images to the community. The recently released Python module gPhoton changes this, allowing calibrated time-series aperture photometry to be extracted easily from the raw GAL…
▽ More
NASA's Galaxy Evolution Explorer (GALEX) provided near- and far-UV observations for approximately 77 percent of the sky over a ten-year period; however, the data reduction pipeline initially only released single NUV and FUV images to the community. The recently released Python module gPhoton changes this, allowing calibrated time-series aperture photometry to be extracted easily from the raw GALEX data set. Here we use gPhoton to generate light curves for all hot subdwarf B (sdB) stars that were observed by GALEX, with the intention of identifying short-period, p-mode pulsations. We find that the spacecraft's short visit durations, uneven gaps between visits, and dither pattern make the detection of hot subdwarf pulsations difficult. Nonetheless, we detect UV variations in four previously known pulsating targets and report their UV pulsation amplitudes and frequencies. Additionally, we find that several other sdB targets not previously known to vary show promising signals in their periodograms. Using optical follow-up photometry with the Skynet Robotic Telescope Network, we confirm p-mode pulsations in one of these targets, LAMOST J082517.99+113106.3, and report it as the most recent addition to the sdBVr class of variable stars.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
Optimized Signaling of Binary Correlated Sources over GMACs
Authors:
Jian-Jia Weng,
Fady Alajaji,
Tamás Linder
Abstract:
This work focuses on the construction of optimized binary signaling schemes for two-sender uncoded transmission of correlated sources over non-orthogonal Gaussian multiple access channels. Specifically, signal constellations with binary pulse-amplitude-modulation are designed for two senders to optimize the overall system performance. Although the two senders transmit their own messages independen…
▽ More
This work focuses on the construction of optimized binary signaling schemes for two-sender uncoded transmission of correlated sources over non-orthogonal Gaussian multiple access channels. Specifically, signal constellations with binary pulse-amplitude-modulation are designed for two senders to optimize the overall system performance. Although the two senders transmit their own messages independently, it is observed that the correlation between message sources can be exploited to mitigate the interference present in the non-orthogonal multiple access channel. Based on a performance analysis under joint maximum-a-posteriori decoding, optimized constellations for various basic waveform correlations between the senders are derived. Numerical results further confirm the effectiveness of the proposed design.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
Estimation Efficiency Under Privacy Constraints
Authors:
Shahab Asoodeh,
Mario Diaz,
Fady Alajaji,
Tamas Linder
Abstract:
We investigate the problem of estimating a random variable $Y\in \mathcal{Y}$ under a privacy constraint dictated by another random variable $X\in \mathcal{X}$, where estimation efficiency and privacy are assessed in terms of two different loss functions. In the discrete case, we use the Hamming loss function and express the corresponding utility-privacy tradeoff in terms of the privacy-constraine…
▽ More
We investigate the problem of estimating a random variable $Y\in \mathcal{Y}$ under a privacy constraint dictated by another random variable $X\in \mathcal{X}$, where estimation efficiency and privacy are assessed in terms of two different loss functions. In the discrete case, we use the Hamming loss function and express the corresponding utility-privacy tradeoff in terms of the privacy-constrained guessing probability $h(P_{XY}, ε)$, the maximum probability $\mathsf{P}_\mathsf{c}(Y|Z)$ of correctly guessing $Y$ given an auxiliary random variable $Z\in \mathcal{Z}$, where the maximization is taken over all $P_{Z|Y}$ ensuring that $\mathsf{P}_\mathsf{c}(X|Z)\leq ε$ for a given privacy threshold $ε\geq 0$. We prove that $h(P_{XY}, \cdot)$ is concave and piecewise linear, which allows us to derive its expression in closed form for any $ε$ when $X$ and $Y$ are binary. In the non-binary case, we derive $h(P_{XY}, ε)$ in the high utility regime (i.e., for sufficiently large values of $ε$) under the assumption that $Z$ takes values in $\mathcal{Y}$. We also analyze the privacy-constrained guessing probability for two binary vector scenarios. When $X$ and $Y$ are continuous random variables, we use the squared-error loss function and express the corresponding utility-privacy tradeoff in terms of $\mathsf{sENSR}(P_{XY}, ε)$, which is the smallest normalized minimum mean squared-error (mmse) incurred in estimating $Y$ from its Gaussian perturbation $Z$, such that the mmse of $f(X)$ given $Z$ is within $ε$ of the variance of $f(X)$ for any non-constant real-valued function $f$. We derive tight upper and lower bounds for $\mathsf{sENSR}$ when $Y$ is Gaussian. We also obtain a tight lower bound for $\mathsf{sENSR}(P_{XY}, ε)$ for general absolutely continuous random variables when $ε$ is sufficiently small.
△ Less
Submitted 13 August, 2018; v1 submitted 8 July, 2017;
originally announced July 2017.
-
Capacity of Burst Noise-Erasure Channels With and Without Feedback and Input Cost
Authors:
Lin Song,
Fady Alajaji,
Tamás Linder
Abstract:
A class of burst noise-erasure channels which incorporate both errors and erasures during transmission is studied. The channel, whose output is explicitly expressed in terms of its input and a stationary ergodic noise-erasure process, is shown to have a so-called "quasi-symmetry" property under certain invertibility conditions. As a result, it is proved that a uniformly distributed input process m…
▽ More
A class of burst noise-erasure channels which incorporate both errors and erasures during transmission is studied. The channel, whose output is explicitly expressed in terms of its input and a stationary ergodic noise-erasure process, is shown to have a so-called "quasi-symmetry" property under certain invertibility conditions. As a result, it is proved that a uniformly distributed input process maximizes the channel's block mutual information, resulting in a closed-form formula for its non-feedback capacity in terms of the noise-erasure entropy rate and the entropy rate of an auxiliary erasure process. The feedback channel capacity is also characterized, showing that feedback does not increase capacity and generalizing prior related results. The capacity-cost function of the channel with and without feedback is also investigated. A sequence of finite-letter upper bounds for the capacity-cost function without feedback is derived. Finite-letter lower bonds for the capacity-cost function with feedback are obtained using a specific encoding rule. Based on these bounds, it is demonstrated both numerically and analytically that feedback can increase the capacity-cost function for a class of channels with Markov noise-erasure processes.
△ Less
Submitted 3 May, 2017;
originally announced May 2017.
-
Privacy-Aware Guessing Efficiency
Authors:
Shahab Asoodeh,
Mario Diaz,
Fady Alajaji,
Tamás Linder
Abstract:
We investigate the problem of guessing a discrete random variable $Y$ under a privacy constraint dictated by another correlated discrete random variable $X$, where both guessing efficiency and privacy are assessed in terms of the probability of correct guessing. We define $h(P_{XY}, ε)$ as the maximum probability of correctly guessing $Y$ given an auxiliary random variable $Z$, where the maximizat…
▽ More
We investigate the problem of guessing a discrete random variable $Y$ under a privacy constraint dictated by another correlated discrete random variable $X$, where both guessing efficiency and privacy are assessed in terms of the probability of correct guessing. We define $h(P_{XY}, ε)$ as the maximum probability of correctly guessing $Y$ given an auxiliary random variable $Z$, where the maximization is taken over all $P_{Z|Y}$ ensuring that the probability of correctly guessing $X$ given $Z$ does not exceed $ε$. We show that the map $ε\mapsto h(P_{XY}, ε)$ is strictly increasing, concave, and piecewise linear, which allows us to derive a closed form expression for $h(P_{XY}, ε)$ when $X$ and $Y$ are connected via a binary-input binary-output channel. For $(X^n, Y^n)$ being pairs of independent and identically distributed binary random vectors, we similarly define $\underline{h}_n(P_{X^nY^n}, ε)$ under the assumption that $Z^n$ is also a binary vector. Then we obtain a closed form expression for $\underline{h}_n(P_{X^nY^n}, ε)$ for sufficiently large, but nontrivial values of $ε$.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
Almost Perfect Privacy for Additive Gaussian Privacy Filters
Authors:
Shahab Asoodeh,
Fady Alajaji,
Tamas Linder
Abstract:
We study the maximal mutual information about a random variable $Y$ (representing non-private information) displayed through an additive Gaussian channel when guaranteeing that only $ε$ bits of information is leaked about a random variable $X$ (representing private information) that is correlated with $Y$. Denoting this quantity by $g_ε(X,Y)$, we show that for perfect privacy, i.e., $ε=0$, one has…
▽ More
We study the maximal mutual information about a random variable $Y$ (representing non-private information) displayed through an additive Gaussian channel when guaranteeing that only $ε$ bits of information is leaked about a random variable $X$ (representing private information) that is correlated with $Y$. Denoting this quantity by $g_ε(X,Y)$, we show that for perfect privacy, i.e., $ε=0$, one has $g_0(X,Y)=0$ for any pair of absolutely continuous random variables $(X,Y)$ and then derive a second-order approximation for $g_ε(X,Y)$ for small $ε$. This approximation is shown to be related to the strong data processing inequality for mutual information under suitable conditions on the joint distribution $P_{XY}$. Next, motivated by an operational interpretation of data privacy, we formulate the privacy-utility tradeoff in the same setup using estimation-theoretic quantities and obtain explicit bounds for this tradeoff when $ε$ is sufficiently small using the approximation formula derived for $g_ε(X,Y)$.
△ Less
Submitted 13 August, 2016;
originally announced August 2016.
-
Optimal Zero Delay Coding of Markov Sources: Stationary and Finite Memory Codes
Authors:
Richard G. Wood,
Tamás Linder,
Serdar Yüksel
Abstract:
The optimal zero delay coding of a finite state Markov source is considered. The existence and structure of optimal codes are studied using a stochastic control formulation. Prior results in the literature established the optimality of deterministic Markov (Walrand-Varaiya type) coding policies for finite time horizon problem, and the optimality of both deterministic nonstationary and randomized s…
▽ More
The optimal zero delay coding of a finite state Markov source is considered. The existence and structure of optimal codes are studied using a stochastic control formulation. Prior results in the literature established the optimality of deterministic Markov (Walrand-Varaiya type) coding policies for finite time horizon problem, and the optimality of both deterministic nonstationary and randomized stationary policies for the infinite time horizon problem. Our main result here shows that for any irreducible and aperiodic Markov source with a finite alphabet, \emph{deterministic and stationary} Markov coding policies are optimal for the infinite horizon problem. In addition, the finite blocklength (time horizon) performance on an optimal (stationary and Markov) coding policy is shown to approach the infinite time horizon optimum at a rate $O(1/T)$. The results are extended to systems where zero delay communication takes place across a noisy channel with noiseless feedback.
△ Less
Submitted 5 April, 2017; v1 submitted 29 June, 2016;
originally announced June 2016.
-
Adaptation is Useless for Two Discrete Additive-Noise Two-Way Channels
Authors:
Lin Song,
Fady Alajaji,
Tamas Linder
Abstract:
In two-way channels, each user transmits and receives at the same time. This allows each encoder to interactively adapt the current input to its own message and all previously received signals. Such coding approach can introduce correlation between inputs of different users, since all the users' outputs are correlated by the nature of the channel. However, for some channels, such adaptation in the…
▽ More
In two-way channels, each user transmits and receives at the same time. This allows each encoder to interactively adapt the current input to its own message and all previously received signals. Such coding approach can introduce correlation between inputs of different users, since all the users' outputs are correlated by the nature of the channel. However, for some channels, such adaptation in the coding scheme and its induced correlation among users are useless in the sense that they do not help enlarge the capacity region with respect to the standard coding method (where each user encodes only based on its own message). In this paper, it is shown that adaptation is not helpful for enlarging the capacity region of two classes of two-way discrete channels: the modulo additive-noise channel with memory and the multiple access/degraded broadcast channel.
△ Less
Submitted 6 June, 2016;
originally announced June 2016.
-
Privacy-Aware MMSE Estimation
Authors:
Shahab Asoodeh,
Fady Alajaji,
Tamás Linder
Abstract:
We investigate the problem of the predictability of random variable $Y$ under a privacy constraint dictated by random variable $X$, correlated with $Y$, where both predictability and privacy are assessed in terms of the minimum mean-squared error (MMSE). Given that $X$ and $Y$ are connected via a binary-input symmetric-output (BISO) channel, we derive the \emph{optimal} random mapping $P_{Z|Y}$ su…
▽ More
We investigate the problem of the predictability of random variable $Y$ under a privacy constraint dictated by random variable $X$, correlated with $Y$, where both predictability and privacy are assessed in terms of the minimum mean-squared error (MMSE). Given that $X$ and $Y$ are connected via a binary-input symmetric-output (BISO) channel, we derive the \emph{optimal} random mapping $P_{Z|Y}$ such that the MMSE of $Y$ given $Z$ is minimized while the MMSE of $X$ given $Z$ is greater than $(1-ε)\mathsf{var}(X)$ for a given $ε\geq 0$. We also consider the case where $(X,Y)$ are continuous and $P_{Z|Y}$ is restricted to be an additive noise channel.
△ Less
Submitted 27 January, 2016;
originally announced January 2016.
-
Finite Model Approximations and Asymptotic Optimality of Quantized Policies in Decentralized Stochastic Control
Authors:
Naci Saldi,
Serdar Yüksel,
Tamás Linder
Abstract:
In this paper, we consider finite model approximations of a large class of static and dynamic team problems where these models are constructed through uniform quantization of the observation and action spaces of the agents. The strategies obtained from these finite models are shown to approximate the optimal cost with arbitrary precision under mild technical assumptions. In particular, quantized t…
▽ More
In this paper, we consider finite model approximations of a large class of static and dynamic team problems where these models are constructed through uniform quantization of the observation and action spaces of the agents. The strategies obtained from these finite models are shown to approximate the optimal cost with arbitrary precision under mild technical assumptions. In particular, quantized team policies are asymptotically optimal. This result is then applied to Witsenhausen's celebrated counterexample and the Gaussian relay channel problem. For the Witsenhausen's counterexample, our approximation approach provides, to our knowledge, the first rigorously established result that one can construct an $\varepsilon$-optimal strategy for any $\varepsilon > 0$ through a solution of a simpler problem.
△ Less
Submitted 1 January, 2016; v1 submitted 14 November, 2015;
originally announced November 2015.
-
Information Extraction Under Privacy Constraints
Authors:
Shahab Asoodeh,
Mario Diaz,
Fady Alajaji,
Tamás Linder
Abstract:
A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables $(X,Y)$ governed by a given joint distribution, an agent observes $Y$ and wants to convey to a potentially public user as much information about $Y$ as possible without compromising the amount of information revealed about $X$. To this end, the so-called {\em rate-privacy fun…
▽ More
A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables $(X,Y)$ governed by a given joint distribution, an agent observes $Y$ and wants to convey to a potentially public user as much information about $Y$ as possible without compromising the amount of information revealed about $X$. To this end, the so-called {\em rate-privacy function} is introduced to quantify the maximal amount of information (measured in terms of mutual information) that can be extracted from $Y$ under a privacy constraint between $X$ and the extracted information, where privacy is measured using either mutual information or maximal correlation. Properties of the rate-privacy function are analyzed and information-theoretic and estimation-theoretic interpretations of it are presented for both the mutual information and maximal correlation privacy measures. It is also shown that the rate-privacy function admits a closed-form expression for a large family of joint distributions of $(X,Y)$. Finally, the rate-privacy function under the mutual information privacy measure is considered for the case where $(X,Y)$ has a joint probability density function by studying the problem where the extracted information is a uniform quantization of $Y$ corrupted by additive Gaussian noise. The asymptotic behavior of the rate-privacy function is studied as the quantization resolution grows without bound and it is observed that not all of the properties of the rate-privacy function carry over from the discrete to the continuous case.
△ Less
Submitted 17 January, 2016; v1 submitted 7 November, 2015;
originally announced November 2015.
-
On Maximal Correlation, Mutual Information and Data Privacy
Authors:
Shahab Asoodeh,
Fady Alajaji,
Tamás Linder
Abstract:
The rate-privacy function is defined in \cite{Asoodeh} as a tradeoff between privacy and utility in a distributed private data system in which both privacy and utility are measured using mutual information. Here, we use maximal correlation in lieu of mutual information in the privacy constraint. We first obtain some general properties and bounds for maximal correlation and then modify the rate-pri…
▽ More
The rate-privacy function is defined in \cite{Asoodeh} as a tradeoff between privacy and utility in a distributed private data system in which both privacy and utility are measured using mutual information. Here, we use maximal correlation in lieu of mutual information in the privacy constraint. We first obtain some general properties and bounds for maximal correlation and then modify the rate-privacy function to account for the privacy-constrained estimation problem. We find a bound for the utility in this problem when the maximal correlation privacy is set to some threshold $ε>0$ and construct an explicit privacy scheme which achieves this bound.
△ Less
Submitted 8 October, 2015;
originally announced October 2015.
-
Notes on Information-Theoretic Privacy
Authors:
Shahab Asoodeh,
Fady Alajaji,
Tamás Linder
Abstract:
We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed. We then introduce a new quantity which quantifies the amount of private information cont…
▽ More
We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed. We then introduce a new quantity which quantifies the amount of private information contained in the observable data and then connect it to the optimal tradeoff between privacy and utility.
△ Less
Submitted 8 October, 2015;
originally announced October 2015.