(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–48 of 48 results for author: Shirani, F

.
  1. arXiv:2405.09308  [pdf, other

    cs.LG cs.AI

    TimeX++: Learning Time-Series Explanations with Information Bottleneck

    Authors: Zichuan Liu, Tianchun Wang, Jimeng Shi, Xu Zheng, Zhuomin Chen, Lei Song, Wenqian Dong, Jayantha Obeysekera, Farhad Shirani, Dongsheng Luo

    Abstract: Explaining deep learning models operating on time series data is crucial in various applications of interest which require interpretable and transparent insights from time series signals. In this work, we investigate this problem from an information theoretic perspective and show that most existing measures of explainability may suffer from trivial solutions and distributional shift issues. To add… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted by International Conference on Machine Learning (ICML 2024)

  2. arXiv:2403.00989  [pdf, other

    cs.IT cs.CR eess.SP math.PR

    On Non-Interactive Simulation of Distributed Sources with Finite Alphabets

    Authors: Hojat Allah Salehi, Farhad Shirani

    Abstract: This work presents a Fourier analysis framework for the non-interactive source simulation (NISS) problem. Two distributed agents observe a pair of sequences $X^d$ and $Y^d$ drawn according to a joint distribution $P_{X^dY^d}$. The agents aim to generate outputs $U=f_d(X^d)$ and $V=g_d(Y^d)$ with a joint distribution sufficiently close in total variation to a target distribution $Q_{UV}$. Existing… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  3. arXiv:2402.05039  [pdf, other

    cs.LG

    PAC Learnability under Explanation-Preserving Graph Perturbations

    Authors: Xu Zheng, Farhad Shirani, Tianchun Wang, Shouwei Gao, Wenqian Dong, Wei Cheng, Dongsheng Luo

    Abstract: Graphical models capture relations between entities in a wide range of applications including social networks, biology, and natural language processing, among others. Graph neural networks (GNN) are neural models that operate over graphs, enabling the model to leverage the complex relationships and dependencies in graph-structured data. A graph explanation is a subgraph which is an `almost suffici… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 21 pages, 6 figures, 4 tables

  4. arXiv:2402.01525  [pdf, other

    cs.IT eess.SP

    Non-Linear Analog Processing Gains in Task-Based Quantization

    Authors: Marian Temprana Alonso, Farhad Shirani, Neil Irwin Bernardo, Yonina C. Eldar

    Abstract: In task-based quantization, a multivariate analog signal is transformed into a digital signal using a limited number of low-resolution analog-to-digital converters (ADCs). This process aims to minimize a fidelity criterion, which is assessed against an unobserved task variable that is correlated with the analog signal. The scenario models various applications of interest such as channel estimation… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  5. arXiv:2402.00242  [pdf, other

    quant-ph cs.IT

    Quantum Advantage in Non-Interactive Source Simulation

    Authors: Hojat Allah Salehi, Farhad Shirani, S. Sandeep Pradhan

    Abstract: This work considers the non-interactive source simulation problem (NISS). In the standard NISS scenario, a pair of distributed agents, Alice and Bob, observe a distributed binary memoryless source $(X^d,Y^d)$ generated based on joint distribution $P_{X,Y}$. The agents wish to produce a pair of discrete random variables $(U_d,V_d)$ with joint distribution $P_{U_d,V_d}$, such that $P_{U_d,V_d}$ conv… ▽ More

    Submitted 2 May, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

  6. arXiv:2312.05596  [pdf, other

    cs.LG

    Factorized Explainer for Graph Neural Networks

    Authors: Rundong Huang, Farhad Shirani, Dongsheng Luo

    Abstract: Graph Neural Networks (GNNs) have received increasing attention due to their ability to learn from graph-structured data. To open the black-box of these deep learning models, post-hoc instance-level explanation methods have been proposed to understand GNN predictions. These methods seek to discover substructures that explain the prediction behavior of a trained GNN. In this paper, we show analytic… ▽ More

    Submitted 7 February, 2024; v1 submitted 9 December, 2023; originally announced December 2023.

    Comments: AAAI 24

  7. arXiv:2310.01820  [pdf, other

    cs.LG

    Towards Robust Fidelity for Evaluating Explainability of Graph Neural Networks

    Authors: Xu Zheng, Farhad Shirani, Tianchun Wang, Wei Cheng, Zhuomin Chen, Haifeng Chen, Hua Wei, Dongsheng Luo

    Abstract: Graph Neural Networks (GNNs) are neural models that leverage the dependency structure in graphical data via message passing among the graph nodes. GNNs have emerged as pivotal architectures in analyzing graph-structured data, and their expansive application in sensitive domains requires a comprehensive understanding of their decision-making processes -- necessitating a framework for GNN explainabi… ▽ More

    Submitted 17 March, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: Accepted by International Conference on Learning Representations (ICLR 2024); 26 Pages, 12 figures

  8. arXiv:2305.07079  [pdf, other

    cs.IT cs.CR cs.DB

    The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

    Authors: Mahshad Shariatnasab, Farhad Shirani, S. Sitharma Iyengar

    Abstract: Dataset obfuscation refers to techniques in which random noise is added to the entries of a given dataset, prior to its public release, to protect against leakage of private information. In this work, dataset obfuscation under two objectives is considered: i) rank-preservation: to preserve the row ordering in the obfuscated dataset induced by a given rank function, and ii) anonymity: to protect us… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  9. arXiv:2212.09239  [pdf, other

    cs.IT cs.CR eess.SY math.PR

    On Non-Interactive Source Simulation via Fourier Transform

    Authors: Farhad Shirani, Mohsen Heidari

    Abstract: The non-interactive source simulation (NISS) scenario is considered. In this scenario, a pair of distributed agents, Alice and Bob, observe a distributed binary memoryless source $(X^d,Y^d)$ generated based on joint distribution $P_{X,Y}$. The agents wish to produce a pair of discrete random variables $(U_d,V_d)$ with joint distribution $P_{U_d,V_d}$, such that $P_{U_d,V_d}$ converges in total var… ▽ More

    Submitted 18 December, 2022; originally announced December 2022.

  10. arXiv:2212.05948  [pdf, other

    cs.IT eess.SP eess.SY

    Capacity Gains in MIMO Systems with Few-Bit ADCs Using Nonlinear Analog Circuits

    Authors: Marian Temprana Alonso, Xuyang Liu, Hamidreza Aghasi, Farhad Shirani

    Abstract: Analog to Digital Converters (ADCs) are a major contributor to the power consumption of multiple-input multiple-output (MIMO) receivers with large antenna arrays operating in the millimeter wave carrier frequencies. This is especially the case in large bandwidth communication systems, due to the sudden drop in energy-efficiency of ADCs as the sampling rate is increased above 100MHz. Two mitigating… ▽ More

    Submitted 15 March, 2024; v1 submitted 12 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2208.04450

  11. arXiv:2210.04156  [pdf, other

    eess.SP cs.IT eess.SY

    Optimal Fault-Tolerant Data Fusion in Sensor Networks: Fundamental Limits and Efficient Algorithms

    Authors: Marian Temprana Alonso, Farhad Shirani, S. Sitharama Iyengar

    Abstract: Distributed estimation in the context of sensor networks is considered, where distributed agents are given a set of sensor measurements, and are tasked with estimating a target variable. A subset of sensors are assumed to be faulty. The objective is to minimize i) the mean square estimation error at each node (accuracy objective), and ii) the mean square distance between the estimates at each pair… ▽ More

    Submitted 22 December, 2022; v1 submitted 8 October, 2022; originally announced October 2022.

  12. arXiv:2208.04450  [pdf, other

    eess.SP cs.IT eess.SY

    Quantifying the Capacity Gains in Coarsely Quantized SISO Systems with Nonlinear Analog Operators

    Authors: Farhad Shirani, Hamidreza Aghasi

    Abstract: The power consumption of high-speed, high-resolution analog to digital converters (ADCs) is a limiting factor in implementing large-bandwidth mm-wave communication systems. A mitigating solution, which has drawn considerable recent interest, is to use a few low-resolution ADCs at the receiver. While reducing the number and resolution of the ADCs decreases power consumption, it also leads to a redu… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

  13. arXiv:2202.11238  [pdf, other

    cs.IT eess.SP

    Lattices from Linear Codes: Source and Channel Networks

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: In this paper, we consider the information-theoretic characterization of the set of achievable rates and distortions in a broad class of multiterminal communication scenarios with general continuous-valued sources and channels. A framework is presented which involves fine discretization of the source and channel variables followed by communication over the resulting discretized network. In order t… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

  14. arXiv:2202.05895  [pdf, other

    cs.SI cs.DB cs.IT

    Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks

    Authors: M. Shariatnasab, F. Shirani, Z. Anwar

    Abstract: This work considers the fundamental privacy limits under active fingerprinting attacks in power-law bipartite networks. The scenario arises naturally in social network analysis, tracking user mobility in wireless networks, and forensics applications, among others. A stochastic growing network generation model -- called the popularity-based model -- is investigated, where the bipartite network is g… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  15. arXiv:2202.02860  [pdf, other

    cs.IT eess.SP

    MIMO Systems with One-bit ADCs: Capacity Gains using Nonlinear Analog Operations

    Authors: Farhad Shirani, Hamidreza Aghasi

    Abstract: Analog to Digital Converters (ADCs) are a major contributor to the energy consumption on the receiver side of millimeter-wave multiple-input multiple-output (MIMO) systems with large antenna arrays. Consequently, there has been significant interest in using low-resolution ADCs along with hybrid beam-forming at MIMO receivers for energy efficiency. However, decreasing the ADC resolution results in… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  16. arXiv:2112.02128  [pdf, other

    cs.IT

    MIMO Networks with One-Bit ADCs: Receiver Design and Communication Strategies

    Authors: Abbas Khalili, Farhad Shirani, Elza Erkip, Yonina C. Eldar

    Abstract: High resolution analog to digital converters (ADCs) are conventionally used at the receiver terminals to store an accurate digital representation of the received signal, thereby allowing for reliable decoding of transmitted messages. However, in a wide range of applications, such as communication over millimeter wave and massive multiple-input multiple-output (MIMO) systems, the use of high resolu… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Accepted to IEEE Transactions on Communications

  17. arXiv:2106.04766  [pdf, other

    cs.SI cs.IT

    Fundamental Privacy Limits in Bipartite Networks under Active Attacks

    Authors: Mahshad Shariatnasab, Farhad Shirani, Elza Erkip

    Abstract: This work considers active deanonymization of bipartite networks. The scenario arises naturally in evaluating privacy in various applications such as social networks, mobility networks, and medical databases. For instance, in active deanonymization of social networks, an anonymous victim is targeted by an attacker (e.g. the victim visits the attacker's website), and the attacker queries her group… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

  18. Competition, Trait Variance Dynamics, and the Evolution of a Species' Range

    Authors: Farshad Shirani, Judith R. Miller

    Abstract: Geographic ranges of communities of species evolve in response to environmental, ecological, and evolutionary forces. Understanding the effects of these forces on species' range dynamics is a major goal of spatial ecology. Previous mathematical models have jointly captured the dynamic changes in species' population distributions and the selective evolution of fitness-related phenotypic traits in t… ▽ More

    Submitted 24 November, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Journal ref: Bulletin of Mathematical Biology, vol. 84, no. 3, 2022

  19. arXiv:2102.06267  [pdf, other

    cs.IT cs.SI

    On Graph Matching Using Generalized Seed Side-Information

    Authors: Mahshad Shariatnasab, Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: In this paper, matching pairs of stocahstically generated graphs in the presence of generalized seed side-information is considered. The graph matching problem emerges naturally in various applications such as social network de-anonymization, image processing, DNA sequencing, and natural language processing. A pair of randomly generated labeled Erdos-Renyi graphs with pairwise correlated edges are… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: text overlap with arXiv:2009.00467

  20. arXiv:2009.00467  [pdf, other

    cs.IT

    A Concentration of Measure Approach to Correlated Graph Matching

    Authors: Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: The graph matching problem emerges naturally in various applications such as web privacy, image processing and computational biology. In this paper, graph matching is considered under a stochastic model, where a pair of randomly generated graphs with pairwise correlated edges are to be matched such that given the labeling of the vertices in the first graph, the labels in the second graph are recov… ▽ More

    Submitted 25 January, 2021; v1 submitted 30 August, 2020; originally announced September 2020.

    Comments: arXiv admin note: text overlap with arXiv:2001.06962, arXiv:1810.13347

  21. arXiv:2002.04221  [pdf, other

    cs.IT eess.SP

    On Throughput of Millimeter Wave MIMO Systems with Low Resolution ADCs

    Authors: Abbas Khalili, Shahram Shahsavari, Farhad Shirani, Elza Erkip, Yonina C. Eldar

    Abstract: Use of low resolution analog to digital converters (ADCs) is an effective way to reduce the high power consumption of millimeter wave (mmWave) receivers. In this paper, a receiver with low resolution ADCs based on adaptive thresholds is considered in downlink mmWave communications in which the channel state information is not known a-priori and acquired through channel estimation. A performance co… ▽ More

    Submitted 11 February, 2020; originally announced February 2020.

  22. arXiv:2001.06962  [pdf, ps, other

    cs.IT

    On the Joint Typicality of Permutations of Sequences of Random Variables

    Authors: Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: Permutations of correlated sequences of random variables appear naturally in a variety of applications such as graph matching and asynchronous communications. In this paper, the asymptotic statistical behavior of such permuted sequences is studied. It is assumed that a collection of random vectors is produced based on an arbitrary joint distribution, and the vectors undergo a permutation operation… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

  23. arXiv:1906.08810  [pdf, other

    cs.IT

    A New Achievable Rate-Distortion Region for Distributed Source Coding

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: In this work, lossy distributed compression of pairs of correlated sources is considered. Conventionally, Shannon's random coding arguments -- using randomly generated unstructured codebooks whose blocklength is taken to be asymptotically large -- are used to derive achievability results. However, it was recently observed that in various multi-terminal communications scenarios, using random codes… ▽ More

    Submitted 19 October, 2020; v1 submitted 20 June, 2019; originally announced June 2019.

  24. arXiv:1905.09843  [pdf, other

    eess.SP

    On the Rates of Convergence in Learning of Optimal Temporally Fair Schedulers

    Authors: Farhad Shirani, Shahram Shahsavari, Elza Erkip

    Abstract: Multi-user schedulers are designed to achieve optimal average system utility (e.g. throughput) subject to a set of fairness criteria. In this work, scheduling under temporal fairness constraints is considered. Prior works have shown that a class of scheduling strategies called threshold based strategies (TBSs) achieve optimal system utility under temporal fairness constraints. The optimal TBS thre… ▽ More

    Submitted 19 January, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  25. arXiv:1905.08992  [pdf, other

    cs.IT

    Opportunistic Temporal Fair Mode Selection and User Scheduling for Full-duplex Systems

    Authors: Shahram Shahsavari, Farhad Shirani, Mohammad A Khojastepour, Elza Erkip

    Abstract: In-band full-duplex (FD) communications - enabled by recent advances in antenna and RF circuit design - has emerged as one of the promising techniques to improve data rates in wireless systems. One of the major roadblocks in enabling high data rates in FD systems is the inter-user interference (IUI) due to activating pairs of uplink and downlink users at the same time-frequency resource block. Opp… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  26. arXiv:1901.10628  [pdf, other

    cs.IT

    On Multiterminal Communication over MIMO Channels with One-bit ADCs at the Receivers

    Authors: Abbas Khalili, Farhad Shirani, Elza Erkip, Yonina C. Eldar

    Abstract: The fundamental limits of communication over multiple-input multiple-output (MIMO) networks are considered when a limited number of one-bit analog to digital converters (ADC) are used at the receiver terminals. Prior works have mainly focused on point-to-point communications, where receiver architectures consisting of a concatenation of an analog processing module, a limited number of one-bit ADCs… ▽ More

    Submitted 31 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  27. arXiv:1901.09844  [pdf, other

    cs.IT

    Tradeoff Between Delay and High SNR Capacity in Quantized MIMO Systems

    Authors: Abbas Khalili, Farhad Shirani, Elza Erkip, Yonina C. Eldar

    Abstract: Analog-to-digital converters (ADCs) are a major contributor to the power consumption of multiple-input multiple-output (MIMO) communication systems with large number of antennas. Use of low resolution ADCs has been proposed as a means to decrease power consumption in MIMO receivers. However, reducing the ADC resolution leads to performance loss in terms of achievable transmission rates. In order t… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

  28. arXiv:1901.07719  [pdf, other

    cs.IT

    On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints

    Authors: Shahram Shahsavari, Farhad Shirani, Elza Erkip

    Abstract: In the conventional information theoretic analysis of multiterminal communication scenarios, it is often assumed that all of the distributed terminals use the communication channel simultaneously. However, in practical wireless communication systems - due to restricted computation complexity at network terminals - a limited number of users can be activated either in uplink or downlink simultaneous… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

  29. arXiv:1901.07655  [pdf, ps, other

    cs.DB

    A Concentration of Measure Approach to Database De-anonymization

    Authors: Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: In this paper, matching of correlated high-dimensional databases is investigated. A stochastic database model is considered where the correlation among the database entries is governed by an arbitrary joint distribution. Concentration of measure theorems such as typicality and laws of large numbers are used to develop a database matching scheme and derive necessary conditions for successful matchi… ▽ More

    Submitted 2 May, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

  30. arXiv:1810.13347  [pdf, ps, other

    cs.CR cs.SI q-bio.QM

    Matching Graphs with Community Structure: A Concentration of Measure Approach

    Authors: F. Shirani, S. Garg, E. Erkip

    Abstract: In this paper, matching pairs of random graphs under the community structure model is considered. The problem emerges naturally in various applications such as privacy, image processing and DNA sequencing. A pair of randomly generated labeled graphs with pairwise correlated edges are considered. It is assumed that the graph edges are generated based on the community structure model. Given the labe… ▽ More

    Submitted 31 October, 2018; originally announced October 2018.

  31. A General Framework for Temporal Fair User Scheduling in NOMA Systems

    Authors: Shahram Shahsavari, Farhad Shirani, Elza Erkip

    Abstract: Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for next generation wireless networks. Opportunistic multi-user scheduling is necessary to fully exploit multiplexing gains in NOMA systems, but compared with traditional scheduling, interrelations between users' throughputs induced by multi-user interference poses new challenges in the design of NOMA schedulers.… ▽ More

    Submitted 17 September, 2018; originally announced September 2018.

  32. arXiv:1802.00918  [pdf, other

    cs.IT

    Typicality Matching for Pairs of Correlated Graphs

    Authors: F. Shirani, S. Garg, E. Erkip

    Abstract: In this paper, the problem of matching pairs of correlated random graphs with multi-valued edge attributes is considered. Graph matching problems of this nature arise in several settings of practical interest including social network de-anonymization, study of biological data, web graphs, etc. An achievable region for successful matching is derived by analyzing a new matching algorithm that we ref… ▽ More

    Submitted 3 February, 2018; originally announced February 2018.

  33. arXiv:1801.06498  [pdf, other

    cs.SI

    Optimal Active Social Network De-anonymization Using Information Thresholds

    Authors: F. Shirani, S. Garg, E. Erkip

    Abstract: In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considered w… ▽ More

    Submitted 19 January, 2018; originally announced January 2018.

  34. arXiv:1801.05294  [pdf, ps, other

    cs.IT

    Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback

    Authors: Mohsen Heidari, Farhad Shirani, S. Sandeep Pradhan

    Abstract: In this paper, we investigate the necessity of finite blocklength codes in distributed transmission of independent message sets over channels with feedback. Previously, it was shown that finite effective length codes are necessary in distributed transmission and compression of sources. We provide two examples of three user interference channels with feedback where codes with asymptotically large e… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

  35. arXiv:1711.10360  [pdf, other

    cs.IT

    Seeded Graph Matching: Efficient Algorithms and Theoretical Guarantees

    Authors: F. Shirani, S. Garg, E. Erkip

    Abstract: In this paper, a new information theoretic framework for graph matching is introduced. Using this framework, the graph isomorphism and seeded graph matching problems are studied. The maximum degree algorithm for graph isomorphism is analyzed and sufficient conditions for successful matching are rederived using type analysis. Furthermore, a new seeded matching algorithm with polynomial time complex… ▽ More

    Submitted 28 November, 2017; originally announced November 2017.

  36. arXiv:1710.04163  [pdf, other

    cs.IT cs.CR cs.SI

    An Information Theoretic Framework for Active De-anonymization in Social Networks Based on Group Memberships

    Authors: Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network. When an unidentified victim visits a malicious website, the attacker uses browser history sni… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

  37. arXiv:1708.00665  [pdf, ps, other

    cs.IT

    How to Compute Modulo Prime-Power Sums ?

    Authors: Mohsen Heidari, Farhad Shirani, Sandeep Pradhan

    Abstract: A new class of structured codes called Quasi Group Codes (QGC) is introduced. A QGC is a subset of a group code. In contrast with group codes, QGCs are not closed under group addition. The parameters of the QGC can be chosen such that the size of $\mathcal{C}+\mathcal{C}$ is equal to any number between $|\mathcal{C}|$ and $|\mathcal{C}|^2$ . We analyze the performance of a specific class of QGCs.… ▽ More

    Submitted 2 August, 2017; originally announced August 2017.

    Comments: 52 pages, Submitted to IEEE Transaction on Information Theory

  38. arXiv:1705.00410  [pdf, other

    cs.IT

    On the Sub-optimality of Single-Letter Coding over Networks

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: In this paper, we establish a new bound tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper bound on the correlation between the outputs of these functions. The upper bound may find applications in problems in many areas which deal with comm… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1702.01376, arXiv:1702.01353

  39. arXiv:1702.05544  [pdf, ps, other

    cs.IT

    On the Necessity of Structured Codes for Communications over MAC with Feedback

    Authors: Mohsen Heidari, Farhad Shirani, S. Sandeep Pradhan

    Abstract: The problem of three-user multiple-access channel (MAC) with noiseless feedback is investigated. A new coding strategy is presented. The coding scheme builds upon the natural extension of the Cover-Leung (CL) scheme; and uses quasi-linear codes. A new single-letter achievable rate region is derived. The new achievable region strictly contains the CL region. This is shown through an example. In thi… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.

  40. arXiv:1702.02330  [pdf, ps, other

    cs.IT

    A New Achievable Rate Region for Multiple-Access Channel with States

    Authors: Mohsen Heidari, Farhad Shirani, S. Sandeep Pradhan

    Abstract: The problem of reliable communication over the multiple-access channel (MAC) with states is investigated. We propose a new coding scheme for this problem which uses quasi-group codes (QGC). We derive a new computable single-letter characterization of the achievable rate region. As an example, we investigate the problem of doubly-dirty MAC with modulo-$4$ addition. It is shown that the sum-rate… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: 13 pages, ISIT 2017

  41. arXiv:1702.01376  [pdf, other

    cs.IT

    On the Sub-optimality of Single-letter Coding in Multi-terminal Communications

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: We investigate binary block-codes (BBC). A BBC is defined as a vector of Boolean functions. We consider BBCs which are generated randomly, and using single-letter distributions. We characterize the vector of dependency spectrums of these BBCs. We use this vector to upper-bound the correlation between the outputs of two distributed BBCs. Finally, the upper-bound is used to show that the large block… ▽ More

    Submitted 5 February, 2017; originally announced February 2017.

  42. arXiv:1702.01353  [pdf, other

    cs.IT

    On the Correlation between Boolean Functions of Sequences of Random Variables

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: In this paper, we establish a new inequality tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper-bound on the correlation between the outputs of these functions. The upper-bound is useful in various disciplines which deal with common-informa… ▽ More

    Submitted 4 February, 2017; originally announced February 2017.

  43. arXiv:1610.03140  [pdf, ps, other

    math.DS q-bio.QM

    On the Global Dynamics of an Electroencephalographic Mean Field Model of the Neocortex

    Authors: Farshad Shirani, Wassim M. Haddad, Rafael de la Llave

    Abstract: This paper investigates the global dynamics of a mean field model of the electroencephalogram developed by Liley et al., 2002. The model is presented as a system of coupled ordinary and partial differential equations with periodic boundary conditions. Existence, uniqueness, and regularity of weak and strong solutions of the model are established in appropriate function spaces, and the associat… ▽ More

    Submitted 4 May, 2017; v1 submitted 10 October, 2016; originally announced October 2016.

    MSC Class: 35Q92; 37L30; 35B40; 92C20

    Journal ref: SIAM J. Appl. Dyn. Syst., 16(4), 1969-2029

  44. arXiv:1603.05274  [pdf, other

    cs.IT

    New Sufficient Conditions for Multiple-Access Channel with Correlated Sources

    Authors: Mohsen Heidari, Farhad Shirani, S. Sandeep Pradhan

    Abstract: The problem of three-user Multiple-Access Channel (MAC) with correlated sources is investigated. An extension to the Cover-El Gamal-Salehi (CES) scheme is introduced. We use a combination of this scheme with linear codes and propose a new coding strategy. We derive new sufficient conditions to transmit correlated sources reliably. We consider an example of three-user MAC with binary inputs. Using… ▽ More

    Submitted 16 March, 2016; originally announced March 2016.

  45. arXiv:1602.05287  [pdf, other

    cs.IT

    Trade-off between Communication and Cooperation in the Interference Channel

    Authors: F. Shirani, S. S. Pradhan

    Abstract: We consider the problem of coding over the multi-user Interference Channel (IC). It is well-known that aligning the interfering signals results in improved achievable rates in certain setups involving more than two users. We argue that in the general interference problem, senders face a tradeoff between communicating their message to their corresponding decoder or cooperating with other users by a… ▽ More

    Submitted 16 February, 2016; originally announced February 2016.

  46. arXiv:1602.04521  [pdf, other

    cs.IT

    Quasi Linear Codes: Application to Point-to-Point and Multi-Terminal Source Coding

    Authors: F. Shirani, M. Heidari, S. S. Pradhan

    Abstract: A new ensemble of structured codes is introduced. These codes are called Quasi Linear Codes (QLC). The QLC's are constructed by taking subsets of linear codes. They have a looser structure compared to linear codes and are not closed under addition. We argue that these codes provide gains in terms of achievable Rate-Distortions (RD) in different multi-terminal source coding problems. We derive the… ▽ More

    Submitted 14 February, 2016; originally announced February 2016.

  47. arXiv:1602.01911  [pdf, other

    cs.IT

    An Achievable Rate-Distortion Region for Multiple Descriptions Source Coding Based on Coset Codes

    Authors: Farhad Shirani, S. Sandeep Pradhan

    Abstract: We consider the problem of multiple descriptions (MD) source coding and propose new coding strategies involving both unstructured and structured coding layers. Previously, the most general achievable rate-distortion (RD) region for the $l$-descriptions problem was the Combinatorial Message Sharing with Binning (CMSB) region. The CMSB scheme utilizes unstructured quantizers and unstructured binning… ▽ More

    Submitted 4 February, 2016; originally announced February 2016.

  48. arXiv:1402.2032  [pdf, other

    cs.IT

    An Achievable Rate-Distortion Region for the Multiple Descriptions Problem

    Authors: Farhad Shirani, Sandeep Pradhan

    Abstract: A multiple-descriptions (MD) coding strategy is proposed and an inner bound to the achievable rate-distortion region is derived. The scheme utilizes linear codes. It is shown in two different MD set-ups that the linear coding scheme achieves a larger rate-distortion region than previously known random coding strategies. Furthermore, it is shown via an example that the best known random coding sche… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.