Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,698 Hits in 4.2 sec

Decoding from pooled data: Phase transitions of message passing

Ahmed El Alaoui, Aaditya Ramdas, Florent Krzakala, Lenka Zdeborova, Michael I. Jordan
2017 2017 IEEE International Symposium on Information Theory (ISIT)  
We consider the problem of decoding a discrete signal of categorical variables from the observation of several histograms of pooled subsets of it.  ...  The analysis reveals sharp phase transition phenomena where the behavior of AMP changes from exact recovery to weak correlation with the signal as m/n crosses a threshold.  ...  Decoding from pooled data: Sharp information-theoretic bounds. arXiv preprint arXiv:1611.09981, 2016. [GV05] Dongning Guo and Sergio Verdú.  ... 
doi:10.1109/isit.2017.8007036 dblp:conf/isit/AlaouiRKZJ17 fatcat:4gts2cac3zflrhuhk66aezre5a

Decoding from Pooled Data: Phase Transitions of Message Passing

Ahmed El Alaoui, Aaditya Ramdas, Florent Krzakala, Lenka Zdeborova, Michael I. Jordan
2018 IEEE Transactions on Information Theory  
We consider the problem of decoding a discrete signal of categorical variables from the observation of several histograms of pooled subsets of it.  ...  The analysis reveals sharp phase transition phenomena where the behavior of AMP changes from exact recovery to weak correlation with the signal as m/n crosses a threshold.  ...  Decoding from pooled data: Sharp information-theoretic bounds. arXiv preprint arXiv:1611.09981, 2016. [GV05] Dongning Guo and Sergio Verdú.  ... 
doi:10.1109/tit.2018.2855698 fatcat:5uraqdvq4necji4x6taifgd4qa

Phase Transitions in the Pooled Data Problem [article]

Jonathan Scarlett, Volkan Cevher
2017 arXiv   pre-print
In the noiseless setting, we identify an exact asymptotic threshold on the required number of tests with optimal decoding, and prove a phase transition between complete success and complete failure.  ...  In this paper, we study the pooled data problem of identifying the labels associated with a large collection of items, based on a sequence of pooled tests revealing the counts of each label within the  ...  The same authors also proved a phase transition for a practical algorithm based on approximate message passing [4] , but the required number of tests is in fact significantly larger than the information-theoretic  ... 
arXiv:1710.06766v1 fatcat:z2kxi6x6izfrxphv2wnl7mm6du

Efficient Data Collection Over Multiple Access Wireless Sensors Network [article]

Alejandro Cohen and Asaf Cohen and Omer Gurewitz
2018 arXiv   pre-print
In other words, neither the sink nor the other sensors need to know who are the actively transmitting sensors, and this data is decoded directly from the channel output.  ...  In the suggested protocol, the sink collects messages from up to K sensors simultaneously, out of a large population of sensors, without knowing in advance which sensors will transmit, and without requiring  ...  .), Tomer Nagar and Shaun Tzirkel for contributing the hardware implementation of the suggested protocol, the related software and testing.  ... 
arXiv:1712.03314v2 fatcat:bvvturmterep5preattem6wqwi

GenoGuard: Protecting Genomic Data against Brute-Force Attacks

Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels
2015 2015 IEEE Symposium on Security and Privacy  
Previously proposed HE schemes, however, can be applied to messages from, unfortunately, a very restricted set of probability distributions.  ...  Secure storage of genomic data is of great and increasing importance.  ...  We also thank Sahel Shariati Samani for her work on part of the code in the system.  ... 
doi:10.1109/sp.2015.34 dblp:conf/sp/HuangAFHJ15 fatcat:4kfc5mdojveprhae7zb66byhcu

Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones

Fan Dang, Ennan Zhai, Zhenhua Li, Pengfei Zhou, Aziz Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li
2018 IEEE Transactions on Mobile Computing  
Although most messages of AFC systems are insecurely transferred in plaintext, system operators did not pay much attention to this vulnerability, since the AFC network is basically isolated from the public  ...  network (e.g., the Internet)-there is no way of exploiting such a vulnerability from the outside of the AFC network.  ...  As transit routes in modern cities are usually quite long, most of today's AFC systems adopt a distance-based pricing strategy, where the transit fee is calculated based on the length of the trip.  ... 
doi:10.1109/tmc.2018.2853114 fatcat:76lrvmhahzalbp26yckxovrz7a

A secure and effective data aggregation in WSN for improved security and data privacy

S Suma Christal Mary, K Murugeswari, S Jyothi Shri, N Senthamilarasi
2023 Review of Computer Engineering Research  
The increasing prevalence of internet usage and mobile devices has underscored the critical importance of safeguarding personal data.  ...  If the aggregated output is the sum of sensing data, the base station cannot acquire the maximum value.  ...  Transparency: The authors state that the manuscript is honest, truthful, and transparent, that no key aspects of the investigation have been omitted, and that any differences from the study as planned  ... 
doi:10.18488/76.v10i3.3494 fatcat:u6ubmk7clbhh3oaeydb77ijbya

Neural Network Detection of Data Sequences in Communication Systems

Nariman Farsad, Andrea Goldsmith
2018 IEEE Transactions on Signal Processing  
In addition, we also evaluate the performance of this detection method applied to data sent over a molecular communication platform, where the channel model is difficult to model analytically.  ...  We also demonstrate that the bit error rate (BER) performance of the proposed SBRNN detector is better than that of a Viterbi detector with imperfect CSI as well as that of other NN detectors that have  ...  After detection, the estimated symbols are passed to a channel decoder to correct some of the errors in detection, and then to a source decoder to recover the data.  ... 
doi:10.1109/tsp.2018.2868322 fatcat:woc6l4yr55a6vlfeglyny7mc7q

Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks

YeeWei Law, Yu Zhang, Jiong Jin, Marimuthu Palaniswami, Paul Havinga
2011 EURASIP Journal on Wireless Communications and Networking  
Sreluge employs a neighbor classification system and a time series forecasting technique to isolate polluters, and a combinatorial technique to decode data packets in the presence of polluters before the  ...  For security reasons, every firmware update must be authenticated to prevent an attacker from installing its code in the network.  ...  Before deployment, every node gets m keys randomly chosen from a key pool of n keys.  ... 
doi:10.1155/2011/685219 fatcat:ub6ffr7dvveg5hbidrpxz663y4

On the Parallel Reconstruction from Pooled Data [article]

Oliver Gebhard and Max Hahn-Klimroth and Dominik Kaaser and Philipp Loick
2022 arXiv   pre-print
In the pooled data problem the goal is to efficiently reconstruct a binary signal from additive measurements.  ...  Our second result extends a result of Alaoui et al. (2014) and Scarlett Cevher (2017) who studied the pooled data problem for dense signals.  ...  ACKNOWLEDGEMENTS The authors thank Uriel Feige for various detailed comments which improved the quality of the paper significantly.  ... 
arXiv:1905.01458v4 fatcat:4wh7lstyxbdr5ibkprlavuzng4

The ALICE data acquisition system

F. Carena, W. Carena, S. Chapeland, V. Chibante Barroso, F. Costa, E. Dénes, R. Divià, U. Fuchs, A. Grigore, T. Kiss, G. Simonetti, C. Soós (+3 others)
2014 Nuclear Instruments and Methods in Physics Research Section A : Accelerators, Spectrometers, Detectors and Associated Equipment  
The collection of experimental data from the detectors is performed by several hundreds of high-speed optical links.  ...  We also report on the performance achieved during the first period of data taking (from 2009 to 2013) often exceeding those specified in the DAQ Technical Design Report.  ...  We prefered to have a stable source of measurements during this transition phase.  ... 
doi:10.1016/j.nima.2013.12.015 fatcat:bh6qru2ypjfrngrhilsdzewjrm

Accelerated Data-Driven Discovery and Screening of Two-Dimensional Magnets Using Graph Neural Networks [article]

Ahmed Elrashidy, James Della-Giustina, Jia-An Yan
2024 arXiv   pre-print
Using data from the Materials Project database and the Computational 2D materials database (C2DB), we train three GNN architectures on a dataset of 1190 magnetic monolayers with energy above the convex  ...  In this study, we employ Graph Neural Networks (GNNs) to accelerate the discovery of novel 2D magnetic materials which have transformative potential in spintronics applications.  ...  phases and excludes 2D materials from competing phases.  ... 
arXiv:2311.00939v2 fatcat:7e6j7io5crdivj56zm4hfwij3u

Emerging OCDMA communication systems and data networks [Invited]

Jawad A. Salehi
2007 Journal of Optical Networking  
Section 4 discusses an advance OCDMA system using spectral phase encoding and decoding techniques and discusses enabling technologies that are needed to support such systems.  ...  The lag in recognizing the potential of OCDMA techniques came not from the conceptual development, but rather from the enabling and advancing photonics to support the fundamental functionalities needed  ...  However, in the first protocol the code is excluded from the pool once it is assigned for a data transmission, while in the latter the codes are never removed from the pool, which gives the network the  ... 
doi:10.1364/jon.6.001138 fatcat:e7znbzmbfbfv5dxyx3dofmihf4

Efficient Approximate Recovery from Pooled Data Using Doubly Regular Pooling Schemes [article]

Max Hahn-Klimroth, Dominik Kaaser, Malin Rau
2023 arXiv   pre-print
This becomes particularly relevant in the noisy variant of the pooled data problem where the queries' results are subject to random noise.  ...  In the pooled data problem we are given n agents with hidden state bits, either 0 or 1. The hidden states are unknown and can be seen as the underlying ground truth σ.  ...  Finally, various tasks in computational biology [14, 7, 32] , traffic monitoring [34] , or confidential data transfer [1, 12] use decoding techniques from pooled data.  ... 
arXiv:2303.00043v1 fatcat:bkshwclg4zcfrm4k4jpvlccha4

Scientific data repositories

Etzard Stolte, Christoph von Praun, Gustavo Alonso, Thomas Gross
2003 Proceedings of the 2003 ACM SIGMOD international conference on on Management of data - SIGMOD '03  
These design choices are valuable contributions as they address common concerns in a wide range of scientific data management systems. 1 http://www.hedc.ethz.ch 2  ...  To successfully accommodate typical adaptations encountered in scientific data management systems, HEDC (i) clearly separates generic from domain specific code in all tiers, (ii) uses a file system for  ...  Csillaghy for their help in dealing with the scientific aspects of the RHESSI data and for their contributions to the design of HEDC.  ... 
doi:10.1145/872797.872800 fatcat:xsbiz4z6gfbrxnhtj3l6eljveu
« Previous Showing results 1 — 15 out of 5,698 results