A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Decoding from pooled data: Phase transitions of message passing
2017
2017 IEEE International Symposium on Information Theory (ISIT)
We consider the problem of decoding a discrete signal of categorical variables from the observation of several histograms of pooled subsets of it. ...
The analysis reveals sharp phase transition phenomena where the behavior of AMP changes from exact recovery to weak correlation with the signal as m/n crosses a threshold. ...
Decoding from pooled data: Sharp information-theoretic
bounds. arXiv preprint arXiv:1611.09981, 2016.
[GV05] Dongning Guo and Sergio Verdú. ...
doi:10.1109/isit.2017.8007036
dblp:conf/isit/AlaouiRKZJ17
fatcat:4gts2cac3zflrhuhk66aezre5a
Decoding from Pooled Data: Phase Transitions of Message Passing
2018
IEEE Transactions on Information Theory
We consider the problem of decoding a discrete signal of categorical variables from the observation of several histograms of pooled subsets of it. ...
The analysis reveals sharp phase transition phenomena where the behavior of AMP changes from exact recovery to weak correlation with the signal as m/n crosses a threshold. ...
Decoding from pooled data: Sharp information-theoretic
bounds. arXiv preprint arXiv:1611.09981, 2016.
[GV05] Dongning Guo and Sergio Verdú. ...
doi:10.1109/tit.2018.2855698
fatcat:5uraqdvq4necji4x6taifgd4qa
Phase Transitions in the Pooled Data Problem
[article]
2017
arXiv
pre-print
In the noiseless setting, we identify an exact asymptotic threshold on the required number of tests with optimal decoding, and prove a phase transition between complete success and complete failure. ...
In this paper, we study the pooled data problem of identifying the labels associated with a large collection of items, based on a sequence of pooled tests revealing the counts of each label within the ...
The same authors also proved a phase transition for a practical algorithm based on approximate message passing [4] , but the required number of tests is in fact significantly larger than the information-theoretic ...
arXiv:1710.06766v1
fatcat:z2kxi6x6izfrxphv2wnl7mm6du
Efficient Data Collection Over Multiple Access Wireless Sensors Network
[article]
2018
arXiv
pre-print
In other words, neither the sink nor the other sensors need to know who are the actively transmitting sensors, and this data is decoded directly from the channel output. ...
In the suggested protocol, the sink collects messages from up to K sensors simultaneously, out of a large population of sensors, without knowing in advance which sensors will transmit, and without requiring ...
.), Tomer Nagar and Shaun Tzirkel for contributing the hardware implementation of the suggested protocol, the related software and testing. ...
arXiv:1712.03314v2
fatcat:bvvturmterep5preattem6wqwi
GenoGuard: Protecting Genomic Data against Brute-Force Attacks
2015
2015 IEEE Symposium on Security and Privacy
Previously proposed HE schemes, however, can be applied to messages from, unfortunately, a very restricted set of probability distributions. ...
Secure storage of genomic data is of great and increasing importance. ...
We also thank Sahel Shariati Samani for her work on part of the code in the system. ...
doi:10.1109/sp.2015.34
dblp:conf/sp/HuangAFHJ15
fatcat:4kfc5mdojveprhae7zb66byhcu
Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones
2018
IEEE Transactions on Mobile Computing
Although most messages of AFC systems are insecurely transferred in plaintext, system operators did not pay much attention to this vulnerability, since the AFC network is basically isolated from the public ...
network (e.g., the Internet)-there is no way of exploiting such a vulnerability from the outside of the AFC network. ...
As transit routes in modern cities are usually quite long, most of today's AFC systems adopt a distance-based pricing strategy, where the transit fee is calculated based on the length of the trip. ...
doi:10.1109/tmc.2018.2853114
fatcat:76lrvmhahzalbp26yckxovrz7a
A secure and effective data aggregation in WSN for improved security and data privacy
2023
Review of Computer Engineering Research
The increasing prevalence of internet usage and mobile devices has underscored the critical importance of safeguarding personal data. ...
If the aggregated output is the sum of sensing data, the base station cannot acquire the maximum value. ...
Transparency: The authors state that the manuscript is honest, truthful, and transparent, that no key aspects of the investigation have been omitted, and that any differences from the study as planned ...
doi:10.18488/76.v10i3.3494
fatcat:u6ubmk7clbhh3oaeydb77ijbya
Neural Network Detection of Data Sequences in Communication Systems
2018
IEEE Transactions on Signal Processing
In addition, we also evaluate the performance of this detection method applied to data sent over a molecular communication platform, where the channel model is difficult to model analytically. ...
We also demonstrate that the bit error rate (BER) performance of the proposed SBRNN detector is better than that of a Viterbi detector with imperfect CSI as well as that of other NN detectors that have ...
After detection, the estimated symbols are passed to a channel decoder to correct some of the errors in detection, and then to a source decoder to recover the data. ...
doi:10.1109/tsp.2018.2868322
fatcat:woc6l4yr55a6vlfeglyny7mc7q
Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks
2011
EURASIP Journal on Wireless Communications and Networking
Sreluge employs a neighbor classification system and a time series forecasting technique to isolate polluters, and a combinatorial technique to decode data packets in the presence of polluters before the ...
For security reasons, every firmware update must be authenticated to prevent an attacker from installing its code in the network. ...
Before deployment, every node gets m keys randomly chosen from a key pool of n keys. ...
doi:10.1155/2011/685219
fatcat:ub6ffr7dvveg5hbidrpxz663y4
On the Parallel Reconstruction from Pooled Data
[article]
2022
arXiv
pre-print
In the pooled data problem the goal is to efficiently reconstruct a binary signal from additive measurements. ...
Our second result extends a result of Alaoui et al. (2014) and Scarlett Cevher (2017) who studied the pooled data problem for dense signals. ...
ACKNOWLEDGEMENTS The authors thank Uriel Feige for various detailed comments which improved the quality of the paper significantly. ...
arXiv:1905.01458v4
fatcat:4wh7lstyxbdr5ibkprlavuzng4
The ALICE data acquisition system
2014
Nuclear Instruments and Methods in Physics Research Section A : Accelerators, Spectrometers, Detectors and Associated Equipment
The collection of experimental data from the detectors is performed by several hundreds of high-speed optical links. ...
We also report on the performance achieved during the first period of data taking (from 2009 to 2013) often exceeding those specified in the DAQ Technical Design Report. ...
We prefered to have a stable source of measurements during this transition phase. ...
doi:10.1016/j.nima.2013.12.015
fatcat:bh6qru2ypjfrngrhilsdzewjrm
Accelerated Data-Driven Discovery and Screening of Two-Dimensional Magnets Using Graph Neural Networks
[article]
2024
arXiv
pre-print
Using data from the Materials Project database and the Computational 2D materials database (C2DB), we train three GNN architectures on a dataset of 1190 magnetic monolayers with energy above the convex ...
In this study, we employ Graph Neural Networks (GNNs) to accelerate the discovery of novel 2D magnetic materials which have transformative potential in spintronics applications. ...
phases and excludes 2D materials from competing phases. ...
arXiv:2311.00939v2
fatcat:7e6j7io5crdivj56zm4hfwij3u
Emerging OCDMA communication systems and data networks [Invited]
2007
Journal of Optical Networking
Section 4 discusses an advance OCDMA system using spectral phase encoding and decoding techniques and discusses enabling technologies that are needed to support such systems. ...
The lag in recognizing the potential of OCDMA techniques came not from the conceptual development, but rather from the enabling and advancing photonics to support the fundamental functionalities needed ...
However, in the first protocol the code is excluded from the pool once it is assigned for a data transmission, while in the latter the codes are never removed from the pool, which gives the network the ...
doi:10.1364/jon.6.001138
fatcat:e7znbzmbfbfv5dxyx3dofmihf4
Efficient Approximate Recovery from Pooled Data Using Doubly Regular Pooling Schemes
[article]
2023
arXiv
pre-print
This becomes particularly relevant in the noisy variant of the pooled data problem where the queries' results are subject to random noise. ...
In the pooled data problem we are given n agents with hidden state bits, either 0 or 1. The hidden states are unknown and can be seen as the underlying ground truth σ. ...
Finally, various tasks in computational biology [14, 7, 32] , traffic monitoring [34] , or confidential data transfer [1, 12] use decoding techniques from pooled data. ...
arXiv:2303.00043v1
fatcat:bkshwclg4zcfrm4k4jpvlccha4
Scientific data repositories
2003
Proceedings of the 2003 ACM SIGMOD international conference on on Management of data - SIGMOD '03
These design choices are valuable contributions as they address common concerns in a wide range of scientific data management systems. 1 http://www.hedc.ethz.ch 2 ...
To successfully accommodate typical adaptations encountered in scientific data management systems, HEDC (i) clearly separates generic from domain specific code in all tiers, (ii) uses a file system for ...
Csillaghy for their help in dealing with the scientific aspects of the RHESSI data and for their contributions to the design of HEDC. ...
doi:10.1145/872797.872800
fatcat:xsbiz4z6gfbrxnhtj3l6eljveu
« Previous
Showing results 1 — 15 out of 5,698 results