Communication, Control and Signal Processing Seminar
Abstracts of talks
Spring 2015
02/19 Alexey Frolov (IITP RAS, Moscow), On Multi-Threshold Decoding of q-ary LDPC codes
ABSTRACT:
We consider decoding of LDPC codes over GF(q) with a low-complexity majority
algorithm. A modification of this algorithm with multiple thresholds is suggested. A lower
estimate on the decoding radius realized by the new algorithm is derived. The estimate is
shown to be better than the estimate for a single threshold majority decoder. At the same
time, introducing multiple thresholds does not affect the order of decoding complexity.
02/26 Alborz Alavian (UMD), Stabilizing Decentralized Systems with Arbitrary Information Structure
ABSTRACT:
A seminal result in decentralized control is the development of fixed modes by Wang
and Davison in 1973 - that plant modes which cannot be moved with a static decentralized
controller cannot be moved by a dynamic one either, and that the other modes which can be
moved can be shifted to any chosen location with arbitrary precision.
These results were developed for perfectly decentralized, or block diagonal, information structure,
where each control input may only depend on a single corresponding measurement. Furthermore,
the results were claimed after a preliminary step was demonstrated, omitting a rigorous induction
for each of these results, and the remaining task is nontrivial.
In this paper, we consider fixed modes for arbitrary information structures, where certain control
inputs may depend on some measurements but not others. We provide a comprehensive proof
that the modes which cannot be altered by a static controller with the given structure cannot be
moved by a dynamic one either. Furthermore, the modes which can be altered by a static controller
with the given structure can be moved by a dynamic one to any chosen location with arbitrary precision,
thus generalizing and solidifying the Wang and Davison's result.
This shows that a system can be stabilized by a linear time-invariant controller with the given information
structure as long as all of the modes which are fixed with respect to that structure are in the left
half-plane; an algorithm for synthesizing such a stabilizing decentralized controller is then distilled from the proof.
03/12 Sikai Qu (UMD), Zero-one law for the absence of isolated nodes for Multiplicative Attributes Graph
ABSTRACT:
Graphs are powerful ways to describe social, technological, and biological systems
with multiple agents involved, where nodes represent agents (people, websites, gene, etc.)
and edges (or links) represent relations (or interactions) between agents. Particularly, in
the context of social networks if links establishment is a joint effect of features or characteristics
of mutual parties, then links automatically serves as causal factors of various social behaviors,
phenomena and outcomes. In a recently introduced social network model, it assigned (random)
attributes to every nodes and the randomness of links formation depends on attributes of two
end points. It is known as Multiplicative Attributes Graph (MAG). Issues regarding model properties,
such as connectivity, emergence of triangles, diameter and degree distributions are of interest
to study. In this talk, I will formally address the MAG model and give a proof of the zero-one
law for the absence of isolated nodes.
03/26 Janis Notzel (Technische Universitat Munchen), Arbitrarily Varying Wiretap Channel
ABSTRACT:
We give an overview over recent developments concerning arbitrarily varying wiretap
channels. Especially, we are concerned with the role that common randomness (CR) plays
for this model. We start with the case where no CR is available. Here, we observe super-activation
of the corresponding capacity as well as discontinuities. We characterize the points of discontinuity.
Then, we switch attention to the case where small amounts of CR are available. We state a
corresponding capacity formula. In that regime it is of little importance whether the Eavesdropper
gets to know the CR or not. If one wants to benefit from large amounts of CR, it has to be kept
secret from the Eavesdropper. A capacity formula for this case is given as well. In both cases,
the capacity formulas are given by regularized expressions.
04/02 Abbas Kazemipour (UMD), Robust Estimation of Self-Exciting Point Process with Application to Neuronal Modeling
ABSTRACT:
Binary data can be used to model spontaneous activities in many real-world applications.
Applications include neural spiking activities, seismology, criminology, psyology, finance etc.
Modeling, robust estimation and prediction of such data then becomes a problem of interest.
It turns out that most of the time, future evolution of real-world data depends highly on their history.
In this talk, the performance of l1-regularized maximum likelihood estimator is investigated in
sparse estimation of self-exciting point processes with highly dependent samples, including
the Hawkes process. As we will show such estimation will overcome the shortcomings of standard
maximum likelihood method. Non-asymptotic error bounds and convergence rates will be given as
well statistical tests of goodness-of-fit. A significant gap in mean squared error of the regularized
and maximum likelihood estimates is observed. Application of the regularized estimator to the
LGN neuron spiking data will be given where we successfully recovered their intrinsic oscillatory properties.
04/13 Arya Mazumdar (UMN), Can we have local repair over a network?
ABSTRACT:
We introduce a model of a distributed storage system that is locally recoverable from
any single server failure. Unlike the usual local recovery model of codes for distributed storage,
this model accounts for the fact that each server or storage node in a network is connectible to
only some, and not all other, nodes. This may happen for reasons such as physical separation,
inhomogeneity in storage platforms etc. We estimate the storage capacity of a network under
this model and propose some constructive schemes. Some nice connections to other
graph-problems and generalizations are also provided.
04/23 Maice Costa (UMD), On the characterization of the age of information
ABSTRACT:
Age of information is an emerging concept, proposed to characterize the timeliness of
information. The development of metrics to analytically characterize the effect of an outdated
message on the performance of a system will certainly benefit the analysis and optimization of
communication networks and control systems.
In this work, we consider status update systems, in which information about the status of a
process of interest is transmitted through a network. At the destination node, an action is taken
based on the received information. Hence, the timeliness of the message is an important and
often critical objective. This is the case, for example, in sensor networks, where sensor nodes
report the observations to a central processor. Another example is the use of a feedback channel
to report channel side information in mobile networks.
Our work provides contributions to the initial steps in the characterization of the age of
information when the source node can manage the samples of a process of interest, deciding
to discard or to transmit them to the destination. We model the network using queuing theory,
and analyze the age of information under different policies of packet transmission management.