Skip to main content

Showing 1–43 of 43 results for author: Cadambe, V

.
  1. arXiv:2504.21178  [pdf, ps, other

    cs.IT

    Differentially Private Secure Multiplication with Erasures and Adversaries

    Authors: Haoyang Hu, Viveck R. Cadambe

    Abstract: We consider a private distributed multiplication problem involving N computation nodes and T colluding nodes. Shamir's secret sharing algorithm provides perfect information-theoretic privacy, while requiring an honest majority, i.e., N \ge 2T + 1. Recent work has investigated approximate computation and characterized privacy-accuracy trade-offs for the honest minority setting N \le 2T for real-val… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

    Comments: A short version of this article was accepted at ISIT 2025

  2. arXiv:2410.05540  [pdf, other

    cs.IT cs.LG

    Game of Coding: Sybil Resistant Decentralized Machine Learning with Minimal Trust Assumption

    Authors: Hanzaleh Akbari Nodehi, Viveck R. Cadambe, Mohammad Ali Maddah-Ali

    Abstract: Coding theory plays a crucial role in ensuring data integrity and reliability across various domains, from communication to computation and storage systems. However, its reliance on trust assumptions for data recovery poses significant challenges, particularly in emerging decentralized systems where trust is scarce. To address this, the game of coding framework was introduced, offering insights in… ▽ More

    Submitted 16 October, 2024; v1 submitted 7 October, 2024; originally announced October 2024.

  3. arXiv:2407.03289  [pdf, other

    cs.IT cs.CR cs.LG

    Correlated Privacy Mechanisms for Differentially Private Distributed Mean Estimation

    Authors: Sajani Vithana, Viveck R. Cadambe, Flavio P. Calmon, Haewon Jeong

    Abstract: Differentially private distributed mean estimation (DP-DME) is a fundamental building block in privacy-preserving federated learning, where a central server estimates the mean of $d$-dimensional vectors held by $n$ users while ensuring $(ε,δ)$-DP. Local differential privacy (LDP) and distributed DP with secure aggregation (SA) are the most common notions of DP used in DP-DME settings with an untru… ▽ More

    Submitted 8 January, 2025; v1 submitted 3 July, 2024; originally announced July 2024.

  4. arXiv:2405.06641  [pdf, other

    cs.IT

    On Existence of Latency Optimal Uncoded Storage Schemes in Geo-Distributed Data Storage Systems

    Authors: Srivathsa Acharya, P. Vijay Kumar, Viveck R. Cadambe

    Abstract: We consider the problem of geographically distributed data storage in a network of servers (or nodes) where the nodes are connected to each other via communication links having certain round-trip times (RTTs). Each node serves a specific set of clients, where a client can request for any of the files available in the distributed system. The parent node provides the requested file if available loca… ▽ More

    Submitted 13 May, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

  5. arXiv:2401.16643  [pdf, other

    cs.IT

    Game of Coding: Beyond Honest-Majority Assumptions

    Authors: Hanzaleh Akbari Nodehi, Viveck R. Cadambe, Mohammad Ali Maddah-Ali

    Abstract: Coding theory revolves around the incorporation of redundancy into transmitted symbols, computation tasks, and stored data to guard against adversarial manipulation. However, error correction in coding theory is contingent upon a strict trust assumption. In the context of computation and storage, it is required that honest nodes outnumber adversarial ones by a certain margin. However, in several e… ▽ More

    Submitted 9 September, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

  6. arXiv:2309.16105  [pdf, other

    cs.IT cs.CR cs.DC cs.LG

    Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise

    Authors: Viveck R. Cadambe, Ateet Devulapalli, Haewon Jeong, Flavio P. Calmon

    Abstract: We consider the problem of private distributed multi-party multiplication. It is well-established that Shamir secret-sharing coding strategies can enable perfect information-theoretic privacy in distributed computation via the celebrated algorithm of Ben Or, Goldwasser and Wigderson (the "BGW algorithm"). However, perfect privacy and accuracy require an honest majority, that is, $N \geq 2t+1$ comp… ▽ More

    Submitted 17 January, 2025; v1 submitted 27 September, 2023; originally announced September 2023.

    Comments: Extended version of papers presented in IEEE ISIT 2022, IEEE ISIT 2023 and TPDP 2023

  7. arXiv:2111.12009  [pdf, other

    cs.DC cs.PF

    LEGOStore: A Linearizable Geo-Distributed Store Combining Replication and Erasure Coding

    Authors: Hamidreza Zare, Viveck R. Cadambe, Bhuvan Urgaonkar, Chetan Sharma, Praneet Soni, Nader Alfares, Arif Merchant

    Abstract: We design and implement LEGOStore, an erasure coding (EC) based linearizable data store over geo-distributed public cloud data centers (DCs). For such a data store, the confluence of the following factors opens up opportunities for EC to be latency-competitive with replication: (a) the necessity of communicating with remote DCs to tolerate entire DC failures and implement linearizability; and (b)… ▽ More

    Submitted 3 July, 2022; v1 submitted 23 November, 2021; originally announced November 2021.

    Comments: Extended version of paper to appear in PVLDB 2022

  8. arXiv:2105.01973  [pdf, other

    cs.IT

    $ε$-Approximate Coded Matrix Multiplication is Nearly Twice as Efficient as Exact Multiplication

    Authors: Haewon Jeong, Ateet Devulapalli, Viveck R. Cadambe, Flavio Calmon

    Abstract: We study coded distributed matrix multiplication from an approximate recovery viewpoint. We consider a system of $P$ computation nodes where each node stores $1/m$ of each multiplicand via linear encoding. Our main result shows that the matrix product can be recovered with $ε$ relative error from any $m$ of the $P$ nodes for any $ε> 0$. We obtain this result through a careful specialization of Mat… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  9. arXiv:2102.13310  [pdf, other

    cs.DC cs.IT

    CausalEC: A Causally Consistent Data Storage Algorithm based on Cross-Object Erasure Coding

    Authors: Viveck R. Cadambe, Shihang Lyu

    Abstract: Current causally consistent data storage algorithms use partial or full replication to ensure data access to clients over a distributed setting. We develop, for the first time, an erasure coding-based algorithm called CausalEC that ensures causal consistency for a collection of read-write objects stored in a distributed set of nodes over an asynchronous message-passing system. CausalEC can use an… ▽ More

    Submitted 20 May, 2023; v1 submitted 26 February, 2021; originally announced February 2021.

    Comments: Extended version of a brief announcement at ACM PODC 2023

  10. arXiv:1910.13598  [pdf, other

    cs.LG cs.DC stat.ML

    Local SGD with Periodic Averaging: Tighter Analysis and Adaptive Synchronization

    Authors: Farzin Haddadpour, Mohammad Mahdi Kamani, Mehrdad Mahdavi, Viveck R. Cadambe

    Abstract: Communication overhead is one of the key challenges that hinders the scalability of distributed optimization algorithms. In this paper, we study local distributed SGD, where data is partitioned among computation nodes, and the computation nodes perform local updates with periodically exchanging the model among the workers to perform averaging. While local SGD is empirically shown to provide promis… ▽ More

    Submitted 14 May, 2020; v1 submitted 29 October, 2019; originally announced October 2019.

    Comments: Paper accepted to NeurIPS 2019 - We fixed a flaw in the earlier version regarding the dependency on constants but this change does not affect the communication complexity

  11. arXiv:1903.08326  [pdf, other

    cs.IT

    Numerically Stable Polynomially Coded Computing

    Authors: Mohammad Fahim, Viveck R. Cadambe

    Abstract: We study the numerical stability of polynomial based encoding methods, which has emerged to be a powerful class of techniques for providing straggler and fault tolerance in the area of coded computing. Our contributions are as follows: 1) We construct new codes for matrix multiplication that achieve the same fault/straggler tolerance as the previously constructed MatDot Codes and Polynomial Codes.… ▽ More

    Submitted 22 May, 2019; v1 submitted 19 March, 2019; originally announced March 2019.

    Comments: 31 pages, 13 figures, to be presented in part at the IEEE International Symposium on Information Theory (ISIT), July 2019

  12. arXiv:1810.01527   

    cs.IT

    Harnessing Correlations in Distributed Erasure Coded Key-Value Stores

    Authors: Ramy E. Ali, Viveck Cadambe

    Abstract: Motivated by applications of distributed storage systems to cloud-based key-value stores, the multi-version coding problem has been recently formulated to efficiently store frequently updated data in asynchronous decentralized storage systems. Inspired by consistency requirements in distributed systems, the main goal in multi-version coding is to ensure that the latest possible version of the data… ▽ More

    Submitted 9 March, 2019; v1 submitted 2 October, 2018; originally announced October 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1708.06042 We will update a new version of arXiv:1708.06042 instead

    Journal ref: IEEE Transactions on Communications 2018

  13. arXiv:1806.06140  [pdf, other

    cs.IT

    Straggler-Resilient and Communication-Efficient Distributed Iterative Linear Solver

    Authors: Farzin Haddadpour, Yaoqing Yang, Malhar Chaudhari, Viveck R Cadambe, Pulkit Grover

    Abstract: We propose a novel distributed iterative linear inverse solver method. Our method, PolyLin, has significantly lower communication cost, both in terms of number of rounds as well as number of bits, in comparison with the state of the art at the cost of higher computational complexity and storage. Our algorithm also has a built-in resilience to straggling and faulty computation nodes. We develop a n… ▽ More

    Submitted 15 June, 2018; originally announced June 2018.

    Comments: 15 pages, 3 figures and 2 tables

  14. arXiv:1805.04337  [pdf, other

    cs.IT cs.DC

    Fundamental Limits of Erasure-Coded Key-Value Stores with Side Information

    Authors: Ramy E. Ali, Viveck Cadambe, Jaime Llorca, Antonia Tulino

    Abstract: In applications of distributed storage systems to modern key-value stores, the stored data is highly dynamic due to frequent updates. The multi-version coding problem was formulated to study the cost of storing dynamic data in distributed storage systems. Previous work on multi-version coding considered a completely decentralized and asynchronous system assuming that the servers are not aware of w… ▽ More

    Submitted 18 May, 2019; v1 submitted 11 May, 2018; originally announced May 2018.

    Comments: Extended version of the ISIT 2018 paper that generalizes the code constructions and converse for arbitrary graphs, and a case study based on Amazon web services pricing and latency information

  15. arXiv:1805.03727  [pdf, other

    cs.DC

    ARES: Adaptive, Reconfigurable, Erasure coded, atomic Storage

    Authors: Nicolas Nicolaou, Viveck Cadambe, N. Prakash, Andria Trigeorgi, Kishori M. Konwar, Nancy Lynch, Muriel Medard

    Abstract: Atomicity or strong consistency is one of the fundamental, most intuitive, and hardest to provide primitives in distributed shared memory emulations. To ensure survivability, scalability, and availability of a storage service in the presence of failures, traditional approaches for atomic memory emulation, in message passing environments, replicate the objects across multiple servers. Compared to r… ▽ More

    Submitted 28 May, 2021; v1 submitted 9 May, 2018; originally announced May 2018.

  16. arXiv:1801.10292  [pdf, other

    cs.IT cs.DC

    On the Optimal Recovery Threshold of Coded Matrix Multiplication

    Authors: Sanghamitra Dutta, Mohammad Fahim, Farzin Haddadpour, Haewon Jeong, Viveck Cadambe, Pulkit Grover

    Abstract: We provide novel coded computation strategies for distributed matrix-matrix products that outperform the recent "Polynomial code" constructions in recovery threshold, i.e., the required number of successful workers. When $m$-th fraction of each matrix can be stored in each worker node, Polynomial codes require $m^2$ successful workers, while our MatDot codes only require $2m-1$ successful workers,… ▽ More

    Submitted 16 May, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: Extended version of the paper that appeared at Allerton 2017 (October 2017), including full proofs and further results. Submitted to IEEE Transactions on Information Theory

  17. arXiv:1708.06042  [pdf, other

    cs.IT

    Harnessing Correlations in Distributed Erasure-Coded Key-Value Stores

    Authors: Ramy E. Ali, Viveck R. Cadambe

    Abstract: Motivated by applications of distributed storage systems to key-value stores, the multi-version coding problem was formulated to efficiently store frequently updated data in asynchronous decentralized storage systems. Inspired by consistency requirements in distributed systems, the main goal in the multi-version coding problem is to ensure that the latest possible version of the data is decodable,… ▽ More

    Submitted 9 March, 2019; v1 submitted 20 August, 2017; originally announced August 2017.

    Journal ref: IEEE Transactions on Communications 2019

  18. arXiv:1705.03875  [pdf, other

    cs.IT

    Coded convolution for parallel and distributed computing within a deadline

    Authors: Sanghamitra Dutta, Viveck Cadambe, Pulkit Grover

    Abstract: We consider the problem of computing the convolution of two long vectors using parallel processing units in the presence of "stragglers". Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical distributed systems. We first show that splitting the vectors into smaller pieces and using a linear code to encode these pieces provides bett… ▽ More

    Submitted 10 May, 2017; originally announced May 2017.

    Comments: To appear in ISIT 2017

  19. arXiv:1705.02704  [pdf, other

    cs.IT

    Linear Network Coding for Two-Unicast-$Z$ Networks: A Commutative Algebraic Perspective and Fundamental Limits

    Authors: Mohammad Fahim, Viveck Cadambe

    Abstract: We consider a two-unicast-$Z$ network over a directed acyclic graph of unit capacitated edges; the two-unicast-$Z$ network is a special case of two-unicast networks where one of the destinations has apriori side information of the unwanted (interfering) message. In this paper, we settle open questions on the limits of network coding for two-unicast-$Z$ networks by showing that the generalized netw… ▽ More

    Submitted 25 May, 2018; v1 submitted 7 May, 2017; originally announced May 2017.

    Comments: A short version of this paper is published in the Proceedings of The IEEE International Symposium on Information Theory (ISIT), June 2017

  20. arXiv:1704.05181  [pdf, other

    cs.IT

    "Short-Dot": Computing Large Linear Transforms Distributedly Using Coded Short Dot Products

    Authors: Sanghamitra Dutta, Viveck Cadambe, Pulkit Grover

    Abstract: Faced with saturation of Moore's law and increasing dimension of data, system designers have increasingly resorted to parallel and distributed computing. However, distributed computing is often bottle necked by a small fraction of slow processors called "stragglers" that reduce the speed of computation because the fusion node has to wait for all processors to finish. To combat the effect of stragg… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

    Comments: Presented at NIPS 2016, Barcelona, Spain

  21. arXiv:1605.06844  [pdf, ps, other

    cs.DC cs.IT

    Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation

    Authors: Viveck R. Cadambe, Zhiying Wang, Nancy Lynch

    Abstract: The focus of this paper is to understand storage costs of emulating an atomic shared memory over an asynchronous, distributed message passing system. Previous literature has developed several shared memory emulation algorithms based on replication and erasure coding techniques. In this paper, we present information-theoretic lower bounds on the storage costs incurred by shared memory emulation alg… ▽ More

    Submitted 24 May, 2016; v1 submitted 22 May, 2016; originally announced May 2016.

    MSC Class: 68P30; 68W15 ACM Class: C.2.4; D.4.2

  22. arXiv:1506.00684  [pdf, ps, other

    cs.IT

    Multi-Version Coding - An Information Theoretic Perspective of Consistent Distributed Storage

    Authors: Zhiying Wang, Viveck R. Cadambe

    Abstract: In applications of distributed storage systems to distributed computing and implementation of key- value stores, the following property, usually referred to as consistency in computer science and engineering, is an important requirement: as the data stored changes, the latest version of the data must be accessible to a client that connects to the storage system. An information theoretic formulatio… ▽ More

    Submitted 19 October, 2015; v1 submitted 1 June, 2015; originally announced June 2015.

    Comments: 30 Pages. Extended version of conference publications in ISIT 2014 and Allerton 2014. Revision adds a section, Section VII, and corrects minor typographical errors in the rest of the document

  23. Expanding the Compute-and-Forward Framework: Unequal Powers, Signal Levels, and Multiple Linear Combinations

    Authors: Bobak Nazer, Viveck Cadambe, Vasilis Ntranos, Giuseppe Caire

    Abstract: The compute-and-forward framework permits each receiver in a Gaussian network to directly decode a linear combination of the transmitted messages. The resulting linear combinations can then be employed as an end-to-end communication strategy for relaying, interference alignment, and other applications. Recent efforts have demonstrated the advantages of employing unequal powers at the transmitters… ▽ More

    Submitted 28 June, 2016; v1 submitted 7 April, 2015; originally announced April 2015.

    Comments: 30 pages, 10 figures, to appear in IEEE Transactions on Information Theory

  24. arXiv:1502.07830  [pdf, ps, other

    cs.IT

    File Updates Under Random/Arbitrary Insertions And Deletions

    Authors: Qiwen Wang, Viveck Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard

    Abstract: A client/encoder edits a file, as modeled by an insertion-deletion (InDel) process. An old copy of the file is stored remotely at a data-centre/decoder, and is also available to the client. We consider the problem of throughput- and computationally-efficient communication from the client to the data-centre, to enable the server to update its copy to the newly edited file. We study two models for t… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

    Comments: The paper is an extended version of our paper to be appeared at ITW 2015

  25. arXiv:1502.00656  [pdf, other

    cs.IT

    Alignment based Network Coding for Two-Unicast-Z Networks

    Authors: Weifei Zeng, Viveck R. Cadambe, Muriel Medard

    Abstract: In this paper, we study the wireline two-unicast-Z communication network over directed acyclic graphs. The two-unicast-Z network is a two-unicast network where the destination intending to decode the second message has apriori side information of the first message. We make three contributions in this paper: 1. We describe a new linear network coding algorithm for two-unicast-Z networks over dire… ▽ More

    Submitted 8 February, 2015; v1 submitted 2 February, 2015; originally announced February 2015.

    Comments: The paper is an extended version of our earlier paper at ITW 2014

  26. arXiv:1407.4167  [pdf, ps, other

    cs.DC cs.IT

    A Coded Shared Atomic Memory Algorithm for Message Passing Architectures

    Authors: Viveck R. Cadambe, Nancy Lynch, Muriel Médard, Peter Musial

    Abstract: This paper considers the communication and storage costs of emulating atomic (linearizable) multi-writer multi-reader shared memory in distributed message-passing systems. The paper contains three main contributions: (1) We present a atomic shared-memory emulation algorithm that we call Coded Atomic Storage (CAS). This algorithm uses erasure coding methods. In a storage system with $N$ servers tha… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

    Comments: Part of the results to appear in IEEE Network Computing and Applications (NCA), Aug 2014. This report supersedes MIT CSAIL technical report MIT-CSAIL-TR-2013-016

  27. An Upper Bound On the Size of Locally Recoverable Codes

    Authors: Viveck Cadambe, Arya Mazumdar

    Abstract: In a {\em locally recoverable} or {\em repairable} code, any symbol of a codeword can be recovered by reading only a small (constant) number of other symbols. The notion of local recoverability is important in the area of distributed storage where a most frequent error-event is a single storage node failure (erasure). A common objective is to repair the node by downloading data from as few other s… ▽ More

    Submitted 26 March, 2015; v1 submitted 14 August, 2013; originally announced August 2013.

    Comments: A shorter version has appeared in IEEE NetCod, 2013

    MSC Class: 94B65; 94B25; 94A15

  28. arXiv:1210.0293  [pdf, other

    cs.IT

    Feedback Interference Alignment: Exact Alignment for Three Users in Two Time Slots

    Authors: Vasilis Ntranos, Viveck R. Cadambe, Bobak Nazer, Giuseppe Caire

    Abstract: We study the three-user interference channel where each transmitter has local feedback of the signal from its targeted receiver. We show that in the important case where the channel coefficients are static, exact alignment can be achieved over two time slots using linear schemes. This is in contrast with the interference channel where no feedback is utilized, where it seems that either an infinite… ▽ More

    Submitted 1 October, 2012; originally announced October 2012.

  29. arXiv:1205.1483  [pdf, other

    cs.IT math.CO

    Index Coding - An Interference Alignment Perspective

    Authors: Hamed Maleki, Viveck R. Cadambe, Syed A. Jafar

    Abstract: The index coding problem is studied from an interference alignment perspective, providing new results as well as new insights into, and generalizations of, previously known results. An equivalence is established between multiple unicast index coding where each message is desired by exactly one receiver, and multiple groupcast index coding where a message can be desired by multiple receivers, which… ▽ More

    Submitted 7 May, 2012; originally announced May 2012.

  30. arXiv:1106.1634  [pdf, other

    cs.IT cs.DC cs.NI

    Repair Optimal Erasure Codes through Hadamard Designs

    Authors: Dimitris S. Papailiopoulos, Alexandros G. Dimakis, Viveck R. Cadambe

    Abstract: In distributed storage systems that employ erasure coding, the issue of minimizing the total {\it communication} required to exactly rebuild a storage node after a failure arises. This repair bandwidth depends on the structure of the storage code and the repair strategies used to restore the lost data. Designing high-rate maximum-distance separable (MDS) codes that achieve the optimum repair commu… ▽ More

    Submitted 8 June, 2011; originally announced June 2011.

    Comments: 19 pages, 9 figures

  31. arXiv:1106.1250  [pdf, ps, other

    cs.IT

    Optimal Repair of MDS Codes in Distributed Storage via Subspace Interference Alignment

    Authors: Viveck R. Cadambe, Cheng Huang, Syed A. Jafar, Jin Li

    Abstract: It is well known that an (n,k) code can be used to store 'k' units of information in 'n' unit-capacity disks of a distributed data storage system. If the code used is maximum distance separable (MDS), then the system can tolerate any (n-k) disk failures, since the original information can be recovered from any k surviving disks. The focus of this paper is the design of a systematic MDS code with t… ▽ More

    Submitted 6 June, 2011; originally announced June 2011.

    Comments: To be presented in part at ISIT 2011

  32. arXiv:1004.4299  [pdf, other

    cs.IT

    Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

    Authors: Viveck R. Cadambe, Syed A. Jafar, Hamed Maleki

    Abstract: We consider a set up where a file of size M is stored in n distributed storage nodes, using an (n,k) minimum storage regenerating (MSR) code, i.e., a maximum distance separable (MDS) code that also allows efficient exact-repair of any failed node. The problem of interest in this paper is to minimize the repair bandwidth B for exact regeneration of a single failed node, i.e., the minimum data to… ▽ More

    Submitted 24 April, 2010; originally announced April 2010.

  33. arXiv:1001.4120  [pdf, ps, other

    cs.IT

    Sum-Capacity and the Unique Separability of the Parallel Gaussian MAC-Z-BC Network

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: It is known that the capacity of parallel (e.g., multi-carrier) Gaussian point-to-point, multiple access and broadcast channels can be achieved by separate encoding for each subchannel (carrier) subject to a power allocation across carriers. Recent results have shown that parallel interference channels are not separable, i.e., joint coding is needed to achieve capacity in general. This work stud… ▽ More

    Submitted 22 January, 2010; originally announced January 2010.

    Comments: Submitted to ISIT 2010

  34. arXiv:0912.3029  [pdf, ps, other

    cs.IT

    Interference Alignment and a Noisy Interference Regime for Many-to-One Interference Channels

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: We study the capacity of discrete memoryless many-to-one interference channels, i.e., K user interference channels where only one receiver faces interference. For a class of many-to-one interference channels, we identify a noisy interference regime, i.e., a regime where random coding and treating interference as noise achieves sum-capacity. Specializing our results to the Gaussian MIMO many-to-o… ▽ More

    Submitted 15 December, 2009; originally announced December 2009.

    Comments: 21 pages. Partially presented at 47th Allerton Conference on Communication, Control, and Computing, Sep, 2009

  35. arXiv:0904.0274  [pdf, other

    cs.IT

    Interference Alignment with Asymmetric Complex Signaling - Settling the Host-Madsen-Nosratinia Conjecture

    Authors: Viveck R. Cadambe, Syed A. Jafar, Chenwei Wang

    Abstract: It has been conjectured by Host-Madsen and Nosratinia that complex Gaussian interference channels with constant channel coefficients have only one degree-of-freedom regardless of the number of users. While several examples are known of constant channels that achieve more than 1 degree of freedom, these special cases only span a subset of measure zero. In other words, for almost all channel coeff… ▽ More

    Submitted 1 April, 2009; originally announced April 2009.

    Journal ref: IEEE Transactions on Information Theory, Sep. 2010, Vol. 56, Issue: 9, Pages: 4552-4565

  36. arXiv:0810.4741  [pdf, ps, other

    cs.IT

    On the Capacity and Generalized Degrees of Freedom of the X Channel

    Authors: Chiachi Huang, Viveck R. Cadambe, Syed A. Jafar

    Abstract: We explore the capacity and generalized degrees of freedom of the two-user Gaussian X channel, i.e. a generalization of the 2 user interference channel where there is an independent message from each transmitter to each receiver. There are three main results in this paper. First, we characterize the sum capacity of the deterministic X channel model under a symmetric setting. Second, we character… ▽ More

    Submitted 27 October, 2008; originally announced October 2008.

  37. Approaching the Capacity of Wireless Networks through Distributed Interference Alignment

    Authors: Krishna Gomadam, Viveck R. Cadambe, Syed A. Jafar

    Abstract: Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to which interference can be aligned over a finite number of signalling dimensions remains unknown. Another important concern for interference alignment schemes is the requirement of global channel knowledge. In this work we provide examples… ▽ More

    Submitted 26 March, 2008; originally announced March 2008.

    Comments: 10 pages 2 columns

    Journal ref: IEEE Transactions on Information Theory, Vol. 57, No. 6, June, 2011, Pages: 3309-3322

  38. Multiple Access Outerbounds and the Inseparability of Parallel Interference Channels

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: It is known that the capacity of parallel (multi-carrier) Gaussian point-to-point, multiple access and broadcast channels can be achieved by separate encoding for each subchannel (carrier) subject to a power allocation across carriers. In this paper we show that such a separation does not apply to parallel Gaussian interference channels in general. A counter-example is provided in the form of a… ▽ More

    Submitted 14 February, 2008; originally announced February 2008.

    Journal ref: IEEE Transactions on Information Theory, Vol. 55, No. 9, Sep. 2009,Pages: 3983-3990

  39. arXiv:0802.0534  [pdf, ps, other

    cs.IT

    Capacity of Wireless Networks within o(log(SNR)) - the Impact of Relays, Feedback, Cooperation and Full-Duplex Operation

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: Recent work has characterized the sum capacity of time-varying/frequency-selective wireless interference networks and $X$ networks within $o(\log({SNR}))$, i.e., with an accuracy approaching 100% at high SNR (signal to noise power ratio). In this paper, we seek similar capacity characterizations for wireless networks with relays, feedback, full duplex operation, and transmitter/receiver cooperat… ▽ More

    Submitted 4 February, 2008; originally announced February 2008.

    Journal ref: IEEE Transactions on Information Theory, Vol. 55, No. 5, May 2009, Pages: 2334-2344

  40. arXiv:0711.2824  [pdf, ps, other

    cs.IT

    Degrees of Freedom of Wireless X Networks

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: We explore the degrees of freedom of $M\times N$ user wireless $X$ networks, i.e. networks of $M$ transmitters and $N$ receivers where every transmitter has an independent message for every receiver. We derive a general outerbound on the degrees of freedom \emph{region} of these networks. When all nodes have a single antenna and all channel coefficients vary in time or frequency, we show that th… ▽ More

    Submitted 18 November, 2007; originally announced November 2007.

    Comments: 26 pages

  41. arXiv:0711.2547  [pdf, ps, other

    cs.IT

    Interference Alignment on the Deterministic Channel and Application to Fully Connected AWGN Interference Networks

    Authors: Viveck Cadambe, Syed A. Jafar, Shlomo Shamai

    Abstract: An interference alignment example is constructed for the deterministic channel model of the $K$ user interference channel. The deterministic channel example is then translated into the Gaussian setting, creating the first known example of a fully connected Gaussian $K$ user interference network with single antenna nodes, real, non-zero and contant channel coefficients, and no propagation delays… ▽ More

    Submitted 15 November, 2007; originally announced November 2007.

  42. arXiv:0707.0323  [pdf, ps, other

    cs.IT

    Interference Alignment and the Degrees of Freedom for the K User Interference Channel

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: While the best known outerbound for the K user interference channel states that there cannot be more than K/2 degrees of freedom, it has been conjectured that in general the constant interference channel with any number of users has only one degree of freedom. In this paper, we explore the spatial degrees of freedom per orthogonal time and frequency dimension for the K user wireless interference… ▽ More

    Submitted 10 July, 2007; v1 submitted 3 July, 2007; originally announced July 2007.

    Comments: 30 pages. Revision extends the 3 user proof to K users

  43. arXiv:0706.1399  [pdf, ps, other

    cs.IT

    Duality and Stability Regions of Multi-rate Broadcast and Multiple Access Networks

    Authors: Viveck R. Cadambe, Syed A. Jafar

    Abstract: We characterize stability regions of two-user fading Gaussian multiple access (MAC) and broadcast (BC) networks with centralized scheduling. The data to be transmitted to the users is encoded into codewords of fixed length. The rates of the codewords used are restricted to a fixed set of finite cardinality. With successive decoding and interference cancellation at the receivers, we find the set… ▽ More

    Submitted 11 June, 2007; originally announced June 2007.

    Comments: 12 pages, 11 figures, submitted to IEEE Trans. Information Theory for review