Skip to main content

Showing 1–12 of 12 results for author: Gonen, M

.
  1. arXiv:2501.13278  [pdf, ps, other

    cs.IT

    On Subset Retrieval and Group Testing Problems with Differential Privacy Constraints

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: This paper focuses on the design and analysis of privacy-preserving techniques for group testing and infection status retrieval. Our work is motivated by the need to provide accurate information on the status of disease spread among a group of individuals while protecting the privacy of the infection status of any single individual involved. The paper is motivated by practical scenarios, such as c… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

  2. arXiv:2202.04988  [pdf, other

    cs.IT

    Group Testing on General Set-Systems

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: Group testing is one of the fundamental problems in coding theory and combinatorics in which one is to identify a subset of contaminated items from a given ground set. There has been renewed interest in group testing recently due to its applications in diagnostic virology, including pool testing for the novel coronavirus. The majority of existing works on group testing focus on the \emph{uniform}… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 7 pages, 1 figure

  3. arXiv:2102.02608  [pdf, ps, other

    cs.IT

    Minimizing the alphabet size in codes with restricted error sets

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: This paper focuses on error-correcting codes that can handle a predefined set of specific error patterns. The need for such codes arises in many settings of practical interest, including wireless communication and flash memory systems. In many such settings, a smaller field size is achievable than that offered by MDS and other standard codes. We establish a connection between the minimum alphabet… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  4. arXiv:2005.06947  [pdf, ps, other

    cs.IT math.CO

    Minimizing the alphabet size of erasure codes with restricted decoding sets

    Authors: Mira Gonen, Ishay Haviv, Michael Langberg, Alex Sprintson

    Abstract: A Maximum Distance Separable code over an alphabet $F$ is defined via an encoding function $C:F^k \rightarrow F^n$ that allows to retrieve a message $m \in F^k$ from the codeword $C(m)$ even after erasing any $n-k$ of its symbols. The minimum possible alphabet size of general (non-linear) MDS codes for given parameters $n$ and $k$ is unknown and forms one of the central open problems in coding the… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: 7 pages, 1 figure

  5. arXiv:1612.02965  [pdf, other

    stat.ML cs.LG q-bio.QM

    BaTFLED: Bayesian Tensor Factorization Linked to External Data

    Authors: Nathan H Lazar, Mehmet Gönen, Kemal Sönmez

    Abstract: The vast majority of current machine learning algorithms are designed to predict single responses or a vector of responses, yet many types of response are more naturally organized as matrices or higher-order tensor objects where characteristics are shared across modes. We present a new machine learning algorithm BaTFLED (Bayesian Tensor Factorization Linked to External Data) that predicts values i… ▽ More

    Submitted 22 December, 2016; v1 submitted 9 December, 2016; originally announced December 2016.

    Comments: 4 main pages with 14 supplemental pages

  6. arXiv:1509.08088  [pdf, other

    cs.MA cs.AI

    Approximation and Heuristic Algorithms for Probabilistic Physical Search on General Graphs

    Authors: Noam Hazon, Mira Gonen, Max Kleb

    Abstract: We consider an agent seeking to obtain an item, potentially available at different locations in a physical environment. The traveling costs between locations are known in advance, but there is only probabilistic knowledge regarding the possible prices of the item at any given location. Given such a setting, the problem is to find a plan that maximizes the probability of acquiring the good while mi… ▽ More

    Submitted 27 September, 2015; originally announced September 2015.

    Comments: 17 pages, 5 figures

  7. arXiv:1211.1275  [pdf, other

    stat.ML

    Kernelized Bayesian Matrix Factorization

    Authors: Mehmet Gönen, Suleiman A. Khan, Samuel Kaski

    Abstract: We extend kernelized matrix factorization with a fully Bayesian treatment and with an ability to work with multiple side information sources expressed as different kernels. Kernel functions have been introduced to matrix factorization to integrate side information about the rows and columns (e.g., objects and users in recommender systems), which is necessary for making out-of-matrix (i.e., cold st… ▽ More

    Submitted 8 May, 2013; v1 submitted 6 November, 2012; originally announced November 2012.

    Comments: Proceedings of the 30th International Conference on Machine Learning (2013)

  8. arXiv:1206.6465  [pdf

    cs.LG stat.ML

    Bayesian Efficient Multiple Kernel Learning

    Authors: Mehmet Gonen

    Abstract: Multiple kernel learning algorithms are proposed to combine kernels in order to obtain a better similarity measure or to integrate feature representations coming from different data sources. Most of the previous research on such methods is focused on the computational efficiency issue. However, it is still not feasible to combine many kernels using existing Bayesian approaches due to their high ti… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the 29th International Conference on Machine Learning (ICML 2012)

  9. arXiv:1202.2088  [pdf, ps, other

    cs.IT

    Coded Cooperative Data Exchange Problem for General Topologies

    Authors: Mira Gonen, Michael Langberg

    Abstract: We consider the "coded cooperative data exchange problem" for general graphs. In this problem, given a graph G=(V,E) representing clients in a broadcast network, each of which initially hold a (not necessarily disjoint) set of information packets; one wishes to design a communication scheme in which eventually all clients will hold all the packets of the network. Communication is performed in roun… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

  10. arXiv:0807.3326  [pdf, ps, other

    cs.NI cs.CC

    An $O(\log n)$-approximation for the Set Cover Problem with Set Ownership

    Authors: Mira Gonen, Yuval Shavitt

    Abstract: In highly distributed Internet measurement systems distributed agents periodically measure the Internet using a tool called {\tt traceroute}, which discovers a path in the network graph. Each agent performs many traceroute measurement to a set of destinations in the network, and thus reveals a portion of the Internet graph as it is seen from the agent locations. In every period we need to check… ▽ More

    Submitted 21 July, 2008; originally announced July 2008.

  11. arXiv:cs/0611157  [pdf, ps, other

    cs.NI

    Bounding the Bias of Tree-Like Sampling in IP Topologies

    Authors: Reuven Cohen, Mira Gonen, Avishai Wool

    Abstract: It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. Most of the evidence showing the power-law distribution is based on BGP data. However, it was recently argued that since BGP collects data in a tree-like fashion, it only produces a sample of the degree distribution, and this sample may be biased. This argument was backed by simulation data and mathema… ▽ More

    Submitted 30 November, 2006; originally announced November 2006.

    Comments: 12 pages, 1 figure

  12. arXiv:cs/0502061  [pdf, ps, other

    cs.NI cs.AR

    A Geographic Directed Preferential Internet Topology Model

    Authors: Sagy Bar, Mira Gonen, Avishai Wool

    Abstract: The goal of this work is to model the peering arrangements between Autonomous Systems (ASes). Most existing models of the AS-graph assume an undirected graph. However, peering arrangements are mostly asymmetric Customer-Provider arrangements, which are better modeled as directed edges. Furthermore, it is well known that the AS-graph, and in particular its clustering structure, is influenced by g… ▽ More

    Submitted 14 February, 2005; originally announced February 2005.

    Comments: 21 pages, 4 figures