Skip to main content

Showing 1–14 of 14 results for author: Hanna, O

.
  1. arXiv:2505.00850  [pdf, other

    cs.LG cs.AI

    ICQuant: Index Coding enables Low-bit LLM Quantization

    Authors: Xinlin Li, Osama Hanna, Christina Fragouli, Suhas Diggavi

    Abstract: The rapid deployment of Large Language Models (LLMs) highlights the need for efficient low-bit post-training quantization (PTQ), due to their high memory costs. A key challenge in weight quantization is the presence of outliers, which inflate quantization ranges and lead to large errors. While a number of outlier suppression techniques have been proposed, they either: fail to effectively shrink th… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  2. arXiv:2504.20894  [pdf, other

    cs.LG stat.ML

    Does Feedback Help in Bandits with Arm Erasures?

    Authors: Merve Karakas, Osama Hanna, Lin F. Yang, Christina Fragouli

    Abstract: We study a distributed multi-armed bandit (MAB) problem over arm erasure channels, motivated by the increasing adoption of MAB algorithms over communication-constrained networks. In this setup, the learner communicates the chosen arm to play to an agent over an erasure channel with probability $ε\in [0,1)$; if an erasure occurs, the agent continues pulling the last successfully received arm; the l… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

  3. arXiv:2504.09707  [pdf, other

    cs.AI cs.IT cs.LG cs.MM

    InfoMAE: Pair-Efficient Cross-Modal Alignment for Multimodal Time-Series Sensing Signals

    Authors: Tomoyoshi Kimura, Xinlin Li, Osama Hanna, Yatong Chen, Yizhuo Chen, Denizhan Kara, Tianshi Wang, Jinyang Li, Xiaomin Ouyang, Shengzhong Liu, Mani Srivastava, Suhas Diggavi, Tarek Abdelzaher

    Abstract: Standard multimodal self-supervised learning (SSL) algorithms regard cross-modal synchronization as implicit supervisory labels during pretraining, thus posing high requirements on the scale and quality of multimodal samples. These constraints significantly limit the performance of sensing intelligence in IoT applications, as the heterogeneity and the non-interpretability of time-series signals re… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

  4. arXiv:2406.18072  [pdf, ps, other

    stat.ML cs.LG

    Learning for Bandits under Action Erasures

    Authors: Osama Hanna, Merve Karakas, Lin F. Yang, Christina Fragouli

    Abstract: We consider a novel multi-arm bandit (MAB) setup, where a learner needs to communicate the actions to distributed agents over erasure channels, while the rewards for the actions are directly available to the learner through external sensors. In our model, while the distributed agents know if an action is erased, the central learner does not (there is no feedback), and thus does not know whether th… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  5. arXiv:2312.14259  [pdf, other

    cs.LG cs.DC cs.MA

    Multi-Agent Bandit Learning through Heterogeneous Action Erasure Channels

    Authors: Osama A. Hanna, Merve Karakas, Lin F. Yang, Christina Fragouli

    Abstract: Multi-Armed Bandit (MAB) systems are witnessing an upswing in applications within multi-agent distributed environments, leading to the advancement of collaborative MAB algorithms. In such settings, communication between agents executing actions and the primary learner making decisions can hinder the learning process. A prevalent challenge in distributed learning is action erasure, often induced by… ▽ More

    Submitted 29 April, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

  6. arXiv:2305.06469  [pdf, other

    cs.IT

    Common Information Dimension

    Authors: Osama Hanna, Xinlin Li, Suhas Diggavi, Christina Fragouli

    Abstract: The exact common information between a set of random variables $X_1,...,X_n$ is defined as the minimum entropy of a shared random variable that allows for the exact distributive simulation of $X_1,...,X_n$. It has been established that, in certain instances, infinite entropy is required to achieve distributive simulation, suggesting that continuous random variables may be needed in such scenarios.… ▽ More

    Submitted 7 July, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

  7. arXiv:2211.05632  [pdf, ps, other

    stat.ML cs.LG

    Contexts can be Cheap: Solving Stochastic Contextual Bandits with Linear Bandit Algorithms

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: In this paper, we address the stochastic contextual linear bandit problem, where a decision maker is provided a context (a random set of actions drawn from a distribution). The expected reward of each action is specified by the inner product of the action and an unknown parameter. The goal is to design an algorithm that learns to play as close as possible to the unknown optimal policy after a numb… ▽ More

    Submitted 26 May, 2023; v1 submitted 8 November, 2022; originally announced November 2022.

  8. arXiv:2207.03445  [pdf, other

    cs.LG cs.CR

    Differentially Private Stochastic Linear Bandits: (Almost) for Free

    Authors: Osama A. Hanna, Antonious M. Girgis, Christina Fragouli, Suhas Diggavi

    Abstract: In this paper, we propose differentially private algorithms for the problem of stochastic linear bandits in the central, local and shuffled models. In the central model, we achieve almost the same regret as the optimal non-private algorithms, which means we get privacy for free. In particular, we achieve a regret of $\tilde{O}(\sqrt{T}+\frac{1}ε)$ matching the known lower bound for private linear… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  9. arXiv:2206.04180  [pdf, ps, other

    cs.LG

    Learning in Distributed Contextual Linear Bandits Without Sharing the Context

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: Contextual linear bandits is a rich and theoretically important model that has many practical applications. Recently, this setup gained a lot of interest in applications over wireless where communication constraints can be a performance bottleneck, especially when the contexts come from a large $d$-dimensional space. In this paper, we consider a distributed memoryless contextual linear bandit lear… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  10. arXiv:2111.06067  [pdf, other

    cs.LG

    Solving Multi-Arm Bandit Using a Few Bits of Communication

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: The multi-armed bandit (MAB) problem is an active learning framework that aims to select the best among a set of actions by sequentially observing rewards. Recently, it has become popular for a number of applications over wireless networks, where communication constraints can form a bottleneck. Existing works usually fail to address this issue and can become infeasible in certain applications. In… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  11. arXiv:2012.07913  [pdf, other

    cs.LG

    Quantizing data for distributed learning

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas Diggavi

    Abstract: We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alt… ▽ More

    Submitted 8 September, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  12. arXiv:1911.00216  [pdf, other

    cs.LG cs.IT stat.ML

    On Distributed Quantization for Classification

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Tara Sadjadpour, Christina Fragouli, Suhas Diggavi

    Abstract: We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  13. arXiv:1803.03610  [pdf, other

    cs.IT

    Random Access Schemes in Wireless Systems With Correlated User Activity

    Authors: Anders Ellersgaard Kalør, Osama A. Hanna, Petar Popovski

    Abstract: Traditional random access schemes are designed based on the aggregate process of user activation, which is created on the basis of independent activations of the users. However, in Machine-Type Communications (MTC), some users are likely to exhibit a high degree of correlation, e.g. because they observe the same physical phenomenon. This paves the way to devise access schemes that combine scheduli… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: Submitted to SPAWC 2018

  14. arXiv:1702.05528  [pdf, other

    cs.IT

    Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations

    Authors: Osama A. Hanna, Amr El-Keyi, Mohammed Nafie

    Abstract: The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.