-
Tempo: Helping Data Scientists and Domain Experts Collaboratively Specify Predictive Modeling Tasks
Authors:
Venkatesh Sivaraman,
Anika Vaishampayan,
Xiaotong Li,
Brian R Buck,
Ziyong Ma,
Richard D Boyce,
Adam Perer
Abstract:
Temporal predictive models have the potential to improve decisions in health care, public services, and other domains, yet they often fail to effectively support decision-makers. Prior literature shows that many misalignments between model behavior and decision-makers' expectations stem from issues of model specification, namely how, when, and for whom predictions are made. However, model specific…
▽ More
Temporal predictive models have the potential to improve decisions in health care, public services, and other domains, yet they often fail to effectively support decision-makers. Prior literature shows that many misalignments between model behavior and decision-makers' expectations stem from issues of model specification, namely how, when, and for whom predictions are made. However, model specifications for predictive tasks are highly technical and difficult for non-data-scientist stakeholders to interpret and critique. To address this challenge we developed Tempo, an interactive system that helps data scientists and domain experts collaboratively iterate on model specifications. Using Tempo's simple yet precise temporal query language, data scientists can quickly prototype specifications with greater transparency about pre-processing choices. Moreover, domain experts can assess performance within data subgroups to validate that models behave as expected. Through three case studies, we demonstrate how Tempo helps multidisciplinary teams quickly prune infeasible specifications and identify more promising directions to explore.
△ Less
Submitted 20 February, 2025; v1 submitted 14 February, 2025;
originally announced February 2025.
-
Effective Capacity of a Battery Energy Storage System Captive to a Wind Farm
Authors:
Vinay A. Vaishampayan,
Thilaharani Antony,
Amirthagunaraj Yogarathnam
Abstract:
Wind energy's role in the global electric grid is set to expand significantly. New York State alone anticipates offshore wind farms (WFs) contributing 9GW by 2035. Integration of energy storage emerges as crucial for this advancement. In this study, we focus on a WF paired with a captive battery energy storage system (BESS). We aim to ascertain the capacity credit for a BESS with specified energy…
▽ More
Wind energy's role in the global electric grid is set to expand significantly. New York State alone anticipates offshore wind farms (WFs) contributing 9GW by 2035. Integration of energy storage emerges as crucial for this advancement. In this study, we focus on a WF paired with a captive battery energy storage system (BESS). We aim to ascertain the capacity credit for a BESS with specified energy and power ratings. Unlike prior methods rooted in reliability theory, we define a power alignment function, which leads to a straightforward definition of capacity and incremental capacity for the BESS. We develop a solution method based on a linear programming formulation. Our analysis utilizes wind data, collected by NYSERDA off Long Island's coast and load demand data from NYISO. Additionally, we present theoretical insights into BESS sizing and a key time-series property influencing BESS capacity, aiding in simulating wind and demand for estimating BESS energy requirements.
△ Less
Submitted 6 November, 2024;
originally announced November 2024.
-
On Communication for Distributed Babai Point Computation
Authors:
Maiara F. Bollauf,
Vinay A. Vaishampayan,
Sueli I. R. Costa
Abstract:
We present a communication-efficient distributed protocol for computing the Babai point, an approximate nearest point for a random vector ${\bf X}\in\mathbb{R}^n$ in a given lattice. We show that the protocol is optimal in the sense that it minimizes the sum rate when the components of ${\bf X}$ are mutually independent. We then investigate the error probability, i.e. the probability that the Baba…
▽ More
We present a communication-efficient distributed protocol for computing the Babai point, an approximate nearest point for a random vector ${\bf X}\in\mathbb{R}^n$ in a given lattice. We show that the protocol is optimal in the sense that it minimizes the sum rate when the components of ${\bf X}$ are mutually independent. We then investigate the error probability, i.e. the probability that the Babai point does not coincide with the nearest lattice point. In dimensions two and three, this probability is seen to grow with the packing density. For higher dimensions, we use a bound from probability theory to estimate the error probability for some well-known lattices. Our investigations suggest that for uniform distributions, the error probability becomes large with the dimension of the lattice, for lattices with good packing densities. We also consider the case where $\mathbf{X}$ is obtained by adding Gaussian noise to a randomly chosen lattice point. In this case, the error probability goes to zero with the lattice dimension when the noise variance is sufficiently small. In such cases, a distributed algorithm for finding the approximate nearest lattice point is sufficient for finding the nearest lattice point.
△ Less
Submitted 29 August, 2020;
originally announced August 2020.
-
Classification in a Large Network
Authors:
Vinay A. Vaishampayan
Abstract:
We construct and analyze the communication cost of protocols (interactive and one-way) for classifying ${\mathbf X}=(X_1,X_2,\ldots,X_n) \in [0,1)^n \subset \mathbb{R}^n$, in a network with $n\geq 2$ nodes, with $X_i$ known only at node $i$. The classifier takes the form $\sum_{i=1}^nh_iX_i \gtrless a$, with weights $h_i \in \{-1,+1\}$. The interactive protocol (a zero-error protocol) exchanges a…
▽ More
We construct and analyze the communication cost of protocols (interactive and one-way) for classifying ${\mathbf X}=(X_1,X_2,\ldots,X_n) \in [0,1)^n \subset \mathbb{R}^n$, in a network with $n\geq 2$ nodes, with $X_i$ known only at node $i$. The classifier takes the form $\sum_{i=1}^nh_iX_i \gtrless a$, with weights $h_i \in \{-1,+1\}$. The interactive protocol (a zero-error protocol) exchanges a variable number of messages depending on the input ${\mathbf X}$ and its sum rate is directly proportional to its mean stopping time. An exact analysis, as well as an approximation of the mean stopping time is presented and shows that it depends on $γ=α+(1/2-β)$, where $α=a/n$ and $β=m/n$, with $m$ being the number of positive weights. In particular, the mean stopping time grows logarithmically in $n$ when $γ=0$, and is bounded in $n$ otherwise. Comparisons show that the sum rate of the interactive protocol is smaller than that of the one-way protocol when the error probability for the one-way protocol is small, with the reverse being true when the error probability is large. Comparisons of the interactive protocol are also made with lower bounds on the sum rate.
△ Less
Submitted 7 March, 2019; v1 submitted 14 February, 2019;
originally announced February 2019.
-
Interactive Nearest Lattice Point Search in a Distributed Setting: Two Dimensions
Authors:
V. A. Vaishampayan,
M. F. Bollauf
Abstract:
The nearest lattice point problem in $\mathbb{R}^n$ is formulated in a distributed network with $n$ nodes. The objective is to minimize the probability that an incorrect lattice point is found, subject to a constraint on inter-node communication. Algorithms with a single as well as an unbounded number of rounds of communication are considered for the case $n=2$. For the algorithm with a single rou…
▽ More
The nearest lattice point problem in $\mathbb{R}^n$ is formulated in a distributed network with $n$ nodes. The objective is to minimize the probability that an incorrect lattice point is found, subject to a constraint on inter-node communication. Algorithms with a single as well as an unbounded number of rounds of communication are considered for the case $n=2$. For the algorithm with a single round, expressions are derived for the error probability as a function of the total number of communicated bits. We observe that the error exponent depends on the lattice structure and that zero error requires an infinite number of communicated bits. In contrast, with an infinite number of allowed communication rounds, the nearest lattice point can be determined without error with a finite average number of communicated bits and a finite average number of rounds of communication. In two dimensions, the hexagonal lattice, which is most efficient for communication and compression, is found to be the most expensive in terms of communication cost.
△ Less
Submitted 16 September, 2024; v1 submitted 29 January, 2018;
originally announced January 2018.
-
Communication-Efficient Search for an Approximate Closest Lattice Point
Authors:
Maiara F. Bollauf,
Vinay A. Vaishampayan,
Sueli I. R. Costa
Abstract:
We consider the problem of finding the closest lattice point to a vector in n-dimensional Euclidean space when each component of the vector is available at a distinct node in a network. Our objectives are (i) minimize the communication cost and (ii) obtain the error probability. The approximate closest lattice point considered here is the one obtained using the nearest-plane (Babai) algorithm. Ass…
▽ More
We consider the problem of finding the closest lattice point to a vector in n-dimensional Euclidean space when each component of the vector is available at a distinct node in a network. Our objectives are (i) minimize the communication cost and (ii) obtain the error probability. The approximate closest lattice point considered here is the one obtained using the nearest-plane (Babai) algorithm. Assuming a triangular special basis for the lattice, we develop communication-efficient protocols for computing the approximate lattice point and determine the communication cost for lattices of dimension n>1. Based on available parameterizations of reduced bases, we determine the error probability of the nearest plane algorithm for two dimensional lattices analytically, and present a computational error estimation algorithm in three dimensions. For dimensions 2 and 3, our results show that the error probability increases with the packing density of the lattice.
△ Less
Submitted 29 January, 2018;
originally announced January 2018.
-
Lattice Erasure Codes of Low Rank with Noise Margins
Authors:
Vinay A. Vaishampayan
Abstract:
We consider the following generalization of an $(n,k)$ MDS code for application to an erasure channel with additive noise. Like an MDS code, our code is required to be decodable from any $k$ received symbols, in the absence of noise. In addition, we require that the noise margin for every allowable erasure pattern be as large as possible and that the code satisfy a power constraint. In this paper…
▽ More
We consider the following generalization of an $(n,k)$ MDS code for application to an erasure channel with additive noise. Like an MDS code, our code is required to be decodable from any $k$ received symbols, in the absence of noise. In addition, we require that the noise margin for every allowable erasure pattern be as large as possible and that the code satisfy a power constraint. In this paper we derive performance bounds and present a few designs for low rank lattice codes for an additive noise channel with erasures.
△ Less
Submitted 13 January, 2018;
originally announced January 2018.
-
Towards a Converse for the Nearest Lattice Point Problem
Authors:
Vinay A. Vaishampayan
Abstract:
Upper bounds on the communication complexity of finding the nearest lattice point in a given lattice $Λ\subset \mathbb{R}^2$ was considered in earlier works~\cite{VB:2017}, for a two party, interactive communication model. Here we derive a lower bound on the communication complexity of a key step in that procedure. Specifically, the problem considered is that of interactively finding…
▽ More
Upper bounds on the communication complexity of finding the nearest lattice point in a given lattice $Λ\subset \mathbb{R}^2$ was considered in earlier works~\cite{VB:2017}, for a two party, interactive communication model. Here we derive a lower bound on the communication complexity of a key step in that procedure. Specifically, the problem considered is that of interactively finding $\min(X_1,X_2)$, when $(X_1,X_2)$ is uniformly distributed on the unit square. A lower bound is derived on the single-shot interactive communication complexity and shown to be tight. This is accomplished by characterizing the constraints placed on the partition generated by an interactive code and exploiting a self similarity property of an optimal solution.
△ Less
Submitted 24 March, 2018; v1 submitted 13 November, 2017;
originally announced November 2017.
-
Communication Cost of Transforming a Nearest Plane Partition to the Voronoi Partition
Authors:
V. A. Vaishampayan,
M. F. Bollauf
Abstract:
We consider the problem of distributed computation of the nearest lattice point for a two dimensional lattice. An interactive model of communication is considered. We address the problem of reconfiguring a specific rectangular partition, a nearest plane, or Babai, partition, into the Voronoi partition. Expressions are derived for the error probability as a function of the total number of communica…
▽ More
We consider the problem of distributed computation of the nearest lattice point for a two dimensional lattice. An interactive model of communication is considered. We address the problem of reconfiguring a specific rectangular partition, a nearest plane, or Babai, partition, into the Voronoi partition. Expressions are derived for the error probability as a function of the total number of communicated bits. With an infinite number of allowed communication rounds, the average cost of achieving zero error probability is shown to be finite. For the interactive model, with a single round of communication, expressions are obtained for the error probability as a function of the bits exchanged. We observe that the error exponent depends on the lattice.
△ Less
Submitted 29 January, 2017;
originally announced January 2017.
-
On the Communication Cost of Determining an Approximate Nearest Lattice Point
Authors:
M. F. Bollauf,
V. A. Vaishampayan,
S. I. R. Costa
Abstract:
We consider the closest lattice point problem in a distributed network setting and study the communication cost and the error probability for computing an approximate nearest lattice point, using the nearest-plane algorithm, due to Babai. Two distinct communication models, centralized and interactive, are considered. The importance of proper basis selection is addressed. Assuming a reduced basis f…
▽ More
We consider the closest lattice point problem in a distributed network setting and study the communication cost and the error probability for computing an approximate nearest lattice point, using the nearest-plane algorithm, due to Babai. Two distinct communication models, centralized and interactive, are considered. The importance of proper basis selection is addressed. Assuming a reduced basis for a two-dimensional lattice, we determine the approximation error of the nearest plane algorithm. The communication cost for determining the Babai point, or equivalently, for constructing the rectangular nearest-plane partition, is calculated in the interactive setting. For the centralized model, an algorithm is presented for reducing the communication cost of the nearest plane algorithm in an arbitrary number of dimensions.
△ Less
Submitted 26 April, 2017; v1 submitted 29 January, 2017;
originally announced January 2017.
-
A Generalization of Montucla's Rectangle-to-Rectangle Dissection to Higher Dimensions
Authors:
Antonio Campello,
Vinay A. Vaishampayan
Abstract:
Dissections of polytopes are a well-studied subject by geometers as well as recreational mathematicians. A recent application in coding theory arises from the problem of parameterizing binary vectors of constant Hamming weight which has been shown previously to be equivalent to the problem of dissecting a tetrahedron to a brick. Applications of dissections also arise in problems related to the con…
▽ More
Dissections of polytopes are a well-studied subject by geometers as well as recreational mathematicians. A recent application in coding theory arises from the problem of parameterizing binary vectors of constant Hamming weight which has been shown previously to be equivalent to the problem of dissecting a tetrahedron to a brick. Applications of dissections also arise in problems related to the construction of analog codes.
Here we consider the rectangle-to-rectangle dissection due to Montucla. Montucla's dissection is first reinterpreted in terms of the Two Tile Theorem. Based on this, a cube-to-brick dissection is developed in $\mathbb{R}^n$. We present a linear time algorithm (in $n$) that computes the dissection, i.e. determines a point in the cube given a point in a specific realization of the brick. An application of this algorithm to a previously reported analog coding scheme is also discussed.
△ Less
Submitted 12 June, 2015;
originally announced June 2015.
-
Reliability of Erasure Coded Storage Systems: A Geometric Approach
Authors:
Antonio Campello,
Vinay A. Vaishampayan
Abstract:
We consider the probability of data loss, or equivalently, the reliability function for an erasure coded distributed data storage system under worst case conditions. Data loss in an erasure coded system depends on probability distributions for the disk repair duration and the disk failure duration. In previous works, the data loss probability of such systems has been studied under the assumption o…
▽ More
We consider the probability of data loss, or equivalently, the reliability function for an erasure coded distributed data storage system under worst case conditions. Data loss in an erasure coded system depends on probability distributions for the disk repair duration and the disk failure duration. In previous works, the data loss probability of such systems has been studied under the assumption of exponentially distributed disk failure and disk repair durations, using well-known analytic methods from the theory of Markov processes. These methods lead to an estimate of the integral of the reliability function.
Here, we address the problem of directly calculating the data loss probability for general repair and failure duration distributions. A closed limiting form is developed for the probability of data loss and it is shown that the probability of the event that a repair duration exceeds a failure duration is sufficient for characterizing the data loss probability.
For the case of constant repair duration, we develop an expression for the conditional data loss probability given the number of failures experienced by a each node in a given time window. We do so by developing a geometric approach that relies on the computation of volumes of a family of polytopes that are related to the code. An exact calculation is provided and an upper bound on the data loss probability is obtained by posing the problem as a set avoidance problem. Theoretical calculations are compared to simulation results.
△ Less
Submitted 19 August, 2015; v1 submitted 25 September, 2014;
originally announced September 2014.
-
Layered, Exact-Repair Regenerating Codes Via Embedded Error Correction and Block Designs
Authors:
Chao Tian,
Birenjith Sasidharan,
Vaneet Aggarwal,
Vinay A. Vaishampayan,
P. Vijay Kumar
Abstract:
A new class of exact-repair regenerating codes is constructed by stitching together shorter erasure correction codes, where the stitching pattern can be viewed as block designs. The proposed codes have the "help-by-transfer" property where the helper nodes simply transfer part of the stored data directly, without performing any computation. This embedded error correction structure makes the decodi…
▽ More
A new class of exact-repair regenerating codes is constructed by stitching together shorter erasure correction codes, where the stitching pattern can be viewed as block designs. The proposed codes have the "help-by-transfer" property where the helper nodes simply transfer part of the stored data directly, without performing any computation. This embedded error correction structure makes the decoding process straightforward, and in some cases the complexity is very low. We show that this construction is able to achieve performance better than space-sharing between the minimum storage regenerating codes and the minimum repair-bandwidth regenerating codes, and it is the first class of codes to achieve this performance. In fact, it is shown that the proposed construction can achieve a non-trivial point on the optimal functional-repair tradeoff, and it is asymptotically optimal at high rate, i.e., it asymptotically approaches the minimum storage and the minimum repair-bandwidth simultaneously.
△ Less
Submitted 2 August, 2014;
originally announced August 2014.
-
Distributed Data Storage Systems with Opportunistic Repair
Authors:
Vaneet Aggarwal,
Chao Tian,
Vinay A. Vaishampayan,
Yih-Farn R. Chen
Abstract:
The reliability of erasure-coded distributed storage systems, as measured by the mean time to data loss (MTTDL), depends on the repair bandwidth of the code. Repair-efficient codes provide reliability values several orders of magnitude better than conventional erasure codes. Current state of the art codes fix the number of helper nodes (nodes participating in repair) a priori. In practice, however…
▽ More
The reliability of erasure-coded distributed storage systems, as measured by the mean time to data loss (MTTDL), depends on the repair bandwidth of the code. Repair-efficient codes provide reliability values several orders of magnitude better than conventional erasure codes. Current state of the art codes fix the number of helper nodes (nodes participating in repair) a priori. In practice, however, it is desirable to allow the number of helper nodes to be adaptively determined by the network traffic conditions. In this work, we propose an opportunistic repair framework to address this issue. It is shown that there exists a threshold on the storage overhead, below which such an opportunistic approach does not lose any efficiency from the optimal storage-repair-bandwidth tradeoff; i.e. it is possible to construct a code simultaneously optimal for different numbers of helper nodes. We further examine the benefits of such opportunistic codes, and derive the MTTDL improvement for two repair models: one with limited total repair bandwidth and the other with limited individual-node repair bandwidth. In both settings, we show orders of magnitude improvement in MTTDL. Finally, the proposed framework is examined in a network setting where a significant improvement in MTTDL is observed.
△ Less
Submitted 6 November, 2014; v1 submitted 16 November, 2013;
originally announced November 2013.
-
Exact-Repair Regenerating Codes Via Layered Erasure Correction and Block Designs
Authors:
Chao Tian,
Vaneet Aggarwal,
Vinay A. Vaishampayan
Abstract:
A new class of exact-repair regenerating codes is constructed by combining two layers of erasure correction codes together with combinatorial block designs, e.g., Steiner systems, balanced incomplete block designs and t-designs. The proposed codes have the "uncoded repair" property where the nodes participating in the repair simply transfer part of the stored data directly, without performing any…
▽ More
A new class of exact-repair regenerating codes is constructed by combining two layers of erasure correction codes together with combinatorial block designs, e.g., Steiner systems, balanced incomplete block designs and t-designs. The proposed codes have the "uncoded repair" property where the nodes participating in the repair simply transfer part of the stored data directly, without performing any computation. The layered error correction structure makes the decoding process rather straightforward, and in general the complexity is low. We show that this construction is able to achieve performance better than time-sharing between the minimum storage regenerating codes and the minimum repair-bandwidth regenerating codes.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.
-
Constructive spherical codes on layers of flat tori
Authors:
Cristiano Torezzan,
Sueli I. R. Costa,
Vinay A. Vaishampayan
Abstract:
A new class of spherical codes is constructed by selecting a finite subset of flat tori from a foliation of the unit sphere S^{2L-1} of R^{2L} and designing a structured codebook on each torus layer. The resulting spherical code can be the image of a lattice restricted to a specific hyperbox in R^L in each layer. Group structure and homogeneity, useful for efficient storage and decoding, are inher…
▽ More
A new class of spherical codes is constructed by selecting a finite subset of flat tori from a foliation of the unit sphere S^{2L-1} of R^{2L} and designing a structured codebook on each torus layer. The resulting spherical code can be the image of a lattice restricted to a specific hyperbox in R^L in each layer. Group structure and homogeneity, useful for efficient storage and decoding, are inherited from the underlying lattice codebook. A systematic method for constructing such codes are presented and, as an example, the Leech lattice is used to construct a spherical code in R^{48}. Upper and lower bounds on the performance, the asymptotic packing density and a method for decoding are derived.
△ Less
Submitted 26 May, 2012;
originally announced May 2012.
-
Query Matrices for Retrieving Binary Vectors Based on the Hamming Distance Oracle
Authors:
Vinay Anant Vaishampayan
Abstract:
The Hamming oracle returns the Hamming distance between an unknown binary $n$-vector $x$ and a binary query $n$-vector y. The objective is to determine $x$ uniquely using a sequence of $m$ queries. What are the minimum number of queries required in the worst case? We consider the query ratio $m/n$ to be our figure of merit and derive upper bounds on the query ratio by explicitly constructing…
▽ More
The Hamming oracle returns the Hamming distance between an unknown binary $n$-vector $x$ and a binary query $n$-vector y. The objective is to determine $x$ uniquely using a sequence of $m$ queries. What are the minimum number of queries required in the worst case? We consider the query ratio $m/n$ to be our figure of merit and derive upper bounds on the query ratio by explicitly constructing $(m,n)$ query matrices. We show that our recursive and algebraic construction results in query ratios arbitrarily close to zero. Our construction is based on codes of constant weight. A decoding algorithm for recovering the unknown binary vector is also described.
△ Less
Submitted 13 February, 2012;
originally announced February 2012.
-
A Note on Projecting the Cubic Lattice
Authors:
N. J. A. Sloane,
Vinay A. Vaishampayan,
Sueli I. R. Costa
Abstract:
It is shown that, given any (n-1)-dimensional lattice L, there is a vector v in Z^n such that the projection of Z^n onto v^perp is arbitrarily close to L. The problem arises in attempting to find the largest cylinder anchored at two points of Z^n and containing no other points of Z^n.
It is shown that, given any (n-1)-dimensional lattice L, there is a vector v in Z^n such that the projection of Z^n onto v^perp is arbitrarily close to L. The problem arises in attempting to find the largest cylinder anchored at two points of Z^n and containing no other points of Z^n.
△ Less
Submitted 16 July, 2010; v1 submitted 18 April, 2010;
originally announced April 2010.
-
Generalizations of Schöbi's Tetrahedral Dissection
Authors:
N. J. A. Sloane,
Vinay A. Vaishampayan
Abstract:
Let v_1, ..., v_n be unit vectors in R^n such that v_i . v_j = -w for i != j, where -1 <w < 1/(n-1). The points Sum_{i=1..n} lambda_i v_i, where 1 >= lambda_1 >= ... >= lambda_n >= 0, form a ``Hill-simplex of the first type'', denoted by Q_n(w). It was shown by Hadwiger in 1951 that Q_n(w) is equidissectable with a cube. In 1985, Schöbi gave a three-piece dissection of Q_3(w) into a triangular p…
▽ More
Let v_1, ..., v_n be unit vectors in R^n such that v_i . v_j = -w for i != j, where -1 <w < 1/(n-1). The points Sum_{i=1..n} lambda_i v_i, where 1 >= lambda_1 >= ... >= lambda_n >= 0, form a ``Hill-simplex of the first type'', denoted by Q_n(w). It was shown by Hadwiger in 1951 that Q_n(w) is equidissectable with a cube. In 1985, Schöbi gave a three-piece dissection of Q_3(w) into a triangular prism c Q_2(1/2) X I, where I denotes an interval and c = sqrt{2(w+1)/3}. The present paper generalizes Schöbi's dissection to an n-piece dissection of Q_n(w) into a prism c Q_{n-1}(1/(n-1)) X I, where c = sqrt{(n-1)(w+1)/n}. Iterating this process leads to a dissection of Q_n(w) into an n-dimensional rectangular parallelepiped (or ``brick'') using at most n! pieces. The complexity of computing the map from Q_n(w) to the brick is O(n^2). A second generalization of Schöbi's dissection is given which applies specifically in R^4. The results have applications to source coding and to constant-weight binary codes.
△ Less
Submitted 13 November, 2007; v1 submitted 20 October, 2007;
originally announced October 2007.
-
Constant Weight Codes: A Geometric Approach Based on Dissections
Authors:
Chao Tian,
Vinay A. Vaishampayan,
N. J. A. Sloane
Abstract:
We present a novel technique for encoding and decoding constant weight binary codes that uses a geometric interpretation of the codebook. Our technique is based on embedding the codebook in a Euclidean space of dimension equal to the weight of the code. The encoder and decoder mappings are then interpreted as a bijection between a certain hyper-rectangle and a polytope in this Euclidean space. A…
▽ More
We present a novel technique for encoding and decoding constant weight binary codes that uses a geometric interpretation of the codebook. Our technique is based on embedding the codebook in a Euclidean space of dimension equal to the weight of the code. The encoder and decoder mappings are then interpreted as a bijection between a certain hyper-rectangle and a polytope in this Euclidean space. An inductive dissection algorithm is developed for constructing such a bijection. We prove that the algorithm is correct and then analyze its complexity. The complexity depends on the weight of the code, rather than on the block length as in other algorithms. This approach is advantageous when the weight is smaller than the square root of the block length.
△ Less
Submitted 8 June, 2007;
originally announced June 2007.
-
Multiple Description Vector Quantization with Lattice Codebooks: Design and Analysis
Authors:
Vinay A. Vaishampayan,
N. J. A. Sloane,
Sergio D. Servetto
Abstract:
The problem of designing a multiple description vector quantizer with lattice codebook Lambda is considered. A general solution is given to a labeling problem which plays a crucial role in the design of such quantizers. Numerical performance results are obtained for quantizers based on the lattices A_2 and Z^i, i=1,2,4,8, that make use of this labeling algorithm. The high-rate squared-error dist…
▽ More
The problem of designing a multiple description vector quantizer with lattice codebook Lambda is considered. A general solution is given to a labeling problem which plays a crucial role in the design of such quantizers. Numerical performance results are obtained for quantizers based on the lattices A_2 and Z^i, i=1,2,4,8, that make use of this labeling algorithm. The high-rate squared-error distortions for this family of L-dimensional vector quantizers are then analyzed for a memoryless source with probability density function p and differential entropy h(p) < infty. For any a in (0,1) and rate pair (R,R), it is shown that the two-channel distortion d_0 and the channel 1 (or channel 2) distortions d_s satisfy lim_{R -> infty} d_0 2^(2R(1+a)) = (1/4) G(Lambda) 2^{2h(p)} and lim_{R -> infty} d_s 2^(2R(1-a)) = G(S_L) 2^2h(p), where G(Lambda) is the normalized second moment of a Voronoi cell of the lattice Lambda and G(S_L) is the normalized second moment of a sphere in L dimensions.
△ Less
Submitted 30 July, 2002;
originally announced July 2002.
-
Asymmetric Multiple Description Lattice Vector Quantizers
Authors:
Suhas N. Diggavi,
N. J. A. Sloane,
Vinay A. Vaishampayan
Abstract:
We consider the design of asymmetric multiple description lattice quantizers that cover the entire spectrum of the distortion profile, ranging from symmetric or balanced to successively refinable. We present a solution to a labeling problem, which is an important part of the construction, along with a general design procedure. This procedure is illustrated using the Z^2 lattice. The asymptotic p…
▽ More
We consider the design of asymmetric multiple description lattice quantizers that cover the entire spectrum of the distortion profile, ranging from symmetric or balanced to successively refinable. We present a solution to a labeling problem, which is an important part of the construction, along with a general design procedure. This procedure is illustrated using the Z^2 lattice. The asymptotic performance of the quantizer is analyzed in the high-rate case. We also evaluate its rate-distortion performance and compare it to known information theoretic bounds.
△ Less
Submitted 21 July, 2002;
originally announced July 2002.
-
A Zador-Like Formula for Quantizers Based on Periodic Tilings
Authors:
N. J. A. Sloane,
Vinay A. Vaishampayan
Abstract:
We consider Zador's asymptotic formula for the distortion-rate function for a variable-rate vector quantizer in the high-rate case. This formula involves the differential entropy of the source, the rate of the quantizer in bits per sample, and a coefficient G which depends on the geometry of the quantizer but is independent of the source. We give an explicit formula for G in the case when the qu…
▽ More
We consider Zador's asymptotic formula for the distortion-rate function for a variable-rate vector quantizer in the high-rate case. This formula involves the differential entropy of the source, the rate of the quantizer in bits per sample, and a coefficient G which depends on the geometry of the quantizer but is independent of the source. We give an explicit formula for G in the case when the quantizing regions form a periodic tiling of n-dimensional space, in terms of the volumes and second moments of the Voronoi cells. As an application we show, extending earlier work of Kashyap and Neuhoff, that even a variable-rate three-dimensional quantizer based on the ``A15'' structure is still inferior to a quantizer based on the body-centered cubic lattice. We also determine the smallest covering radius of such a structure.
△ Less
Submitted 17 July, 2002;
originally announced July 2002.