Skip to main content

Showing 1–50 of 50 results for author: Chong, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.12401  [pdf, other

    cs.CV

    NTIRE 2025 Challenge on Event-Based Image Deblurring: Methods and Results

    Authors: Lei Sun, Andrea Alfarano, Peiqi Duan, Shaolin Su, Kaiwei Wang, Boxin Shi, Radu Timofte, Danda Pani Paudel, Luc Van Gool, Qinglin Liu, Wei Yu, Xiaoqian Lv, Lu Yang, Shuigen Wang, Shengping Zhang, Xiangyang Ji, Long Bao, Yuqiang Yang, Jinao Song, Ziyi Wang, Shuang Wen, Heng Sun, Kean Liu, Mingchen Zhong, Senyan Xu , et al. (63 additional authors not shown)

    Abstract: This paper presents an overview of NTIRE 2025 the First Challenge on Event-Based Image Deblurring, detailing the proposed methodologies and corresponding results. The primary goal of the challenge is to design an event-based method that achieves high-quality image deblurring, with performance quantitatively assessed using Peak Signal-to-Noise Ratio (PSNR). Notably, there are no restrictions on com… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  2. arXiv:2409.15100  [pdf, ps, other

    cs.LG cs.AI

    Robust Federated Learning Over the Air: Combating Heavy-Tailed Noise with Median Anchored Clipping

    Authors: Jiaxing Li, Zihan Chen, Kai Fong Ernest Chong, Bikramjit Das, Tony Q. S. Quek, Howard H. Yang

    Abstract: Leveraging over-the-air computations for model aggregation is an effective approach to cope with the communication bottleneck in federated edge learning. By exploiting the superposition properties of multi-access channels, this approach facilitates an integrated design of communication and computation, thereby enhancing system privacy while reducing implementation costs. However, the inherent elec… ▽ More

    Submitted 6 July, 2025; v1 submitted 23 September, 2024; originally announced September 2024.

    Comments: This is the full version of the paper, and the appendix contains a complete convergence analysis under non-convex conditions

  3. arXiv:2409.05020  [pdf, other

    eess.SY cs.DS

    A Performance Bound for the Greedy Algorithm in a Generalized Class of String Optimization Problems

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We present a simple performance bound for the greedy scheme in string optimization problems that obtains strong results. Our approach vastly generalizes the group of previously established greedy curvature bounds by Conforti and Cornuéjols (1984). We consider three constants, $α_G$, $α_G'$, and $α_G''$ introduced by Conforti and Cornuéjols (1984), that are used in performance bounds of greedy sche… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

  4. arXiv:2404.06669  [pdf, other

    eess.SY cs.DS

    On Bounds for Greedy Schemes in String Optimization based on Greedy Curvatures

    Authors: Bowen Li, Brandon Van Over, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We consider the celebrated bound introduced by Conforti and Cornuéjols (1984) for greedy schemes in submodular optimization. The bound assumes a submodular function defined on a collection of sets forming a matroid and is based on greedy curvature. We show that the bound holds for a very general class of string problems that includes maximizing submodular functions over set matroids as a special c… ▽ More

    Submitted 8 September, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

    Comments: This version has been accepted as an invited paper in the 63rd IEEE Conference on Decision and Control, Milan, Italy, December 16--19, 2024

  5. arXiv:2401.17124  [pdf, other

    cs.LG cs.NI

    Spectral Co-Distillation for Personalized Federated Learning

    Authors: Zihan Chen, Howard H. Yang, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: Personalized federated learning (PFL) has been widely investigated to address the challenge of data heterogeneity, especially when a single generic model is inadequate in satisfying the diverse performance requirements of local clients simultaneously. Existing PFL methods are inherently based on the idea that the relations between the generic global and personalized local models are captured by th… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 13 pages, NeurIPS 2023. Code at https://github.com/jimmyc96/spectral-dis-FL

  6. arXiv:2310.04003  [pdf, other

    cs.NI cs.DC cs.LG eess.SY

    The Role of Federated Learning in a Wireless World with Foundation Models

    Authors: Zihan Chen, Howard H. Yang, Y. C. Tay, Kai Fong Ernest Chong, Tony Q. S. Quek

    Abstract: Foundation models (FMs) are general-purpose artificial intelligence (AI) models that have recently enabled multiple brand-new generative AI applications. The rapid advances in FMs serve as an important contextual backdrop for the vision of next-generation wireless networks, where federated learning (FL) is a key enabler of distributed network intelligence. Currently, the exploration of the interpl… ▽ More

    Submitted 7 May, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 8 pages, 4 figures, 2 tables. This version has been accepted by IEEE Wireless Communications

  7. arXiv:2308.15758  [pdf, other

    cs.DS cs.DM eess.SY

    An Improved Greedy Curvature Bound in Finite-Horizon String Optimization with Application to a Sensor Coverage Problem

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We study the optimization problem of choosing strings of finite length to maximize string submodular functions on string matroids, which is a broader class of problems than maximizing set submodular functions on set matroids. We provide a lower bound for the performance of the greedy algorithm in our problem, and then prove that our bound is superior to the greedy curvature bound of Conforti and C… ▽ More

    Submitted 7 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

  8. arXiv:2307.09810  [pdf

    cs.CV cs.IT cs.LG

    GenKL: An Iterative Framework for Resolving Label Ambiguity and Label Non-conformity in Web Images Via a New Generalized KL Divergence

    Authors: Xia Huang, Kai Fong Ernest Chong

    Abstract: Web image datasets curated online inherently contain ambiguous in-distribution (ID) instances and out-of-distribution (OOD) instances, which we collectively call non-conforming (NC) instances. In many recent approaches for mitigating the negative effects of NC instances, the core implicit assumption is that the NC instances can be found via entropy maximization. For "entropy" to be well-defined, w… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Published (with open access) at International Journal of Computer Vision (IJCV, 2023). 25 pages, 8 figures. Code is available at: https://github.com/codetopaper/GenKL

    ACM Class: I.2.0; I.4.0

  9. arXiv:2303.11730  [pdf, other

    cs.CV cs.AI cs.SC math.AC

    Abstract Visual Reasoning: An Algebraic Approach for Solving Raven's Progressive Matrices

    Authors: Jingyi Xu, Tushar Vaidya, Yufei Wu, Saket Chandra, Zhangsheng Lai, Kai Fong Ernest Chong

    Abstract: We introduce algebraic machine reasoning, a new reasoning framework that is well-suited for abstract reasoning. Effectively, algebraic machine reasoning reduces the difficult process of novel problem-solving to routine algebraic computation. The fundamental algebraic objects of interest are the ideals of some suitably initialized polynomial ring. We shall explain how solving Raven's Progressive Ma… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted at IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023. 30 pages, 7 figures (including supplementary material). First three authors contributed equally. Code is available at: https://github.com/Xu-Jingyi/AlgebraicMR

    MSC Class: 13P25; 68W30 ACM Class: I.1; I.2.4; I.2.6; I.5.1

  10. arXiv:2207.06746  [pdf

    eess.IV cs.CV

    Single-Pixel Image Reconstruction Based on Block Compressive Sensing and Deep Learning

    Authors: Stephen L. H. Lau, Edwin K. P. Chong

    Abstract: Single-pixel imaging (SPI) is a novel imaging technique whose working principle is based on the compressive sensing (CS) theory. In SPI, data is obtained through a series of compressive measurements and the corresponding image is reconstructed. Typically, the reconstruction algorithm such as basis pursuit relies on the sparsity assumption in images. However, recent advances in deep learning have f… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  11. arXiv:2206.04498  [pdf, other

    eess.SP cs.DC

    Abstract message passing and distributed graph signal processing

    Authors: Feng Ji, Yiqi Lu, Wee Peng Tay, Edwin Chong

    Abstract: Graph signal processing is a framework to handle graph structured data. The fundamental concept is graph shift operator, giving rise to the graph Fourier transform. While the graph Fourier transform is a centralized procedure, distributed graph signal processing algorithms are needed to address challenges such as scalability and privacy. In this paper, we develop a theory of distributed graph sign… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

  12. arXiv:2204.04677  [pdf, other

    cs.LG cs.AI cs.CV

    FedCorr: Multi-Stage Federated Learning for Label Noise Correction

    Authors: Jingyi Xu, Zihan Chen, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: Federated learning (FL) is a privacy-preserving distributed learning paradigm that enables clients to jointly train a global model. In real-world FL implementations, client data could have label noise, and different clients could have vastly different label noise levels. Although there exist methods in centralized learning for tackling label noise, such methods do not perform well on heterogeneous… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: Accepted at IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022. 18 pages, 10 figures (including supplementary material). First two authors contributed equally. Code is available at: https://github.com/Xu-Jingyi/FedCorr

  13. arXiv:2201.02275  [pdf, ps, other

    eess.SP cs.IT eess.SY stat.CO

    Well-Conditioned Linear Minimum Mean Square Error Estimation

    Authors: Edwin K. P. Chong

    Abstract: Linear minimum mean square error (LMMSE) estimation is often ill-conditioned, suggesting that unconstrained minimization of the mean square error is an inadequate approach to filter design. To address this, we first develop a unifying framework for studying constrained LMMSE estimation problems. Using this framework, we explore an important structural property of constrained LMMSE filters involvin… ▽ More

    Submitted 21 March, 2022; v1 submitted 6 January, 2022; originally announced January 2022.

  14. arXiv:2108.05765  [pdf, other

    cs.LG cs.DC

    Dynamic Attention-based Communication-Efficient Federated Learning

    Authors: Zihan Chen, Kai Fong Ernest Chong, Tony Q. S. Quek

    Abstract: Federated learning (FL) offers a solution to train a global machine learning model while still maintaining data privacy, without needing access to data stored locally at the clients. However, FL suffers performance degradation when client data distribution is non-IID, and a longer training duration to combat this degradation may not necessarily be feasible due to communication limitations. To addr… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

    Comments: 7 pages, 3 figures, presented at the International Workshop on Federated and Transfer Learning for Data Sparsity and Confidentiality (FTL-IJCAI 2021) in conjunction with the 30th International Joint Conference on Artificial Intelligence (IJCAI), 2021

    ACM Class: I.2

  15. arXiv:2105.13892  [pdf, other

    cs.LG

    Training Classifiers that are Universally Robust to All Label Noise Levels

    Authors: Jingyi Xu, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: For classification tasks, deep neural networks are prone to overfitting in the presence of label noise. Although existing methods are able to alleviate this problem at low noise levels, they encounter significant performance reduction at high noise levels, or even at medium noise levels when the label noise is asymmetric. To train classifiers that are universally robust to all noise levels, and th… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: IJCNN 2021 paper, 8 pages, 3 figures. Code available: https://github.com/Xu-Jingyi/PUDistill

    ACM Class: I.2.0

  16. arXiv:2003.02501  [pdf, other

    cs.CV

    Detecting Attended Visual Targets in Video

    Authors: Eunji Chong, Yongxin Wang, Nataniel Ruiz, James M. Rehg

    Abstract: We address the problem of detecting attention targets in video. Our goal is to identify where each person in each frame of a video is looking, and correctly handle the case where the gaze target is out-of-frame. Our novel architecture models the dynamic interaction between the scene and head features and infers time-varying attention targets. We introduce a new annotated dataset, VideoAttentionTar… ▽ More

    Submitted 30 March, 2020; v1 submitted 5 March, 2020; originally announced March 2020.

    Comments: Accepted to CVPR 2020

  17. arXiv:2002.06505  [pdf, ps, other

    cs.LG math.FA stat.ML

    A closer look at the approximation capabilities of neural networks

    Authors: Kai Fong Ernest Chong

    Abstract: The universal approximation theorem, in one of its most general versions, says that if we consider only continuous activation functions $σ$, then a standard feedforward neural network with one hidden layer is able to approximate any continuous multivariate function $f$ to any given approximation threshold $\varepsilon$, if and only if $σ$ is non-polynomial. In this paper, we give a direct algebrai… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

    Comments: Published as a conference paper at ICLR 2020

  18. Automated Pavement Crack Segmentation Using U-Net-based Convolutional Neural Network

    Authors: Stephen L. H. Lau, Edwin K. P. Chong, Xu Yang, Xin Wang

    Abstract: Automated pavement crack image segmentation is challenging because of inherent irregular patterns, lighting conditions, and noise in images. Conventional approaches require a substantial amount of feature engineering to differentiate crack regions from non-affected regions. In this paper, we propose a deep learning technique based on a convolutional neural network to perform segmentation tasks on… ▽ More

    Submitted 30 June, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: Accepted for publication in IEEE Access

  19. arXiv:1910.00699  [pdf, other

    cs.AI eess.SY math.OC stat.AP stat.CO

    Decision Automation for Electric Power Network Recovery

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce R. Ellingwood

    Abstract: Critical infrastructure systems such as electric power networks, water networks, and transportation systems play a major role in the welfare of any community. In the aftermath of disasters, their recovery is of paramount importance; orderly and efficient recovery involves the assignment of limited resources (a combination of human repair workers and machines) to repair damaged infrastructure compo… ▽ More

    Submitted 18 October, 2019; v1 submitted 1 October, 2019; originally announced October 2019.

    Comments: Submitted to IEEE Transactions on Automation Science and Engineering (13 pages and 6 figures)

  20. arXiv:1902.00607  [pdf, other

    cs.HC

    Detecting Gaze Towards Eyes in Natural Social Interactions and its Use in Child Assessment

    Authors: Eunji Chong, Katha Chanda, Zhefan Ye, Audrey Southerland, Nataniel Ruiz, Rebecca M. Jones, Agata Rozga, James M. Rehg

    Abstract: Eye contact is a crucial element of non-verbal communication that signifies interest, attention, and participation in social interactions. As a result, measures of eye contact arise in a variety of applications such as the assessment of the social communication skills of children at risk for developmental disorders such as autism, or the analysis of turn-taking and social roles during group meetin… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

    Comments: Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) Volume 1. Winner of IMWUT Distinguished Paper Award

  21. An approximate dynamic programming approach to food security of communities following hazards

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: Food security can be threatened by extreme natural hazard events for households of all social classes within a community. To address food security issues following a natural disaster, the recovery of several elements of the built environment within a community, including its building portfolio, must be considered. Building portfolio restoration is one of the most challenging elements of recovery o… ▽ More

    Submitted 15 December, 2018; originally announced December 2018.

    Comments: As opposed to the preemptive scheduling problem, which was addressed in multiple works by us, we deal with a non-preemptive stochastic scheduling problem in this work. Submitted to 13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP13 Seoul, South Korea, May 26-30, 2019

    Journal ref: 13th Int. Conf. Appl. Statistics and Prob. Civ. Eng. (ICASP13), Seoul, South Korea, May 26-30, 2019

  22. arXiv:1807.10437  [pdf, other

    cs.CV

    Connecting Gaze, Scene, and Attention: Generalized Attention Estimation via Joint Modeling of Gaze and Scene Saliency

    Authors: Eunji Chong, Nataniel Ruiz, Yongxin Wang, Yun Zhang, Agata Rozga, James Rehg

    Abstract: This paper addresses the challenging problem of estimating the general visual attention of people in images. Our proposed method is designed to work across multiple naturalistic social scenarios and provides a full picture of the subject's attention and gaze. In contrast, earlier works on gaze and attention estimation have focused on constrained problems in more specific contexts. In particular, o… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: Appears in: European Conference on Computer Vision (ECCV) 2018

  23. arXiv:1806.08492  [pdf

    cs.CY

    An Approximate Dynamic Programming Approach to Community Recovery Management (Extended Abstract)

    Authors: Saeed Nozhati, Bruce R. Ellingwood, Hussam Mahmoud, Yugandhar Sarkale, Edwin K. P. Chong, Nathanael Rosenheim

    Abstract: The functioning of interdependent civil infrastructure systems in the aftermath of a disruptive event is critical to the performance and vitality of any modern urban community. Post-event stressors and chaotic circumstances, time limitations, and complexities in the community recovery process highlight the necessity for a comprehensive decision-making framework at the community-level for post-even… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: The material in this work provides a gist of the material in the journal version of our work (arXiv:1803.01451) that has in-detailed description of the methods employed in this article in addition to a more comprehensive treatment. This work will serve as a suitable introduction to the interested reader

    Journal ref: Presented at Engineering Mechanics Institute Conference 2018 (EMI 2018 -- MS36 Robustness of Infrastructures), Cambridge -- Boston, MA, May 29--June 1, 2018

  24. arXiv:1804.00250  [pdf

    cs.CE eess.SY

    A Modified Approximate Dynamic Programming Algorithm for Community-level Food Security Following Disasters

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: In the aftermath of an extreme natural hazard, community residents must have access to functioning food retailers to maintain food security. Food security is dependent on supporting critical infrastructure systems, including electricity, potable water, and transportation. An understanding of the response of such interdependent networks and the process of post-disaster recovery is the cornerstone o… ▽ More

    Submitted 15 May, 2018; v1 submitted 31 March, 2018; originally announced April 2018.

    Comments: The material presented here might have some overlap with arXiv:1803.04144 and arXiv:1803.01451. Nonetheless, this material contains substantial additions

    Journal ref: Proceedings of the 9th International Congress on Environmental Modelling and Software (iEMSs 2018), Fort Collins, CO, June 24--28, 2018

  25. arXiv:1803.04144  [pdf, other

    math.OC cs.CE eess.SY

    Solving Markov decision processes for network-level post-hazard recovery via simulation optimization and rollout

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce Ellingwood, Hussam Mahmoud

    Abstract: Computation of optimal recovery decisions for community resilience assurance post-hazard is a combinatorial decision-making problem under uncertainty. It involves solving a large-scale optimization problem, which is significantly aggravated by the introduction of uncertainty. In this paper, we draw upon established tools from multiple research communities to provide an effective solution to this c… ▽ More

    Submitted 12 April, 2018; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Submitted to Simulation Optimization for Cyber Physical Energy Systems (Special Session) in 14th IEEE International Conference on Automation Science and Engineering

    Journal ref: 2018 IEEE 14th Int. Conf. Autom. Sci. and Eng. (CASE) 906 - 912

  26. arXiv:1803.01451  [pdf, other

    math.OC cs.CE eess.SY

    Near-optimal planning using approximate dynamic programming to enhance post-hazard community resilience management

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: The lack of a comprehensive decision-making approach at the community level is an important problem that warrants immediate attention. Network-level decision-making algorithms need to solve large-scale optimization problems that pose computational challenges. The complexity of the optimization problems increases when various sources of uncertainty are considered. This research introduces a sequent… ▽ More

    Submitted 19 April, 2018; v1 submitted 4 March, 2018; originally announced March 2018.

    Comments: The first two authors contributed equally and are listed alphabetically

    Journal ref: Reliab. Eng. & Syst. Saf. 181 (2019) 116-126

  27. arXiv:1710.02619  [pdf, ps, other

    cs.LG stat.ML

    Ranking and Selection as Stochastic Control

    Authors: Yijie Peng, Edwin K. P. Chong, Chun-Hung Chen, Michael C. Fu

    Abstract: Under a Bayesian framework, we formulate the fully sequential sampling and selection decision in statistical ranking and selection as a stochastic control problem, and derive the associated Bellman equation. Using value function approximation, we derive an approximately optimal allocation policy. We show that this policy is not only computationally efficient but also possesses both one-step-ahead… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

    Comments: 15 pages, 8 figures, to appear in IEEE Transactions on Automatic Control

    MSC Class: IEEE

  28. arXiv:1710.00925  [pdf, other

    cs.CV

    Fine-Grained Head Pose Estimation Without Keypoints

    Authors: Nataniel Ruiz, Eunji Chong, James M. Rehg

    Abstract: Estimating the head pose of a person is a crucial problem that has a large amount of applications such as aiding in gaze estimation, modeling attention, fitting 3D models to video and performing face alignment. Traditionally head pose is computed by estimating some keypoints from the target face and solving the 2D to 3D correspondence problem with a mean human head model. We argue that this is a f… ▽ More

    Submitted 13 April, 2018; v1 submitted 2 October, 2017; originally announced October 2017.

    Comments: Accepted to Computer Vision and Pattern Recognition Workshops (CVPRW), 2018 IEEE Conference on. IEEE, 2018

    Journal ref: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2018, pp. 2074-2083

  29. arXiv:1708.00908  [pdf, other

    cs.HC

    Noninvasive Corneal Image-Based Gaze Measurement System

    Authors: Eunji Chong, Christian Nitschke, Atsushi Nakazawa, Agata Rozga, James M. Rehg

    Abstract: Gaze tracking is an important technology as the system can give information about a person from what and where the person is seeing. There have been many attempts to make robust and accurate gaze trackers using either monitor or wearable devices. However, those contraptions often require fine individual calibration per session and/or require a person wearing a device, which may not be suitable for… ▽ More

    Submitted 2 August, 2017; originally announced August 2017.

  30. arXiv:1706.09192  [pdf, other

    cs.SI

    Network Topology Inference Using Information Cascades with Limited Statistical Knowledge

    Authors: Feng Ji, Wenchang Tang, Wee Peng Tay, Edwin K. P. Chong

    Abstract: We study the problem of inferring network topology from information cascades, in which the amount of time taken for information to diffuse across an edge in the network follows an unknown distribution. Unlike previous studies, which assume knowledge of these distributions, we only require that diffusion along different edges in the network be independent together with limited moment information (e… ▽ More

    Submitted 4 March, 2019; v1 submitted 28 June, 2017; originally announced June 2017.

  31. arXiv:1703.08589  [pdf, other

    math.OC cs.DS

    Polynomial-Time Methods to Solve Unimodular Quadratic Programs With Performance Guarantees

    Authors: Shankarachary Ragi, Edwin K. P. Chong, Hans D. Mittelmann

    Abstract: We develop polynomial-time heuristic methods to solve unimodular quadratic programs (UQPs) approximately, which are known to be NP-hard. In the UQP framework, we maximize a quadratic function of a vector of complex variables with unit modulus. Several problems in active sensing and wireless communication applications boil down to UQP. With this motivation, we present three new heuristic methods wi… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  32. arXiv:1603.04893  [pdf, ps, other

    math.OC cs.GT

    Performance Bounds for Nash Equilibria in Submodular Utility Systems with User Groups

    Authors: Yajing Liu, Edwin K. P. Chong, Ali Pezeshki

    Abstract: In this paper, we consider variations of the utility system considered by Vetta, in which users are grouped together. Our aim is to establish how grouping and cooperation among users affect performance bounds. We consider two types of grouping. The first type is from \cite{Zhang2014}, where each user belongs to a group of users having social ties with it. For this type of utility system, each user… ▽ More

    Submitted 11 October, 2017; v1 submitted 15 March, 2016; originally announced March 2016.

    Comments: This paper was accepted by Journal of Control and Decision

  33. arXiv:1507.04822  [pdf, ps, other

    cs.IT

    Subspace selection for projection maximization with matroid constraints

    Authors: Zhenliang Zhang, Yuan Wang, Edwin K. P. Chong, Ali Pezeshki, Louis Scharf

    Abstract: Suppose that there is a ground set which consists of a large number of vectors in a Hilbert space. Consider the problem of selecting a subset of the ground set such that the projection of a vector of interest onto the subspace spanned by the vectors in the chosen subset reaches the maximum norm. This problem is generally NP-hard, and alternative approximation algorithms such as forward regression… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

  34. Robust Decentralized Detection and Social Learning in Tandem Networks

    Authors: Jack Ho, Wee Peng Tay, Tony Q. S. Quek, Edwin K. P. Chong

    Abstract: We study a tandem of agents who make decisions about an underlying binary hypothesis, where the distribution of the agent observations under each hypothesis comes from an uncertainty class. We investigate both decentralized detection rules, where agents collaborate to minimize the error probability of the final agent, and social learning rules, where each agent minimizes its own local minimax erro… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  35. Intersection Information based on Common Randomness

    Authors: Virgil Griffith, Edwin K. P. Chong, Ryan G. James, Christopher J. Ellison, James P. Crutchfield

    Abstract: The introduction of the partial information decomposition generated a flurry of proposals for defining an intersection information that quantifies how much of "the same information" two or more random variables specify about a target random variable. As of yet, none is wholly satisfactory. A palatable measure of intersection information would provide a principled way to quantify slippery concepts,… ▽ More

    Submitted 10 June, 2015; v1 submitted 6 October, 2013; originally announced October 2013.

    Comments: 19 pages, 5 figures

    Journal ref: Entropy (2014) Volume 16, Issue 4

  36. String Submodular Functions with Curvature Constraints

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: The problem of objectively choosing a string of actions to optimize an objective function that is string submodular has been considered in [1]. There it is shown that the greedy strategy, consisting of a string of actions that only locally maximizes the step-wise gain in the objective function achieves at least a (1-e^{-1})-approximation to the optimal strategy. This paper improves this approximat… ▽ More

    Submitted 25 May, 2015; v1 submitted 12 March, 2013; originally announced March 2013.

    Comments: to appear in IEEE Transaction on Automatic Control

  37. Hypothesis Testing in Feedforward Networks with Broadcast Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: Consider a countably infinite set of nodes, which sequentially make decisions between two given hypotheses. Each node takes a measurement of the underlying truth, observes the decisions from some immediate predecessors, and makes a decision between the given hypotheses. We consider two classes of broadcast failures: 1) each node broadcasts a decision to the other nodes, subject to random erasure i… ▽ More

    Submitted 25 March, 2013; v1 submitted 19 November, 2012; originally announced November 2012.

  38. arXiv:1210.4507  [pdf, other

    cs.IT cs.MA

    Submodularity and Optimality of Fusion Rules in Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in a balanced binary relay tree, where the leaves of the tree are sensors generating binary messages. The root of the tree is a fusion center that makes the overall decision. Every other node in the tree is a fusion node that fuses two binary messages from its child nodes into a new binary message and sends it to the parent node at the next level. We assu… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

  39. Learning in Hierarchical Social Networks

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study a social network consisting of agents organized as a hierarchical M-ary rooted tree, common in enterprise and military organizational structures. The goal is to aggregate information to solve a binary hypothesis testing problem. Each agent at a leaf of the tree, and only such an agent, makes a direct measurement of the underlying true hypothesis. The leaf agent then makes a decision and s… ▽ More

    Submitted 21 November, 2012; v1 submitted 30 May, 2012; originally announced June 2012.

  40. Detection Performance in Balanced Binary Relay Trees with Node and Link Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in the context of a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent sensors generating binary messages. The root of the tree is a fusion center making an overall decision. Every other node is a relay node that aggregates the messages received from its child nodes into a new message and sends it up towar… ▽ More

    Submitted 19 November, 2012; v1 submitted 1 June, 2012; originally announced June 2012.

  41. arXiv:1202.3913  [pdf, other

    cs.IT

    Greedy Adaptive Compression in Signal-Plus-Noise Models

    Authors: Entao Liu, Edwin K. P. Chong, Louis L. Scharf

    Abstract: The purpose of this article is to examine the greedy adaptive measurement policy in the context of a linear Guassian measurement model with an optimization criterion based on information gain. In the special case of sequential scalar measurements, we provide sufficient conditions under which the greedy policy actually is optimal in the sense of maximizing the net information gain. In the general s… ▽ More

    Submitted 17 August, 2012; v1 submitted 17 February, 2012; originally announced February 2012.

  42. arXiv:1202.2319   

    cs.IT

    Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection performance of $M$-ary relay trees, where only the leaves of the tree represent sensors making measurements. The root of the tree represents the fusion center which makes an overall detection decision. Each of the other nodes is a relay node which aggregates $M$ messages sent by its child nodes into a new compressed message and sends the message to its parent node. Building… ▽ More

    Submitted 1 November, 2012; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: Submitted to SSP workshop 2012

  43. arXiv:1202.1354   

    cs.IT

    Error Probability Bounds for M-ary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection error probabilities associated with an M-ary relay tree, where the leaves of the tree correspond to identical and independent sensors. Only these leaves are sensors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree is a relay node that combines M summarized messages from its immediate child nodes t… ▽ More

    Submitted 1 November, 2012; v1 submitted 7 February, 2012; originally announced February 2012.

    Comments: Submitted to ISIT 2012

  44. arXiv:1107.1824  [pdf, other

    cs.IT

    Measurement Design for Detecting Sparse Signals

    Authors: Ramin Zahedi, Ali Pezeshki, Edwin K. P. Chong

    Abstract: We consider the problem of testing for the presence (or detection) of an unknown sparse signal in additive white noise. Given a fixed measurement budget, much smaller than the dimension of the signal, we consider the general problem of designing compressive measurements to maximize the measurement signal-to-noise ratio (SNR), as increasing SNR improves the detection performance in a large class of… ▽ More

    Submitted 9 July, 2011; originally announced July 2011.

  45. arXiv:1106.4288  [pdf, ps, other

    cs.NI cs.IT math.AP

    Continuum Limits of Markov Chains with Application to Network Modeling

    Authors: Yang Zhang, Edwin K. P. Chong, Jan Hannig, Donald Estep

    Abstract: In this paper we investigate the continuum limits of a class of Markov chains. The investigation of such limits is motivated by the desire to model very large networks. We show that under some conditions, a sequence of Markov chains converges in some sense to the solution of a partial differential equation. Based on such convergence we approximate Markov chains modeling networks with a large numbe… ▽ More

    Submitted 21 June, 2011; originally announced June 2011.

    Comments: 15 pages, 10 figures

  46. arXiv:1106.0061  [pdf, other

    cs.IT

    Error Probability Bounds for Binary Relay Trees with Crummy Sensors

    Authors: Zhenliang Zhang, Ali Pezeshki, William Moran, Stephen D. Howard, Edwin K. P. Chong

    Abstract: We study the detection error probability associated with balanced binary relay trees, in which sensor nodes fail with some probability. We consider N identical and independent crummy sensors, represented by leaf nodes of the tree. The root of the tree represents the fusion center, which makes the final decision between two hypotheses. Every other node is a relay node, which fuses at most two binar… ▽ More

    Submitted 31 May, 2011; originally announced June 2011.

  47. arXiv:1105.1187  [pdf, other

    cs.IT stat.AP

    Error Probability Bounds for Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Ali Pezeshki, William Moran, Stephen D. Howard, Edwin K. P. Chong

    Abstract: We study the detection error probability associated with a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent detectors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree are relay nodes that combine two binary messages to form a single output binary message. In this way,… ▽ More

    Submitted 5 May, 2011; originally announced May 2011.

  48. arXiv:1005.2443  [pdf, ps, other

    cs.IT

    Network Coded Transmission of Fountain Codes over Cooperative Relay Networks

    Authors: E. Kurniawan, S. Sun, K. Yen, K. F. E. Chong

    Abstract: In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, we apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is therefore able to reduce the required number of transmissions over erasure channels,… ▽ More

    Submitted 13 May, 2010; originally announced May 2010.

  49. arXiv:1001.1798  [pdf, ps, other

    cs.IT math.CO

    Fountain Codes with Varying Probability Distributions

    Authors: Kai Fong Ernest Chong, Ernest Kurniawan, Sumei Sun, Kai Yen

    Abstract: Fountain codes are rateless erasure-correcting codes, i.e., an essentially infinite stream of encoded packets can be generated from a finite set of data packets. Several fountain codes have been proposed recently to minimize overhead, many of which involve modifications of the Luby transform (LT) code. These fountain codes, like the LT code, have the implicit assumption that the probability distri… ▽ More

    Submitted 7 April, 2010; v1 submitted 12 January, 2010; originally announced January 2010.

    Comments: 5 pages, 1 figure. Changes, including a different simulation example in Section IV, are made to improve clarity. Theory remains unchanged. Resubmitted to the 6th International Symposium on Turbo Codes & Iterative Information Processing (ISTC 2010).

    MSC Class: 94B60; 06A06

  50. arXiv:0710.1254  [pdf, ps, other

    cs.IT

    A Group Theoretic Model for Information

    Authors: Hua Li, Edwin K. P. Chong

    Abstract: In this paper we formalize the notions of information elements and information lattices, first proposed by Shannon. Exploiting this formalization, we identify a comprehensive parallelism between information lattices and subgroup lattices. Qualitatively, we demonstrate isomorphisms between information lattices and subgroup lattices. Quantitatively, we establish a decisive approximation relation b… ▽ More

    Submitted 5 October, 2007; originally announced October 2007.

    Comments: Submitted to IEEE Transactions on Information Theory