Skip to main content

Showing 1–7 of 7 results for author: Goldenbaum, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.11598  [pdf, ps, other

    stat.ML cs.LG math.ST stat.ME

    A Dimensionality Reduction Method for Finding Least Favorable Priors with a Focus on Bregman Divergence

    Authors: Alex Dytso, Mario Goldenbaum, H. Vincent Poor, Shlomo Shamai

    Abstract: A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be challenging due to inherent optimization over the spac… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

    Comments: To appear in the proceedings of 25th International Conference on Artificial Intelligence and Statistics (AISTATS) 2022

  2. arXiv:1708.09517  [pdf, ps, other

    cs.IT

    Upper and Lower Bounds on the Capacity of Amplitude-Constrained MIMO Channels

    Authors: Alex Dytso, Mario Goldenbaum, Shlomo Shamai, H. Vincent Poor

    Abstract: In this work, novel upper and lower bounds for the capacity of channels with arbitrary constraints on the support of the channel input symbols are derived. As an immediate practical application, the case of multiple-input multiple-output channels with amplitude constraints is considered. The bounds are shown to be within a constant gap if the channel matrix is invertible and are tight in the high… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: Longer version of a paper to appear at 2017 IEEE GLOBECOM

  3. On Secure Computation Over the Binary Modulo-2 Adder Multiple-Access Wiretap Channel

    Authors: Mario Goldenbaum, Holger Boche, H. Vincent Poor

    Abstract: In this paper, the problem of securely computing a function over the binary modulo-2 adder multiple-access wiretap channel is considered. The problem involves a legitimate receiver that wishes to reliably and efficiently compute a function of distributed binary sources while an eavesdropper has to be kept ignorant of them. In order to characterize the corresponding fundamental limit, the notion of… ▽ More

    Submitted 30 July, 2016; v1 submitted 23 March, 2016; originally announced March 2016.

    Comments: slightly longer version of a paper to be presented at IEEE ITW 2016

  4. arXiv:1512.04857  [pdf, ps, other

    cs.IT cs.LG

    Energy-Efficient Classification for Anomaly Detection: The Wireless Channel as a Helper

    Authors: Kiril Ralinovski, Mario Goldenbaum, Sławomir Stańczak

    Abstract: Anomaly detection has various applications including condition monitoring and fault diagnosis. The objective is to sense the environment, learn the normal system state, and then periodically classify whether the instantaneous state deviates from the normal one or not. A flexible and cost-effective way of monitoring a system state is to use a wireless sensor network. In the traditional approach, th… ▽ More

    Submitted 15 December, 2015; originally announced December 2015.

    Comments: submitted for possible conference publication

  5. Nomographic Functions: Efficient Computation in Clustered Gaussian Sensor Networks

    Authors: Mario Goldenbaum, Holger Boche, Sławomir Stańczak

    Abstract: In this paper, a clustered wireless sensor network is considered that is modeled as a set of coupled Gaussian multiple-access channels. The objective of the network is not to reconstruct individual sensor readings at designated fusion centers but rather to reliably compute some functions thereof. Our particular attention is on real-valued functions that can be represented as a post-processed sum o… ▽ More

    Submitted 10 December, 2014; v1 submitted 26 October, 2013; originally announced October 2013.

    Comments: to appear in IEEE Transactions on Wireless Communications

  6. Exploiting Interference for Efficient Distributed Computation in Cluster-based Wireless Sensor Networks

    Authors: Steffen Limmer, Slawomir Stanczak, Mario Goldenbaum, Renato L. G. Cavalcante

    Abstract: This invited paper presents some novel ideas on how to enhance the performance of consensus algorithms in distributed wireless sensor networks, when communication costs are considered. Of particular interest are consensus algorithms that exploit the broadcast property of the wireless channel to boost the performance in terms of convergence speeds. To this end, we propose a novel clustering based c… ▽ More

    Submitted 3 September, 2014; v1 submitted 12 September, 2013; originally announced September 2013.

    Comments: Accepted for publication at IEEE Global Conference on Signal and Information Processing (GlobalSIP 2013)

  7. arXiv:1210.2967  [pdf, ps, other

    cs.IT cs.DC cs.MA

    Robust Analog Function Computation via Wireless Multiple-Access Channels

    Authors: Mario Goldenbaum, Sławomir Stańczak

    Abstract: Various wireless sensor network applications involve the computation of a pre-defined function of the measurements without the need for reconstructing each individual sensor reading. Widely-considered examples of such functions include the arithmetic mean and the maximum value. Standard approaches to the computation problem separate computation from communication: quantized sensor readings are tra… ▽ More

    Submitted 10 October, 2012; originally announced October 2012.

    Comments: 30 pages (onecolumn), 5 figures