-
Sense and Sensitivity: Examining the Influence of Semantic Recall on Long Context Code Reasoning
Authors:
Adam Štorek,
Mukur Gupta,
Samira Hajizadeh,
Prashast Srivastava,
Suman Jana
Abstract:
Although modern Large Language Models (LLMs) support extremely large contexts, their effectiveness in utilizing long context for code reasoning remains unclear. This paper investigates LLM reasoning ability over code snippets within large repositories and how it relates to their recall ability. Specifically, we differentiate between lexical code recall (verbatim retrieval) and semantic code recall…
▽ More
Although modern Large Language Models (LLMs) support extremely large contexts, their effectiveness in utilizing long context for code reasoning remains unclear. This paper investigates LLM reasoning ability over code snippets within large repositories and how it relates to their recall ability. Specifically, we differentiate between lexical code recall (verbatim retrieval) and semantic code recall (remembering what the code does). To measure semantic recall, we propose SemTrace, a code reasoning technique where the impact of specific statements on output is attributable and unpredictable. We also present a method to quantify semantic recall sensitivity in existing benchmarks. Our evaluation of state-of-the-art LLMs reveals a significant drop in code reasoning accuracy as a code snippet approaches the middle of the input context, particularly with techniques requiring high semantic recall like SemTrace. Moreover, we find that lexical recall varies by granularity, with models excelling at function retrieval but struggling with line-by-line recall. Notably, a disconnect exists between lexical and semantic recall, suggesting different underlying mechanisms. Finally, our findings indicate that current code reasoning benchmarks may exhibit low semantic recall sensitivity, potentially underestimating LLM challenges in leveraging in-context information.
△ Less
Submitted 20 May, 2025; v1 submitted 19 May, 2025;
originally announced May 2025.
-
On the Common Randomness Capacity of a Special Class of Two-way Channels
Authors:
Saeed Hajizadeh
Abstract:
In this paper, we would like to study the common randomness (CR) capacity of intertwined two-way channels, namely those whose marginal channel transition probabilities depends also on the signal they transmit. We bring a few special settings and provide constructive schemes with which the two nodes can agree upon a common randomness. We then provide an outer bound on the CR capacity of intertwined…
▽ More
In this paper, we would like to study the common randomness (CR) capacity of intertwined two-way channels, namely those whose marginal channel transition probabilities depends also on the signal they transmit. We bring a few special settings and provide constructive schemes with which the two nodes can agree upon a common randomness. We then provide an outer bound on the CR capacity of intertwined receiver-decomposable (RD) two-way channel and will provide a bound on the cardinality of the available auxiliary variables. We will also show this outer bound is bounded above by Venkatesan-Anantharam CR capacity which makes it tight for decomposing two-way setting.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Authors:
Samaneh Berenjian,
Saeed Hajizadeh,
Reza Ebrahimi Atani
Abstract:
Peer-to-Peer networks are designed to rely on resources of their own users. Therefore, resource management plays an important role in P2P protocols. Therefore, resource management plays an important role in P2P protocols. Early P2P networks did not use proper mechanisms to manage fairness. However, after seeing difficulties and rise of freeloaders in networks like Gnutella, the importance of provi…
▽ More
Peer-to-Peer networks are designed to rely on resources of their own users. Therefore, resource management plays an important role in P2P protocols. Therefore, resource management plays an important role in P2P protocols. Early P2P networks did not use proper mechanisms to manage fairness. However, after seeing difficulties and rise of freeloaders in networks like Gnutella, the importance of providing fairness for users have become apparent. In this paper, we propose an incentive based security model which leads to a network infrastructure that lightens the work of Seeders and makes Leechers to contribute more. This method is able to prevent betrayals in Leecher-to-Leecher transactions and more importantly, helps Seeders to be treated more fairly. This is what other incentive methods such as Bittorrent are incapable of doing. Additionally, by getting help from cryptography and combining it with our method, it is also possible to achieve secure channels, immune to spying, next to a fair network. The simulation results clearly show that how our proposed approach can overcome free-riding issue. In addition, our findings revealed that our approach is able to provide an appropriate level of fairness for the users and can decrease the download time.
△ Less
Submitted 27 June, 2019; v1 submitted 21 June, 2019;
originally announced June 2019.
-
State-Dependent Z Channel
Authors:
Saeed Hajizadeh,
Mostafa Monemizadeh
Abstract:
In this paper we study the Z channel with side information non-causally available at the encoders. We use Marton encoding along with Gelfand-Pinsker random binning scheme and Chong-Motani-Garg-El Gamal (CMGE) jointly decoding to find an achievable rate region. We will see that our achievable rate region gives the achievable rate of the multiple access channel with side information and also degrade…
▽ More
In this paper we study the Z channel with side information non-causally available at the encoders. We use Marton encoding along with Gelfand-Pinsker random binning scheme and Chong-Motani-Garg-El Gamal (CMGE) jointly decoding to find an achievable rate region. We will see that our achievable rate region gives the achievable rate of the multiple access channel with side information and also degraded broadcast channel with side information. We will also derive an inner bound and an outer bound on the capacity region of the state-dependent degraded discrete memoryless Z channel and also will observe that our outer bound meets the inner bound for the rates corresponding to the second transmitter. Also, by assuming the high signal to noise ratio and strong interference regime, and using the lattice strategies, we derive an achievable rate region for the Gaussian degraded Z channel with additive interference non-causally available at both of the encoders. Our method is based on lattice transmission scheme, jointly decoding at the first decoder and successive decoding at the second decoder. Using such coding scheme we remove the effect of the interference completely.
△ Less
Submitted 1 June, 2015; v1 submitted 26 January, 2013;
originally announced January 2013.
-
Three-Receiver Broadcast Channel with Side Information
Authors:
Saeed Hajizadeh,
Ghosheh Abed Hodtani
Abstract:
Three-Receiver broadcast channels (BC) are of interest due to their information-theoretic differences with two-receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information (SI), i.e. Multilevel BC (MBC) and 3-receiver less noisy BC, using a combination of superposition coding, Gelfand-Pinsker binning scheme and Nair-El Gamal indirect decodin…
▽ More
Three-Receiver broadcast channels (BC) are of interest due to their information-theoretic differences with two-receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information (SI), i.e. Multilevel BC (MBC) and 3-receiver less noisy BC, using a combination of superposition coding, Gelfand-Pinsker binning scheme and Nair-El Gamal indirect decoding. Our rate region for MBC subsumes Steinberg rate region for 2-receiver degraded BC with SI as its special case. We will also show that the obtained achievable rate regions in the first two cases are tight for several classes of non-deterministic, semi-deterministic, and deterministic 3-receiver BC when SI is available both at the transmitter and at the receivers. We also prove that as far as a receiver is deterministic in the three-receiver less noisy BC, the presence of side information at that receiver does not affect the capacity region. We have also provided the writing on dirty paper (WDP) property for 3-receiver BC is provided as an example. In the last section, we provide simple bounds on the capacity region of the Additive Exponential noise three-receiver broadcast channels with Additive Exponential interference (AEN-3BC-EI).
△ Less
Submitted 16 December, 2012;
originally announced December 2012.
-
Capacity Bounds for Dirty Paper with Exponential Dirt
Authors:
Mostafa Monemizadeh,
Saeed Hajizadeh,
Ghosheh Abed Hodtani,
Seyed Alireza Seyedin
Abstract:
The additive exponential noise channel with additive exponential interference (AENC-AEI) known non-causally at the transmitter is studied. This channel can be considered as an exponential version of the discrete memoryless channel with state known non-causally at the encoder considered by Gelfand and Pinsker. We make use of Gelfand-Pinsker classic capacity Theorem to derive inner and outer bounds…
▽ More
The additive exponential noise channel with additive exponential interference (AENC-AEI) known non-causally at the transmitter is studied. This channel can be considered as an exponential version of the discrete memoryless channel with state known non-causally at the encoder considered by Gelfand and Pinsker. We make use of Gelfand-Pinsker classic capacity Theorem to derive inner and outer bounds on the capacity of this channel under a non-negative input constraint as well as a constraint on the mean value of the input. First we obtain an outer bound for AENC-AEI. Then by using the input distribution achieving the outer bound, we derive an inner bound which this inner bound coincides with the obtained outer bound at high signal to noise ratios (SNRs) and therefore, gives the capacity of the AENC-AEI at high SNRs.
△ Less
Submitted 29 December, 2012; v1 submitted 15 December, 2012;
originally announced December 2012.
-
Compound Multiple Access Channel with Common Message and Intersymbol Interference
Authors:
Mostafa Monemizadeh,
Saeed Hajizadeh,
Seyed Alireza Seyedin,
Ghosheh Abed Hodtani
Abstract:
In this paper, we characterize the capacity region for the two-user linear Gaussian compound Multiple Access Channel with common message (MACC) and with intersymbol interference (ISI) under an input power constraint. The region is obtained by converting the channel to its equivalent memoryless one by defining an n-block memoryless circular Gaussian compound MACC model and applying the discrete Fou…
▽ More
In this paper, we characterize the capacity region for the two-user linear Gaussian compound Multiple Access Channel with common message (MACC) and with intersymbol interference (ISI) under an input power constraint. The region is obtained by converting the channel to its equivalent memoryless one by defining an n-block memoryless circular Gaussian compound MACC model and applying the discrete Fourier transform (DFT) to decompose the n-block channel into a set of independent parallel channels whose capacities can be found easily. Indeed, the capacity region of the original Gaussian compound MACC equals that of the n-block circular Gaussian compound MACC in the limit of infinite block length. Then by using the obtained capacity region, we derive the capacity region of the strong interference channel with common message and ISI.
△ Less
Submitted 18 December, 2012; v1 submitted 14 December, 2012;
originally announced December 2012.
-
State-Dependent Multiple Access Channels with Feedback
Authors:
Saeed Hajizadeh,
Ghosheh Abed Hodtani
Abstract:
In this paper, we examine discrete memoryless Multiple Access Channels (MACs) with two-sided feedback in the presence of two correlated channel states that are correlated in the sense of Slepian-Wolf (SW). We find achievable rate region for this channel when the states are provided non-causally to the transmitters and show that our achievable rate region subsumes Cover-Leung achievable rate for th…
▽ More
In this paper, we examine discrete memoryless Multiple Access Channels (MACs) with two-sided feedback in the presence of two correlated channel states that are correlated in the sense of Slepian-Wolf (SW). We find achievable rate region for this channel when the states are provided non-causally to the transmitters and show that our achievable rate region subsumes Cover-Leung achievable rate for the discrete memoryless MAC with two-sided feedback as its special case. We also find the capacity region of discrete memoryless MAC with two-sided feedback and with SW-type correlated states available causally or strictly causally to the transmitters. We also study discrete memoryless MAC with partial feedback in the presence of two SW-type correlated channel states that are provided non-causally, causally, or strictly causally to the transmitters. An achievable rate region is found when channel states are non-causally provided to the transmitters whereas capacity regions are characterized when channel states are causally, or strictly causally available at the transmitters.
△ Less
Submitted 14 December, 2012;
originally announced December 2012.
-
Three-Receiver Broadcast Channels with Side Information
Authors:
Saeed Hajizadeh,
Ghosheh Abed Hodtani
Abstract:
Three-receiver broadcast channel (BC) is of interest due to its information theoretical differences with two receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information available at the transmitter, Multilevel BC and 3-receiver less noisy BC, by using superposition coding, Gel'fand-Pinsker binning scheme and Nair-El Gamal indirect decoding.…
▽ More
Three-receiver broadcast channel (BC) is of interest due to its information theoretical differences with two receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information available at the transmitter, Multilevel BC and 3-receiver less noisy BC, by using superposition coding, Gel'fand-Pinsker binning scheme and Nair-El Gamal indirect decoding. Our rate region for multilevel BC subsumes the Steinberg rate region for 2-receiver degraded BC with side information as its special case. We also find the capacity region of 3-receiver less noisy BC when side information is available both at the transmitter and at the receivers.
△ Less
Submitted 18 May, 2012; v1 submitted 17 May, 2012;
originally announced May 2012.