Skip to main content

Showing 1–5 of 5 results for author: Kampeas, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.13541  [pdf, other

    cs.LG cs.AI

    Linear Log-Normal Attention with Unbiased Concentration

    Authors: Yury Nahshan, Joseph Kampeas, Emir Haleva

    Abstract: Transformer models have achieved remarkable results in a wide range of applications. However, their scalability is hampered by the quadratic time and memory complexity of the self-attention mechanism concerning the sequence length. This limitation poses a substantial obstacle when dealing with long documents or high-resolution images. In this work, we study the self-attention mechanism by analyzin… ▽ More

    Submitted 26 February, 2024; v1 submitted 22 November, 2023; originally announced November 2023.

    Comments: 22 pages, 20 figures, 5 tables, submitted to ICLR2024

    ACM Class: I.7.0; G.3

  2. arXiv:2303.03106  [pdf, other

    cs.LG cs.AI cs.IT

    Rotation Invariant Quantization for Model Compression

    Authors: Joseph Kampeas, Yury Nahshan, Hanoch Kremer, Gil Lederman, Shira Zaloshinski, Zheng Li, Emir Haleva

    Abstract: Post-training Neural Network (NN) model compression is an attractive approach for deploying large, memory-consuming models on devices with limited memory resources. In this study, we investigate the rate-distortion tradeoff for NN model compression. First, we suggest a Rotation-Invariant Quantization (RIQ) technique that utilizes a single parameter to quantize the entire NN model, yielding a diffe… ▽ More

    Submitted 1 December, 2024; v1 submitted 3 March, 2023; originally announced March 2023.

    Comments: 20 pages, 5 figures

    ACM Class: I.2.4; E.4

  3. arXiv:1605.02349  [pdf, other

    cs.IT

    On Secrecy Rates and Outage in Multi-User Multi-Eavesdroppers MISO Systems

    Authors: Joseph Kampeas, Asaf Cohen, Omer Gurewitz

    Abstract: In this paper, we study the secrecy rate and outage probability in Multiple-Input-Single-Output (MISO) Gaussian wiretap channels at the limit of a large number of legitimate users and eavesdroppers. In particular, we analyze the asymptotic achievable secrecy rates and outage, when only statistical knowledge on the wiretap channels is available to the transmitter. The analysis provides exact expr… ▽ More

    Submitted 8 May, 2016; originally announced May 2016.

    Comments: 8 pages

  4. arXiv:1304.7480  [pdf, other

    cs.IT

    The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers

    Authors: Joseph Kampeas, Asaf Cohen, Omer Gurewitz

    Abstract: Consider the problem of a Multiple-Input Multiple-Output (MIMO) Multiple-Access Channel (MAC) at the limit of large number of users. Clearly, in practical scenarios, only a small subset of the users can be scheduled to utilize the channel simultaneously. Thus, a problem of user selection arises. However, since solutions which collect Channel State Information (CSI) from all users and decide on the… ▽ More

    Submitted 12 January, 2018; v1 submitted 28 April, 2013; originally announced April 2013.

    Comments: 44 pages, 9 figures

  5. arXiv:1202.0119  [pdf, ps, other

    cs.IT cs.NI

    Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity

    Authors: Joseph Kampeas, Asaf Cohen, Omer Gurewitz

    Abstract: In this work, we design and analyze novel distributed scheduling algorithms for multi-user MIMO systems. In particular, we consider algorithms which do not require sending channel state information to a central processing unit, nor do they require communication between the users themselves, yet, we prove their performance closely approximates that of a centrally-controlled system, which is able to… ▽ More

    Submitted 16 July, 2012; v1 submitted 1 February, 2012; originally announced February 2012.

    Comments: 33 pages; 12 figures. Parts of this work will appear at the Information Theory and Applications Workshop, San Diego, CA, ITA 2012, and submitted to the IEEE International Symposium on Information Theory, Cambridge, MA, ISIT 2012