Skip to main content

Showing 1–42 of 42 results for author: Khalaj, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.10101  [pdf, ps, other

    stat.ML cs.LG

    Fundamental Limits of Learning High-dimensional Simplices in Noisy Regimes

    Authors: Seyed Amir Hossein Saberi, Amir Najafi, Abolfazl Motahari, Babak H. khalaj

    Abstract: In this paper, we establish sample complexity bounds for learning high-dimensional simplices in $\mathbb{R}^K$ from noisy data. Specifically, we consider $n$ i.i.d. samples uniformly drawn from an unknown simplex in $\mathbb{R}^K$, each corrupted by additive Gaussian noise of unknown variance. We prove an algorithm exists that, with high probability, outputs a simplex within $\ell_2$ or total vari… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Comments: Extension of our ICML 2023 paper, 44 pages

  2. arXiv:2505.17623  [pdf, ps, other

    cs.CR cs.AI cs.ET cs.LG cs.PF

    \texttt{Range-Arithmetic}: Verifiable Deep Learning Inference on an Untrusted Party

    Authors: Ali Rahimi, Babak H. Khalaj, Mohammad Ali Maddah-Ali

    Abstract: Verifiable computing (VC) has gained prominence in decentralized machine learning systems, where resource-intensive tasks like deep neural network (DNN) inference are offloaded to external participants due to blockchain limitations. This creates a need to verify the correctness of outsourced computations without re-execution. We propose \texttt{Range-Arithmetic}, a novel framework for efficient an… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

  3. arXiv:2412.17110  [pdf, other

    cs.IT eess.SP

    Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission

    Authors: Mehdi Letafati, Seyyed Amirhossein Ameli Kalkhoran, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: Deep neural network (DNN)-based joint source and channel coding is proposed for privacy-aware end-to-end image transmission against multiple eavesdroppers. Both scenarios of colluding and non-colluding eavesdroppers are considered. Unlike prior works that assume perfectly known and independent identically distributed (i.i.d.) source and channel statistics, the proposed scheme operates under unknow… ▽ More

    Submitted 4 April, 2025; v1 submitted 22 December, 2024; originally announced December 2024.

  4. arXiv:2410.14061  [pdf, other

    stat.ML cs.LG

    Gradual Domain Adaptation via Manifold-Constrained Distributionally Robust Optimization

    Authors: Amir Hossein Saberi, Amir Najafi, Ala Emrani, Amin Behjati, Yasaman Zolfimoselo, Mahdi Shadrooy, Abolfazl Motahari, Babak H. Khalaj

    Abstract: The aim of this paper is to address the challenge of gradual domain adaptation within a class of manifold-constrained data distributions. In particular, we consider a sequence of $T\ge2$ data distributions $P_1,\ldots,P_T$ undergoing a gradual shift, where each pair of consecutive measures $P_i,P_{i+1}$ are close to each other in Wasserstein distance. We have a supervised dataset of size $n$ sampl… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

    Comments: Published at Proceedings of Neural Information Processing Systems (NeurIPS) 2024

  5. arXiv:2401.00631  [pdf, other

    cs.NI cs.AI eess.SP

    Edge AI as a Service with Coordinated Deep Neural Networks

    Authors: Alireza Maleki, Hamed Shah-Mansouri, Babak H. Khalaj

    Abstract: As artificial intelligence (AI) applications continue to expand in next-generation networks, there is a growing need for deep neural network (DNN) models. Although DNN models deployed at the edge are promising for providing AI as a service with low latency, their cooperation is yet to be explored. In this paper, we consider that DNN service providers share their computing resources as well as thei… ▽ More

    Submitted 21 August, 2024; v1 submitted 31 December, 2023; originally announced January 2024.

  6. arXiv:2310.00027  [pdf, ps, other

    stat.ML cs.LG

    Out-Of-Domain Unlabeled Data Improves Generalization

    Authors: Amir Hossein Saberi, Amir Najafi, Alireza Heidari, Mohammad Hosein Movasaghinia, Abolfazl Motahari, Babak H. Khalaj

    Abstract: We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, we allow the unlabeled samples to deviate slightly (in total variation sense) from the in-domain distribution. The core idea behind our framework is to… ▽ More

    Submitted 15 February, 2024; v1 submitted 28 September, 2023; originally announced October 2023.

    Comments: Published at ICLR 2024 (Spotlight), 29 pages, no figures

  7. arXiv:2308.02892  [pdf, ps, other

    cs.IT cs.LG eess.IV

    Secure Deep-JSCC Against Multiple Eavesdroppers

    Authors: Seyyed Amirhossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  8. arXiv:2301.01221  [pdf, other

    cs.CR

    Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain

    Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj

    Abstract: In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology. The article starts by investigating security aspects for the wireless access to the metaverse. Then it goes through the privacy and security issues inside the metaverse from data-centric, learning-centric, a… ▽ More

    Submitted 11 January, 2023; v1 submitted 1 January, 2023; originally announced January 2023.

    Comments: 21 pages, 4 figures, added references for section 3-A

  9. arXiv:2211.14672  [pdf, other

    cs.IT

    Multi-Transmitter Coded Caching with Secure Delivery over Linear Networks -- Extended Version

    Authors: Mohammad Javad Sojdeh, Mehdi Letafati, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple cache-enabled end-users connected to multiple transmitters through a linear network. We also prevent a totally passive eavesdropper, who sniffs the packets in the delivery phase, from obtaining any information about the original files in cache-aided networks. Three different secure centralized multi-transmitter coded caching scenarios namely, secure multi-transm… ▽ More

    Submitted 26 November, 2022; originally announced November 2022.

  10. arXiv:2209.05953  [pdf, ps, other

    stat.ML cs.LG

    Sample Complexity Bounds for Learning High-dimensional Simplices in Noisy Regimes

    Authors: Amir Hossein Saberi, Amir Najafi, Seyed Abolfazl Motahari, Babak H. Khalaj

    Abstract: In this paper, we find a sample complexity bound for learning a simplex from noisy samples. Assume a dataset of size $n$ is given which includes i.i.d. samples drawn from a uniform distribution over an unknown simplex in $\mathbb{R}^K$, where samples are assumed to be corrupted by a multi-variate additive Gaussian noise of an arbitrary magnitude. We prove the existence of an algorithm that with hi… ▽ More

    Submitted 28 April, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

    Comments: Accepted for ICML 2023; 27 pages

  11. arXiv:2104.09326  [pdf, ps, other

    cs.IT

    On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers -- Extended Version

    Authors: Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck

    Abstract: In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transm… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  12. arXiv:2007.13230  [pdf, other

    cs.NI

    Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks

    Authors: Reza Moosavi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Vahid Shah-Mansouri, Babak Hossein Khalaj, Mehdi Bennis

    Abstract: Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during… ▽ More

    Submitted 17 October, 2020; v1 submitted 26 July, 2020; originally announced July 2020.

  13. arXiv:1905.05446  [pdf, other

    cs.IT

    D2D Assisted Beamforming for Coded Caching

    Authors: Hamidreza Bakhshzad Mahmoodi, Jarkko Kaleva, Seyed Pooya Shariatpanahi, Babak Khalaj, Antti Tölli

    Abstract: Device-to-device (D2D) aided beamforming for coded caching is considered in finite signal-to-noise ratio regime. A novel beamforming scheme is proposed where the local cache content exchange among nearby users is exploited. The transmission is split into two phases: local D2D content exchange and downlink transmission. In the D2D phase, users can autonomously share content with the adjacent users.… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  14. arXiv:1901.06698  [pdf, other

    cs.IT

    Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users

    Authors: Seyed Pooya Shariatpanahi, Jingjing Zhang, Osvaldo Simeone, Babak Hossein Khalaj, Mohammad-Ali Maddah-Ali

    Abstract: This paper considers a cloud-RAN architecture with cache-enabled multi-antenna Edge Nodes (ENs) that deliver content to cache-enabled end-users. The ENs are connected to a central server via limited-capacity fronthaul links, and, based on the information received from the central server and the cached contents, they transmit on the shared wireless medium to satisfy users' requests. By leveraging c… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 9 pages, 3 figures, submitted

  15. arXiv:1810.07845  [pdf, other

    cs.LG stat.ML

    On Statistical Learning of Simplices: Unmixing Problem Revisited

    Authors: Amir Najafi, Saeed Ilchi, Amir H. Saberi, Seyed Abolfazl Motahari, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: We study the sample complexity of learning a high-dimensional simplex from a set of points uniformly sampled from its interior. Learning of simplices is a long studied problem in computer science and has applications in computational biology and remote sensing, mostly under the name of `spectral unmixing'. We theoretically show that a sufficient sample complexity for reliable learning of a $K$-dim… ▽ More

    Submitted 12 August, 2020; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: 32 pages

  16. arXiv:1807.08646  [pdf, other

    cs.IT

    $K$--User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade--Off

    Authors: Borna Kananian, Mohammad Ali Maddah-ali, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple-antenna $K$-user interference channels with backhaul collaboration in one side (among the transmitters or among the receivers) and investigate the trade-off between the rate in the channel versus the communication load in the backhaul. In this investigation, we focus on a first order approximation result, where the rate of the wireless channel is measured by the… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  17. arXiv:1807.03337  [pdf, other

    cs.IT

    Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing

    Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

    Abstract: In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function.… ▽ More

    Submitted 11 September, 2018; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: Revised Version

  18. arXiv:1807.00207  [pdf, other

    cs.NI

    Multi-agent Learning for Cooperative Large-scale Caching Networks

    Authors: Elahe Rezaei, Hafez Eslami Manoochehri, Babak Hossein Khalaj

    Abstract: Caching networks are designed to reduce traffic load at backhaul links, by serving demands from edge-nodes. In the past decades, many studies have been done to address the caching problem. However, in practice, finding an optimal caching policy is still challenging due to dynamicity of traffic and scalability caused by complex impact of caching strategy chosen by each individual cache on other par… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Comments: 10 pages

  19. arXiv:1803.07655  [pdf, other

    cs.IT cs.NI

    On Multi-Server Coded Caching in the Low Memory Regime

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: In this paper we determine the delivery time for a multi-server coded caching problem when the cache size of each user is small. We propose an achievable scheme based on coded cache content placement, and employ zero-forcing techniques at the content delivery phase. Surprisingly, in contrast to previous multi-server results which were proved to be order-optimal within a multiplicative factor of 2,… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  20. arXiv:1711.05969  [pdf, ps, other

    cs.IT cs.NI

    Physical-Layer Schemes for Wireless Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Giuseppe Caire, Babak Hossein Khalaj

    Abstract: We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme we consider employing coded caching on top of max-min fair multicasting, which is shown to be far from optimal at high SNR values. Our fi… ▽ More

    Submitted 29 January, 2018; v1 submitted 16 November, 2017; originally announced November 2017.

    Comments: 25 pages, 14 figures. This manuscript is the extended journal version of the ISIT 2017 conference article available at arXiv:1701.02979 [cs.IT]

  21. Multi-antenna Interference Management for Coded Caching

    Authors: Antti Tölli, Seyed Pooya Shariatpanahi, Jarkko Kaleva, Babak Khalaj

    Abstract: A multi-antenna broadcast channel scenario is considered where a base station delivers contents to cache-enabled user terminals. A joint design of coded caching (CC) and multigroup multicast beamforming is proposed to benefit from spatial multiplexing gain, improved interference management and the global CC gain, simultaneously. The developed general content delivery strategies utilize the multian… ▽ More

    Submitted 1 January, 2020; v1 submitted 9 November, 2017; originally announced November 2017.

    Comments: version 3: 16 pages, 8 figures, all the simulation codes available at: https://github.com/kalesan/sim-cc-miso-bc. Published in IEEE Transactions on Wireless Communications

  22. arXiv:1701.02979  [pdf, ps, other

    cs.IT cs.NI

    Multi-Antenna Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Giuseppe Caire, Babak Hossein Khalaj

    Abstract: In this paper we consider a single-cell downlink scenario where a multiple-antenna base station delivers contents to multiple cache-enabled user terminals. Based on the multicasting opportunities provided by the so-called Coded Caching technique, we investigate three delivery approaches. Our baseline scheme employs the coded caching technique on top of max-min fair multicasting. The second one con… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: 7 pages, 2 figures

  23. arXiv:1611.06538  [pdf, other

    cs.IT

    On Storage Allocation in Cache-Enabled Interference Channels with Mixed CSIT

    Authors: Mohammad Ali Tahmasbi Nejad, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which insta… ▽ More

    Submitted 21 January, 2017; v1 submitted 20 November, 2016; originally announced November 2016.

    Comments: arXiv admin note: text overlap with arXiv:1209.5807 by other authors

  24. arXiv:1609.08476  [pdf, other

    cs.NI cs.IT

    Joint Cell Muting and User Scheduling in Multi-Cell Networks with Temporal Fairness

    Authors: Shahram Shahsavari, Nail Akar, Babak Hossein Khalaj

    Abstract: A semi-centralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. The main principle behind the proposed scheme is that a central entity selects a cell muting pattern out of a pattern set at a decision instant, and subsequently the un-muted base stations opportunistically schedule the use… ▽ More

    Submitted 4 July, 2017; v1 submitted 27 September, 2016; originally announced September 2016.

  25. arXiv:1604.04735  [pdf, other

    cs.IT

    Fundamental Limits of Pooled-DNA Sequencing

    Authors: Amir Najafi, Damoun Nashta-ali, Seyed Abolfazl Motahari, Mehrdad Khani, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: In this paper, fundamental limits in sequencing of a set of closely related DNA molecules are addressed. This problem is called pooled-DNA sequencing which encompasses many interesting problems such as haplotype phasing, metageomics, and conventional pooled-DNA sequencing in the absence of tagging. From an information theoretic point of view, we have proposed fundamental limits on the number and l… ▽ More

    Submitted 19 April, 2016; v1 submitted 16 April, 2016; originally announced April 2016.

    Comments: 39 pages, Submitted to IEEE Transactions on Information Theory

  26. arXiv:1503.00265  [pdf, ps, other

    cs.IT

    Multi-Server Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Seyed Abolfazl Motahari, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class,… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

  27. arXiv:1502.06327  [pdf, other

    cs.GT cs.NI

    Incentive Design and Market Evolution of Mobile User-Provided Networks

    Authors: Mohammad Mahdi Khalili, Lin Gao, Jianwei Huang, Babak Hossein Khalaj

    Abstract: An operator-assisted user-provided network (UPN) has the potential to achieve a low cost ubiquitous Internet connectivity, without significantly increasing the network infrastructure investment. In this paper, we consider such a network where the network operator encourages some of her subscribers to operate as mobile Wi-Fi hotspots (hosts), providing Internet connectivity for other subscribers (c… ▽ More

    Submitted 19 April, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: This manuscript serves as the online technical report of the article published in IEEE Workshop on Smart Data Pricing (SDP), 2015

  28. arXiv:1312.2241  [pdf, other

    cs.NI

    ABMQ: An Agent-Based Modeler and Simulator for Self-Organization in MANETs using Qt

    Authors: Mohammad Noormohammadpour, Mohammad Javad Salehi, Seyed Mohammad Asghari Pari, Babak Hossein Khalaj, Hamidreza Bagheri, Marcos Katz

    Abstract: Agent-Based Modeling and Simulation (ABMS) is a simple and yet powerful method for simulation of interactions among individual agents. Using ABMS, different phenomena can be modeled and simulated without spending additional time on unnecessary complexities. Although ABMS is well-matured in many different fields such as economic, social, and natural phenomena, it has not received much attention in… ▽ More

    Submitted 8 December, 2013; originally announced December 2013.

    Comments: 6 pages, 8 figures, conference paper

  29. arXiv:1309.0088  [pdf, ps, other

    cs.IT

    Caching Gain in Wireless Networks with Fading: A Multi-User Diversity Perspective

    Authors: Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj

    Abstract: We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memo… ▽ More

    Submitted 31 August, 2013; originally announced September 2013.

    Comments: 6 pages, 4 figures, conference

  30. arXiv:1308.2372  [pdf, ps, other

    cs.IT

    Throughput of One-Hop Wireless Networks with Noisy Feedback Channel

    Authors: Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj

    Abstract: In this paper, we consider the effect of feedback channel error on the throughput of one-hop wireless networks under the random connection model. The transmission strategy is based on activating source-destination pairs with strongest direct links. While these activated pairs are identified based on Channel State Information (CSI) at the receive side, the transmit side will be provided with a nois… ▽ More

    Submitted 11 August, 2013; originally announced August 2013.

    Comments: 6 pages, 1 figure, conference

  31. arXiv:1308.0959  [pdf, other

    cs.NI

    LORD: Leader-based framework for Resource Discovery in Mobile Device Clouds

    Authors: Seyed Mohammad Asghari, Yi-Hsuan Kao, Mohammad Hassan Lotfi, Mohammad Noormohammadpour, Bhaskar Krishnamachari, Babak Hossein Khalaj, Marcos Katz

    Abstract: We provide a novel solution for Resource Discovery (RD) in mobile device clouds consisting of selfish nodes. Mobile device clouds (MDCs) refer to cooperative arrangement of communication-capable devices formed with resource-sharing goal in mind. Our work is motivated by the observation that with ever-growing applications of MDCs, it is essential to quickly locate resources offered in such clouds,… ▽ More

    Submitted 16 April, 2017; v1 submitted 5 August, 2013; originally announced August 2013.

  32. arXiv:1306.5291  [pdf, ps, other

    cs.IT

    Throughput of Large One-hop Wireless Networks with General Fading

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj, Kasra Alishahi, Hamed Shah-Mansouri

    Abstract: Consider $n$ source-destination pairs randomly located in a shared wireless medium, resulting in interference between different transmissions. All wireless links are modeled by independently and identically distributed (i.i.d.) random variables, indicating that the dominant channel effect is the random fading phenomenon. We characterize the throughput of one-hop communication in such network. Firs… ▽ More

    Submitted 22 June, 2013; originally announced June 2013.

    Comments: 27 pages, 2 figures

  33. arXiv:1112.4164  [pdf, ps, other

    cs.CV

    A Geometric Approach For Fully Automatic Chromosome Segmentation

    Authors: Shervin Minaee, Mehran Fotouhi, Babak Hossein Khalaj

    Abstract: A fundamental task in human chromosome analysis is chromosome segmentation. Segmentation plays an important role in chromosome karyotyping. The first step in segmentation is to remove intrusive objects such as stain debris and other noises. The next step is detection of touching and overlapping chromosomes, and the final step is separation of such chromosomes. Common methods for separation between… ▽ More

    Submitted 1 September, 2014; v1 submitted 18 December, 2011; originally announced December 2011.

    Comments: This paper has been revised

  34. One-Hop Throughput of Wireless Networks with Random Connections

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj, Kasra Alishahi, Hamed Shah-Mansouri

    Abstract: We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. An scheme achieving the throughput scaling of order $n^{1/3-δ}$, for any $δ>0$, is proposed, where $n$ is the number of nodes. Such achievable throughput, along with the order $n^{1/3}$ u… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: Submitted to IEEE Communications Letters

  35. arXiv:1011.5124  [pdf

    cs.IT cs.NI eess.SY math.OC

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Authors: Amir M. Khodaian, Babak H. Khalaj

    Abstract: Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper, we will analyze delay in random ac… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 22 pages, IET Communications, 2010, Vol 4., Iss 16

    Report number: p11p

  36. arXiv:1011.5122  [pdf

    cs.IT

    Utility Constrained Energy Minimization In Aloha Networks

    Authors: Amir Mahdi Khodaian, Babak H. Khalaj, Mohammad S. Talebi

    Abstract: In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in terms of energy consumption and fairness. First, we propose a heuristic power control method that improves throughput, and then we model the Utility Constrained Energy Minimization (UCEM) problem in which the utility cons… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 5 pages, ccnc07

  37. arXiv:1011.5117  [pdf

    cs.IT

    Energy and Utility Optimization in Wireless Networks with Random Access

    Authors: Amirmahdi Khodaian, Babak H. Khalaj

    Abstract: Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between these criteria and enhancing one of them… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 6 pages, icc07

  38. arXiv:1011.5115  [pdf

    cs.IT cs.NI

    Optimal Utility-Energy tradeoff in Delay Constrained Random Access Networks

    Authors: Amir Mahdi Khodaian, Babak H. Khalaj, Hamed Shah-mansouri

    Abstract: Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in suc… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 5 pages, icc009

  39. arXiv:1011.5113  [pdf

    cs.IT cs.NI

    State-Based Random Access: A Cross-Layer Approach

    Authors: Amir Mahdy Khodaian, Babak H. Khalaj

    Abstract: In this paper, we propose novel state-based algorithms which dynamically control the random access network based on its current state such as channel states of wireless links and backlog states of the queues. After formulating the problem, corresponding algorithms with diverse control functions are proposed. Consequently, it will be shown that the proposed state-based schemes for control of the ra… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: submitted icc2011

  40. arXiv:0912.4390  [pdf

    cs.NI

    Delay-Constrained Utility Maximization in Multihop Random Access Networks

    Authors: Amir M. Khodaian, Babak H. Khalaj

    Abstract: Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks however delay is not limited and proposed algorithms result in very large transmission delays. In this paper, we… ▽ More

    Submitted 22 December, 2009; originally announced December 2009.

  41. Cooperative Transmission for Wireless Relay Networks Using Limited Feedback

    Authors: Javier M. Paredes, Babak H. Khalaj, Alex B. Gershman

    Abstract: To achieve the available performance gains in half-duplex wireless relay networks, several cooperative schemes have been earlier proposed using either distributed space-time coding or distributed beamforming for the transmitter without and with channel state information (CSI), respectively. However, these schemes typically have rather high implementation and/or decoding complexities, especially… ▽ More

    Submitted 29 July, 2009; v1 submitted 8 April, 2009; originally announced April 2009.

    Comments: V1: 27 pages, 1 column, 6 figures. Submitted to IEEE Transactions on Signal Processing, February 2, 2009. V2: 30 pages, 1 column, 8 figures. Revised version submitted to IEEE Transactions on Signal Processing, July 23, 2009

  42. arXiv:0902.1853  [pdf, ps, other

    cs.IT

    A Unified Approach to Sparse Signal Processing

    Authors: F. Marvasti, A. Amini, F. Haddadi, M. Soltanolkotabi, B. H. Khalaj, A. Aldroubi, S. Holm, S. Sanei, J. Chambers

    Abstract: A unified view of sparse signal processing is presented in tutorial form by bringing together various fields. For each of these fields, various algorithms and techniques, which have been developed to leverage sparsity, are described succinctly. The common benefits of significant reduction in sampling rate and processing manipulations are revealed. The key applications of sparse signal processi… ▽ More

    Submitted 11 February, 2009; originally announced February 2009.

    Comments: 43 pages, 40 figures, 15 tables