Skip to main content

Showing 1–46 of 46 results for author: Lim, S H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.17351  [pdf, ps, other

    cs.LG cs.AI

    FLEX: A Backbone for Diffusion-Based Modeling of Spatio-temporal Physical Systems

    Authors: N. Benjamin Erichson, Vinicius Mikuni, Dongwei Lyu, Yang Gao, Omri Azencot, Soon Hoe Lim, Michael W. Mahoney

    Abstract: We introduce FLEX (FLow EXpert), a backbone architecture for generative modeling of spatio-temporal physical systems using diffusion models. FLEX operates in the residual space rather than on raw data, a modeling choice that we motivate theoretically, showing that it reduces the variance of the velocity field in the diffusion model, which helps stabilize training. FLEX integrates a latent Transfor… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  2. arXiv:2505.00763  [pdf, ps, other

    astro-ph.GA astro-ph.CO cs.LG hep-ex hep-ph

    JFlow: Model-Independent Spherical Jeans Analysis using Equivariant Continuous Normalizing Flows

    Authors: Sung Hak Lim, Kohei Hayashi, Shun'ichi Horigome, Shigeki Matsumoto, Mihoko M. Nojiri

    Abstract: The kinematics of stars in dwarf spheroidal galaxies have been studied to understand the structure of dark matter halos. However, the kinematic information of these stars is often limited to celestial positions and line-of-sight velocities, making full phase space analysis challenging. Conventional methods rely on projected analytic phase space density models with several parameters and infer dark… ▽ More

    Submitted 2 June, 2025; v1 submitted 1 May, 2025; originally announced May 2025.

    Comments: 10 pages, 3 figures, 1 table, revised version for the journal submission

    Report number: CTPU-PTC-25-15

  3. arXiv:2501.18911  [pdf, ps, other

    cs.IT eess.SP

    Integrated Communication and Binary State Detection Under Unequal Error Constraints

    Authors: Daewon Seo, Sung Hoon Lim

    Abstract: This work considers a problem of integrated sensing and communication (ISAC) in which the goal of sensing is to detect a binary state. Unlike most approaches that minimize the total detection error probability, in our work, we disaggregate the error probability into false alarm and missed detection probabilities and investigate their information-theoretic three-way tradeoff including communication… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

  4. arXiv:2410.21256  [pdf, other

    cs.AI cs.CV eess.IV

    Multi-modal AI for comprehensive breast cancer prognostication

    Authors: Jan Witowski, Ken G. Zeng, Joseph Cappadona, Jailan Elayoubi, Khalil Choucair, Elena Diana Chiru, Nancy Chan, Young-Joon Kang, Frederick Howard, Irina Ostrovnaya, Carlos Fernandez-Granda, Freya Schnabel, Zoe Steinsnyder, Ugur Ozerdem, Kangning Liu, Waleed Abdulsattar, Yu Zong, Lina Daoud, Rafic Beydoun, Anas Saad, Nitya Thakore, Mohammad Sadic, Frank Yeung, Elisa Liu, Theodore Hill , et al. (26 additional authors not shown)

    Abstract: Treatment selection in breast cancer is guided by molecular subtypes and clinical characteristics. However, current tools including genomic assays lack the accuracy required for optimal clinical decision-making. We developed a novel artificial intelligence (AI)-based approach that integrates digital pathology images with clinical data, providing a more robust and effective method for predicting th… ▽ More

    Submitted 2 March, 2025; v1 submitted 28 October, 2024; originally announced October 2024.

  5. arXiv:2410.03229  [pdf, other

    stat.ML cs.LG

    Elucidating the Design Choice of Probability Paths in Flow Matching for Forecasting

    Authors: Soon Hoe Lim, Yijin Wang, Annan Yu, Emma Hart, Michael W. Mahoney, Xiaoye S. Li, N. Benjamin Erichson

    Abstract: Flow matching has recently emerged as a powerful paradigm for generative modeling and has been extended to probabilistic time series forecasting in latent spaces. However, the impact of the specific choice of probability path model on forecasting performance remains under-explored. In this work, we demonstrate that forecasting spatio-temporal data with flow matching is highly sensitive to the sele… ▽ More

    Submitted 18 January, 2025; v1 submitted 4 October, 2024; originally announced October 2024.

    Comments: 33 pages

  6. arXiv:2410.02035  [pdf, other

    cs.LG stat.ML

    Tuning Frequency Bias of State Space Models

    Authors: Annan Yu, Dongwei Lyu, Soon Hoe Lim, Michael W. Mahoney, N. Benjamin Erichson

    Abstract: State space models (SSMs) leverage linear, time-invariant (LTI) systems to effectively learn sequences with long-range dependencies. By analyzing the transfer functions of LTI systems, we find that SSMs exhibit an implicit bias toward capturing low-frequency components more effectively than high-frequency ones. This behavior aligns with the broader notion of frequency bias in deep learning model t… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

  7. arXiv:2408.17006  [pdf, other

    cs.CV

    Retrieval-Augmented Natural Language Reasoning for Explainable Visual Question Answering

    Authors: Su Hyeon Lim, Minkuk Kim, Hyeon Bae Kim, Seong Tae Kim

    Abstract: Visual Question Answering with Natural Language Explanation (VQA-NLE) task is challenging due to its high demand for reasoning-based inference. Recent VQA-NLE studies focus on enhancing model networks to amplify the model's reasoning capability but this approach is resource-consuming and unstable. In this work, we introduce a new VQA-NLE model, ReRe (Retrieval-augmented natural language Reasoning)… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

    Comments: ICIP Workshop 2024

  8. arXiv:2402.13562  [pdf, other

    cs.CL

    Analysis of Multi-Source Language Training in Cross-Lingual Transfer

    Authors: Seong Hoon Lim, Taejun Yun, Jinhyeon Kim, Jihun Choi, Taeuk Kim

    Abstract: The successful adaptation of multilingual language models (LMs) to a specific language-task pair critically depends on the availability of data tailored for that condition. While cross-lingual transfer (XLT) methods have contributed to addressing this data scarcity problem, there still exists ongoing debate about the mechanisms behind their effectiveness. In this work, we focus on one of promising… ▽ More

    Submitted 4 June, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted to ACL 2024

  9. arXiv:2401.12499  [pdf, ps, other

    cs.IT eess.SP

    On the Fundamental Tradeoff of Joint Communication and Quickest Change Detection with State-Independent Data Channels

    Authors: Daewon Seo, Sung Hoon Lim

    Abstract: In this work, we take the initiative in studying the information-theoretic tradeoff between communication and quickest change detection (QCD) under an integrated sensing and communication setting. We formally establish a joint communication and sensing problem for the quickest change detection. We assume a broadcast channel with a transmitter, a communication receiver, and a QCD detector in which… ▽ More

    Submitted 9 October, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

  10. arXiv:2310.17166  [pdf, other

    cs.CL

    X-SNS: Cross-Lingual Transfer Prediction through Sub-Network Similarity

    Authors: Taejun Yun, Jinhyeon Kim, Deokyeong Kang, Seong Hoon Lim, Jihoon Kim, Taeuk Kim

    Abstract: Cross-lingual transfer (XLT) is an emergent ability of multilingual language models that preserves their performance on a task to a significant extent when evaluated in languages that were not included in the fine-tuning process. While English, due to its widespread usage, is typically regarded as the primary language for model adaption in various tasks, recent studies have revealed that the effic… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted to EMNLP 2023 (Findings)

  11. arXiv:2310.02537  [pdf, other

    cs.IT

    A Context-Aware CEO Problem

    Authors: Daewon Seo, Sung Hoon Lim, Yongjune Kim

    Abstract: In many sensor network applications, a fusion center often has additional valuable information, such as context data, which cannot be obtained directly from the sensors. Motivated by this, we study a generalized CEO problem where a CEO has access to context information. The main contribution of this work is twofold. Firstly, we characterize the asymptotically optimal error exponent per rate as the… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  12. arXiv:2212.00228  [pdf, other

    cs.LG cs.NE stat.ML

    Gated Recurrent Neural Networks with Weighted Time-Delay Feedback

    Authors: N. Benjamin Erichson, Soon Hoe Lim, Michael W. Mahoney

    Abstract: In this paper, we present a novel approach to modeling long-term dependencies in sequential data by introducing a gated recurrent unit (GRU) with a weighted time-delay feedback mechanism. Our proposed model, named $τ$-GRU, is a discretized version of a continuous-time formulation of a recurrent unit, where the dynamics are governed by delay differential equations (DDEs). We prove the existence and… ▽ More

    Submitted 19 May, 2025; v1 submitted 30 November, 2022; originally announced December 2022.

    Comments: Proceedings of the 28th International Conference on Artificial Intelligence and Statistics (AISTATS) 2025,

  13. arXiv:2205.11361  [pdf, other

    stat.ML cs.LG math.DS math.PR

    Chaotic Regularization and Heavy-Tailed Limits for Deterministic Gradient Descent

    Authors: Soon Hoe Lim, Yijun Wan, Umut Şimşekli

    Abstract: Recent studies have shown that gradient descent (GD) can achieve improved generalization when its dynamics exhibits a chaotic behavior. However, to obtain the desired effect, the step-size should be chosen sufficiently large, a task which is problem dependent and can be difficult in practice. In this study, we incorporate a chaotic component to GD in a controlled manner, and introduce multiscale p… ▽ More

    Submitted 22 October, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: 24 pages, accepted at NeurIPS 2022

  14. arXiv:2202.13436  [pdf, other

    cs.LG cs.AI

    Neural-Progressive Hedging: Enforcing Constraints in Reinforcement Learning with Stochastic Programming

    Authors: Supriyo Ghosh, Laura Wynter, Shiau Hong Lim, Duc Thien Nguyen

    Abstract: We propose a framework, called neural-progressive hedging (NP), that leverages stochastic programming during the online phase of executing a reinforcement learning (RL) policy. The goal is to ensure feasibility with respect to constraints and risk-based objectives such as conditional value-at-risk (CVaR) during the execution of the policy, using probabilistic models of the state transitions to gui… ▽ More

    Submitted 27 February, 2022; originally announced February 2022.

  15. arXiv:2202.01972  [pdf, ps, other

    cs.IT cs.LG

    Hybrid Neural Coded Modulation: Design and Training Methods

    Authors: Sung Hoon Lim, Jiyong Han, Wonjong Noh, Yujae Song, Sang-Woon Jeon

    Abstract: We propose a hybrid coded modulation scheme which composes of inner and outer codes. The outer-code can be any standard binary linear code with efficient soft decoding capability (e.g. low-density parity-check (LDPC) codes). The inner code is designed using a deep neural network (DNN) which takes the channel coded bits and outputs modulated symbols. For training the DNN, we propose to use a loss f… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  16. arXiv:2202.01263  [pdf, other

    cs.LG stat.ML

    NoisyMix: Boosting Model Robustness to Common Corruptions

    Authors: N. Benjamin Erichson, Soon Hoe Lim, Winnie Xu, Francisco Utrera, Ziang Cao, Michael W. Mahoney

    Abstract: For many real-world applications, obtaining stable and robust statistical performance is more important than simply achieving state-of-the-art predictive test accuracy, and thus robustness of neural networks is an increasingly important topic. Relatedly, data augmentation schemes have been shown to improve robustness with respect to input perturbations and domain shifts. Motivated by this, we intr… ▽ More

    Submitted 22 May, 2022; v1 submitted 2 February, 2022; originally announced February 2022.

  17. arXiv:2110.07275  [pdf, other

    cs.LG cs.AI

    Order Constraints in Optimal Transport

    Authors: Fabian Lim, Laura Wynter, Shiau Hong Lim

    Abstract: Optimal transport is a framework for comparing measures whereby a cost is incurred for transporting one measure to another. Recent works have aimed to improve optimal transport plans through the introduction of various forms of structure. We introduce novel order constraints into the optimal transport formulation to allow for the incorporation of structure. We define an efficient method for obtain… ▽ More

    Submitted 28 June, 2022; v1 submitted 14 October, 2021; originally announced October 2021.

    Comments: To appear in Proceedings of ICML 2022. Main Paper + Supplementary

  18. arXiv:2110.02180  [pdf, other

    cs.LG stat.ML

    Noisy Feature Mixup

    Authors: Soon Hoe Lim, N. Benjamin Erichson, Francisco Utrera, Winnie Xu, Michael W. Mahoney

    Abstract: We introduce Noisy Feature Mixup (NFM), an inexpensive yet effective method for data augmentation that combines the best of interpolation based training and noise injection schemes. Rather than training with convex combinations of pairs of examples and their labels, we use noise-perturbed convex combinations of pairs of data points in both input and feature space. This method includes mixup and ma… ▽ More

    Submitted 21 November, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: 34 pages

    Journal ref: ICLR 2022

  19. arXiv:2110.00132  [pdf, other

    cs.IT

    A Unified Discretization Approach to Compute-Forward: From Discrete to Continuous Inputs

    Authors: Adriano Pastore, Sung Hoon Lim, Chen Feng, Bobak Nazer, Michael Gastpar

    Abstract: Compute-forward is a coding technique that enables receiver(s) in a network to directly decode one or more linear combinations of the transmitted codewords. Initial efforts focused on Gaussian channels and derived achievable rate regions via nested lattice codes and single-user (lattice) decoding as well as sequential (lattice) decoding. Recently, these results have been generalized to discrete me… ▽ More

    Submitted 30 September, 2021; originally announced October 2021.

    Comments: 86 pages, 7 figures, submitted to IEEE Transactions of Information Theory

  20. arXiv:2102.09785  [pdf, ps, other

    eess.SP cs.IT cs.LG

    Deep Learning-based Beam Tracking for Millimeter-wave Communications under Mobility

    Authors: Sun Hong Lim, Sunwoo Kim, Byonghyo Shim, Jun Won Choi

    Abstract: In this paper, we propose a deep learning-based beam tracking method for millimeter-wave (mmWave)communications. Beam tracking is employed for transmitting the known symbols using the sounding beams and tracking time-varying channels to maintain a reliable communication link. When the pose of a user equipment (UE) device varies rapidly, the mmWave channels also tend to vary fast, which hinders sea… ▽ More

    Submitted 1 December, 2022; v1 submitted 19 February, 2021; originally announced February 2021.

    Comments: 23 pages, 8 figures

  21. arXiv:2102.09361  [pdf, other

    cs.LG cs.AI

    Efficient Reinforcement Learning in Resource Allocation Problems Through Permutation Invariant Multi-task Learning

    Authors: Desmond Cai, Shiau Hong Lim, Laura Wynter

    Abstract: One of the main challenges in real-world reinforcement learning is to learn successfully from limited training samples. We show that in certain settings, the available data can be dramatically increased through a form of multi-task learning, by exploiting an invariance property in the tasks. We provide a theoretical performance bound for the gain in sample efficiency under this setting. This motiv… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

  22. arXiv:2102.04877  [pdf, other

    stat.ML cs.LG math.DS math.PR

    Noisy Recurrent Neural Networks

    Authors: Soon Hoe Lim, N. Benjamin Erichson, Liam Hodgkinson, Michael W. Mahoney

    Abstract: We provide a general framework for studying recurrent neural networks (RNNs) trained by injecting noise into hidden states. Specifically, we consider RNNs that can be viewed as discretizations of stochastic differential equations driven by input data. This framework allows us to study the implicit regularization effect of general noise injection schemes by deriving an approximate explicit regulari… ▽ More

    Submitted 1 December, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: 38 pages

    Journal ref: NeurIPS 2021 (https://proceedings.neurips.cc/paper/2021/hash/29301521774ff3cbd26652b2d5c95996-Abstract.html)

  23. arXiv:2101.06171  [pdf, other

    cs.LG cs.AI cs.DC

    Probabilistic Inference for Learning from Untrusted Sources

    Authors: Duc Thien Nguyen, Shiau Hoong Lim, Laura Wynter, Desmond Cai

    Abstract: Federated learning brings potential benefits of faster learning, better solutions, and a greater propensity to transfer when heterogeneous data from different parties increases diversity. However, because federated learning tasks tend to be large and complex, and training times non-negligible, it is important for the aggregation algorithm to be robust to non-IID data and corrupted parties. This ro… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  24. arXiv:2009.06303  [pdf, other

    cs.LG cs.DC math.OC stat.ML

    Robustness and Personalization in Federated Learning: A Unified Approach via Regularization

    Authors: Achintya Kundu, Pengqian Yu, Laura Wynter, Shiau Hong Lim

    Abstract: We present a class of methods for robust, personalized federated learning, called Fed+, that unifies many federated learning algorithms. The principal advantage of this class of methods is to better accommodate the real-world characteristics found in federated training, such as the lack of IID data across parties, the need for robustness to outliers or stragglers, and the requirement to perform we… ▽ More

    Submitted 12 July, 2022; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: Accepted by IEEE EDGE 2022 (16 pages, 4 figures, 2 tables)

  25. arXiv:2006.11052  [pdf, ps, other

    stat.ML cond-mat.dis-nn cs.LG math.PR

    Understanding Recurrent Neural Networks Using Nonequilibrium Response Theory

    Authors: Soon Hoe Lim

    Abstract: Recurrent neural networks (RNNs) are brain-inspired models widely used in machine learning for analyzing sequential data. The present work is a contribution towards a deeper understanding of how RNNs process input signals using the response theory from nonequilibrium statistical mechanics. For a class of continuous-time stochastic RNNs (SRNNs) driven by an input signal, we derive a Volterra type s… ▽ More

    Submitted 18 January, 2021; v1 submitted 19 June, 2020; originally announced June 2020.

    Comments: 48 pages

    Journal ref: Journal of Machine Learning Research (2021)

  26. arXiv:2006.00778  [pdf, other

    cs.LG cs.AI stat.ML

    Variational Bayesian Inference for Crowdsourcing Predictions

    Authors: Desmond Cai, Duc Thien Nguyen, Shiau Hong Lim, Laura Wynter

    Abstract: Crowdsourcing has emerged as an effective means for performing a number of machine learning tasks such as annotation and labelling of images and other data sets. In most early settings of crowdsourcing, the task involved classification, that is assigning one of a discrete set of labels to each task. Recently, however, more complex tasks have been attempted including asking crowdsource workers to a… ▽ More

    Submitted 1 June, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

    Comments: 7 pages

  27. arXiv:2004.01387  [pdf, other

    cs.LG cs.AI

    A Deep Ensemble Multi-Agent Reinforcement Learning Approach for Air Traffic Control

    Authors: Supriyo Ghosh, Sean Laguna, Shiau Hong Lim, Laura Wynter, Hasan Poonawala

    Abstract: Air traffic control is an example of a highly challenging operational problem that is readily amenable to human expertise augmentation via decision support technologies. In this paper, we propose a new intelligent decision making framework that leverages multi-agent reinforcement learning (MARL) to dynamically suggest adjustments of aircraft speeds in real-time. The goal of the system is to enhanc… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

  28. arXiv:1901.03274  [pdf, ps, other

    cs.IT

    Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding

    Authors: Sung Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar

    Abstract: Consider a receiver in a multi-user network that wishes to decode several messages. Simultaneous joint typicality decoding is one of the most powerful techniques for determining the fundamental limits at which reliable decoding is possible. This technique has historically been used in conjunction with random i.i.d. codebooks to establish achievable rate regions for networks. Recently, it has been… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 24 pages, 5 figures, submitted to IEEE Transactions on Information Theory

  29. arXiv:1805.03338  [pdf, ps, other

    cs.IT

    On the Optimal Achievable Rates for Linear Computation With Random Homologous Codes

    Authors: Pinar Sen, Sung Hoon Lim, Young-Han Kim

    Abstract: The problem of computing a linear combination of sources over a multiple access channel is studied. Inner and outer bounds on the optimal tradeoff between the communication rates are established when encoding is restricted to random ensembles of homologous codes, namely, structured nested coset codes from the same generator matrix and individual shaping functions, but when decoding is optimized wi… ▽ More

    Submitted 29 October, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

  30. arXiv:1804.07973  [pdf, ps, other

    cs.IT

    Efficient Beam Training and Channel Estimation for Millimeter Wave Communications Under Mobility

    Authors: Sun Hong Lim, Jisu Bae, Sunwoo Kim, Byonghyo Shim, Jun Won Choi

    Abstract: In this paper, we propose an efficient beam training technique for millimeter-wave (mmWave) communications. When some mobile users are under high mobility, the beam training should be performed frequently to ensure the accurate acquisition of the channel state information. In order to reduce the resource overhead caused by frequent beam training, we introduce a dedicated beam training strategy whi… ▽ More

    Submitted 7 October, 2018; v1 submitted 21 April, 2018; originally announced April 2018.

    Comments: 3p pages, This paper was submitted to IEEE Trans. Wireless Commun. on Oct. 6, 2018

  31. arXiv:1804.07642  [pdf, ps, other

    cs.IT cs.NI

    On the Effects of Subpacketization in Content-Centric Mobile Networks

    Authors: Adeel Malik, Sung Hoon Lim, Won-Yong Shin

    Abstract: A large-scale content-centric mobile ad hoc network employing subpacketization is studied in which each mobile node having finite-size cache moves according to the reshuffling mobility model and requests a content object from the library independently at random according to the Zipf popularity distribution. Instead of assuming that one content object is transferred in a single time slot, we consid… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Comments: 16 pages, 6 figures, To appear in the IEEE Journal on Selected Areas in Communications

  32. arXiv:1804.04818  [pdf, ps, other

    cs.IT

    Cooperative Strategies for {UAV}-Enabled Small Cell Networks Sharing Unlicensed Spectrum

    Authors: Yujae Song, Sung Hoon Lim, Sang-Woon Jeon, Seungjae Baek

    Abstract: In this paper, we study an aerial drone base station (DBS) assisted cellular network that consists of a single ground macro base station (MBS), multiple DBSs, and multiple ground terminals (GT). We assume that the MBS transmits to the DBSs and the GTs in the licensed band while the DBSs use a separate unlicensed band (e.g. Wi-Fi) to transmit to the GTs. For the utilization of the DBSs, we propose… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: 26 pages, 10 figures

  33. arXiv:1712.10293  [pdf, ps, other

    cs.IT

    Compute--Forward Multiple Access (CFMA): Practical Code Design

    Authors: Erixhen Sula, Jingge Zhu, Adriano Pastore, Sung Hoon Lim, Michael Gastpar

    Abstract: We present a practical strategy that aims to attain rate points on the dominant face of the multiple access channel capacity using a standard low complexity decoder. This technique is built upon recent theoretical developments of Zhu and Gastpar on compute-forward multiple access (CFMA) which achieves the capacity of the multiple access channel using a sequential decoder. We illustrate this strate… ▽ More

    Submitted 29 December, 2017; originally announced December 2017.

    Comments: 30 pages, 14 figures, submitted to the IEEE Transactions on Wireless Communications

  34. arXiv:1707.08621  [pdf, ps, other

    cs.IT

    Communication versus Computation: Duality for multiple access channels and source coding

    Authors: Jingge Zhu, Sung Hoon Lim, Michael Gastpar

    Abstract: Computation codes in network information theory are designed for the scenarios where the decoder is not interested in recovering the information sources themselves, but only a function thereof. Körner and Marton showed for distributed source coding that such function decoding can be achieved more efficiently than decoding the full information sources. Compute-and-forward has shown that function de… ▽ More

    Submitted 26 July, 2017; originally announced July 2017.

    Comments: submitted

  35. arXiv:1702.00276  [pdf, ps, other

    cs.IT

    New Beam Tracking Technique for Millimeter Wave-band Communications

    Authors: Jisu Bae, Sun Hong Lim, Jin Hyeok Yoo, Jun Won Choi

    Abstract: In this paper, we propose an efficient beam tracking method for mobility scenario in mmWave-band communications. When the position of the mobile changes in mobility scenario, the base-station needs to perform beam training frequently to track the time-varying channel, thereby spending significant resources for training beams. In order to reduce the training overhead, we propose a new beam training… ▽ More

    Submitted 1 February, 2017; originally announced February 2017.

    Comments: 6 pages

  36. arXiv:1606.09548  [pdf, ps, other

    cs.IT

    A Joint Typicality Approach to Algebraic Network Information Theory

    Authors: Sung Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar

    Abstract: This paper presents a joint typicality framework for encoding and decoding nested linear codes for multi-user networks. This framework provides a new perspective on compute-forward within the context of discrete memoryless networks. In particular, it establishes an achievable rate region for computing the weighted sum of nested linear codewords over a discrete memoryless multiple-access channel (M… ▽ More

    Submitted 30 June, 2016; originally announced June 2016.

    Comments: 69 pages, 11 figures, submitted to the IEEE Transactions on Information Theory

  37. Fundamental Limits of Spectrum Sharing Full-Duplex Multicell Networks

    Authors: Sung Ho Chae, Sang-Woon Jeon, Sung Hoon Lim

    Abstract: This paper studies the degrees of freedom of full-duplex multicell networks that share the spectrum among multiple cells in a non-orthogonal setting. In the considered network, we assume that {\em full-duplex} base stations with multiple transmit and receive antennas communicate with multiple single-antenna mobile users. By spectrum sharing among multiple cells and (simultaneously) enabling full-d… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 20 pages, 6 figures, submitted to IEEE Journal on Selected Areas in Communications

  38. Information Theoretic Caching: The Multi-User Case

    Authors: Sung Hoon Lim, Chien-Yi Wang, Michael Gastpar

    Abstract: In this paper, we consider a cache aided network in which each user is assumed to have individual caches, while upon users' requests, an update message is sent though a common link to all users. First, we formulate a general information theoretic setting that represents the database as a discrete memoryless source, and the users' requests as side information that is available everywhere except at… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: Submitted to IEEE Trans. Inf. Theory and presented in part at ITA 2016. 43 pages, 8 figures

  39. arXiv:1601.05690  [pdf, ps, other

    cs.IT

    A New Converse Bound for Coded Caching

    Authors: Chien-Yi Wang, Sung Hoon Lim, Michael Gastpar

    Abstract: An information-theoretic lower bound is developed for the caching system studied by Maddah-Ali and Niesen. By comparing the proposed lower bound with the decentralized coded caching scheme of Maddah-Ali and Niesen, the optimal memory--rate tradeoff is characterized to within a multiplicative gap of $4.7$ for the worst case, improving the previous analytical gap of $12$. Furthermore, for the case w… ▽ More

    Submitted 21 January, 2016; originally announced January 2016.

    Comments: 6 pages, 2 figures, to be presented at ITA 2016

  40. arXiv:1510.00832  [pdf, ps, other

    cs.IT

    Distributed Decode-Forward for Relay Networks

    Authors: Sung Hoon Lim, Kwang Taik Kim, Young-Han Kim

    Abstract: A new coding scheme for general N-node relay networks is presented for unicast, multicast, and broadcast. The proposed distributed decode-forward scheme combines and generalizes Marton coding for single-hop broadcast channels and the Cover-El Gamal partial decode-forward coding scheme for 3-node relay channels. The key idea of the scheme is to precode all the codewords of the entire network at the… ▽ More

    Submitted 11 January, 2017; v1 submitted 3 October, 2015; originally announced October 2015.

    Comments: 32 pages, 5 figures, submitted to the IEEE Transactions on Information Theory

  41. Information-Theoretic Caching: Sequential Coding for Computing

    Authors: Chien-Yi Wang, Sung Hoon Lim, Michael Gastpar

    Abstract: Under the paradigm of caching, partial data is delivered before the actual requests of users are known. In this paper, this problem is modeled as a canonical distributed source coding problem with side information, where the side information represents the users' requests. For the single-user case, a single-letter characterization of the optimal rate region is established, and for several importan… ▽ More

    Submitted 27 February, 2016; v1 submitted 2 April, 2015; originally announced April 2015.

    Comments: submitted to IEEE Trans. Inf. Theory and presented in part at ISIT 2015

  42. Degrees of Freedom of Full-Duplex Multiantenna Cellular Networks

    Authors: Sang-Woon Jeon, Sung Ho Chae, Sung Hoon Lim

    Abstract: We study the degrees of freedom (DoF) of cellular networks in which a full duplex (FD) base station (BS) equipped with multiple transmit and receive antennas communicates with multiple mobile users. We consider two different scenarios. In the first scenario, we study the case when half duplex (HD) users, partitioned to either the uplink (UL) set or the downlink (DL) set, simultaneously communicate… ▽ More

    Submitted 13 January, 2015; originally announced January 2015.

    Comments: 21 pages, 16 figures, a shorter version of this paper has been submitted to the IEEE International Symposium on Information Theory (ISIT) 2015

  43. arXiv:1306.0530  [pdf, ps, other

    cs.IT

    Hybrid Coding: An Interface for Joint Source-Channel Coding and Network Communication

    Authors: Paolo Minero, Sung Hoon Lim, Young-Han Kim

    Abstract: A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled. However, unlike the separation architecture, the same codeword… ▽ More

    Submitted 3 June, 2013; originally announced June 2013.

    Comments: 42 pages, 10 figures. Submitted to IEEE Transactions on Information Theory

  44. arXiv:1202.3741  [pdf

    cs.AI

    Noisy Search with Comparative Feedback

    Authors: Shiau Hong Lim, Peter Auer

    Abstract: We present theoretical results in terms of lower and upper bounds on the query complexity of noisy search with comparative feedback. In this search model, the noise in the feedback depends on the distance between query points and the search target. Consequently, the error probability in the feedback is not fixed but varies for the queries posed by the search algorithm. Our results show that a targ… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Report number: UAI-P-2011-PG-445-452

  45. arXiv:1002.3188  [pdf, ps, other

    cs.IT

    Noisy Network Coding

    Authors: Sung Hoon Lim, Young-Han Kim, Abbas El Gamal, Sae-Young Chung

    Abstract: A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as… ▽ More

    Submitted 11 March, 2010; v1 submitted 16 February, 2010; originally announced February 2010.

    Comments: 33 pages, 4 figures, submitted to IEEE Transactions on Information Theory

  46. Deterministic Relay Networks with State Information

    Authors: Sung Hoon Lim, Young-Han Kim, Sae-Young Chung

    Abstract: Motivated by fading channels and erasure channels, the problem of reliable communication over deterministic relay networks is studied, in which relay nodes receive a function of the incoming signals and a random network state. An achievable rate is characterized for the case in which destination nodes have full knowledge of the state information. If the relay nodes receive a linear function of t… ▽ More

    Submitted 20 May, 2009; v1 submitted 19 May, 2009; originally announced May 2009.

    Comments: 5 pages, to appear in proc. IEEE ISIT, June 2009