Skip to main content

Showing 1–41 of 41 results for author: Sundaresan, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.09182  [pdf, other

    cs.NI

    Utility Optimal Scheduling with a Slow Time-Scale Index-Bias for Achieving Rate Guarantees in Cellular Networks

    Authors: Anurag Kumar, Rajesh Sundaresan

    Abstract: One of the requirements of network slicing in 5G networks is RAN (radio access network) scheduling with rate guarantees. We study a three-time-scale algorithm for maximum sum utility scheduling, with minimum rate constraints. As usual, the scheduler computes an index for each UE in each slot, and schedules the UE with the maximum index. This is at the fastest, natural time-scale of channel fading.… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

    Comments: Technical Report

    ACM Class: C.2.1

  2. arXiv:2106.02807  [pdf, ps, other

    cs.NI cs.IT

    The Four Levels of Fixed-Points in Mean-Field Models

    Authors: Sarath Yasodharan, Rajesh Sundaresan

    Abstract: The fixed-point analysis refers to the study of fixed-points that arise in the context of complex systems with many interacting entities. In this expository paper, we describe four levels of fixed-points in mean-field interacting particle systems. These four levels are (i) the macroscopic observables of the system, (ii) the probability distribution over states of a particle at equilibrium, (iii) t… ▽ More

    Submitted 5 June, 2021; originally announced June 2021.

    Comments: Accepted for publication at the Twenty Seventh National Conference on Communications (NCC 2021)

  3. arXiv:2105.03603  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Learning to Detect an Odd Restless Markov Arm with a Trembling Hand

    Authors: P. N. Karthik, Rajesh Sundaresan

    Abstract: This paper studies the problem of finding an anomalous arm in a multi-armed bandit when (a) each arm is a finite-state Markov process, and (b) the arms are restless. Here, anomaly means that the transition probability matrix (TPM) of one of the arms (the odd arm) is different from the common TPM of each of the non-odd arms. The TPMs are unknown to a decision entity that wishes to find the index of… ▽ More

    Submitted 1 June, 2021; v1 submitted 8 May, 2021; originally announced May 2021.

    Comments: 49 pages. A shorter version of this manuscript has been accepted for presentation at the 2021 IEEE International Symposium on Information Theory. This manuscript contains the proofs of all the main results

  4. arXiv:2012.12839  [pdf, other

    cs.MA

    Cohorting to isolate asymptomatic spreaders: An agent-based simulation study on the Mumbai Suburban Railway

    Authors: Alok Talekar, Sharad Shriram, Nidhin Vaidhiyan, Gaurav Aggarwal, Jiangzhuo Chen, Srini Venkatramanan, Lijing Wang, Aniruddha Adiga, Adam Sadilek, Ashish Tendulkar, Madhav Marathe, Rajesh Sundaresan, Milind Tambe

    Abstract: The Mumbai Suburban Railways, \emph{locals}, are a key transit infrastructure of the city and is crucial for resuming normal economic activity. To reduce disease transmission, policymakers can enforce reduced crowding and mandate wearing of masks. \emph{Cohorting} -- forming groups of travelers that always travel together, is an additional policy to reduce disease transmission on \textit{locals} w… ▽ More

    Submitted 24 December, 2020; v1 submitted 23 December, 2020; originally announced December 2020.

    Comments: Will be presented at AAMAS 2021. Minor edits to styling (per conf guidelines) and acknowledgement

  5. arXiv:2010.04955  [pdf, other

    cs.CR

    A Distributed Hierarchy Framework for Enhancing Cyber Security of Control Center Applications

    Authors: Chetan Kumar Kuraganti, Bryan Paul Robert, Gurunath Gurrala, Ashish Joglekar, Arun Babu Puthuparambil, Rajesh Sundaresan, Himanshu Tyagi

    Abstract: Recent cyber-attacks on power grids highlight the necessity to protect the critical functionalities of a control center vital for the safe operation of a grid. Even in a distributed framework one central control center acts as a coordinator in majority of the control center architectures. Such a control center can become a prime target for cyber as well as physical attacks, and, hence, a single po… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

  6. arXiv:2008.04849  [pdf, other

    q-bio.PE cs.OH physics.soc-ph q-bio.QM

    City-Scale Agent-Based Simulators for the Study of Non-Pharmaceutical Interventions in the Context of the COVID-19 Epidemic

    Authors: Shubhada Agrawal, Siddharth Bhandari, Anirban Bhattacharjee, Anand Deo, Narendra M. Dixit, Prahladh Harsha, Sandeep Juneja, Poonam Kesarwani, Aditya Krishna Swamy, Preetam Patil, Nihesh Rathod, Ramprasad Saptharishi, Sharad Shriram, Piyush Srivastava, Rajesh Sundaresan, Nidhin Koshy Vaidhiyan, Sarath Yasodharan

    Abstract: We highlight the usefulness of city-scale agent-based simulators in studying various non-pharmaceutical interventions to manage an evolving pandemic. We ground our studies in the context of the COVID-19 pandemic and demonstrate the power of the simulator via several exploratory case studies in two metropolises, Bengaluru and Mumbai. Such tools become common-place in any city administration's tool… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: 56 pages

    Journal ref: Journal of the Indian Institute of Science, volume 100, pages 809-847, 2020

  7. arXiv:2007.12961  [pdf, ps, other

    cs.IT

    Sequential Multi-hypothesis Testing in Multi-armed Bandit Problems:An Approach for Asymptotic Optimality

    Authors: Gayathri R Prabhu, Srikrishna Bhashyam, Aditya Gopalan, Rajesh Sundaresan

    Abstract: We consider a multi-hypothesis testing problem involving a K-armed bandit. Each arm's signal follows a distribution from a vector exponential family. The actual parameters of the arms are unknown to the decision maker. The decision maker incurs a delay cost for delay until a decision and a switching cost whenever he switches from one arm to another. His goal is to minimise the overall cost until a… ▽ More

    Submitted 28 July, 2020; v1 submitted 25 July, 2020; originally announced July 2020.

    Comments: arXiv admin note: text overlap with arXiv:1712.03682

  8. arXiv:2006.03375  [pdf, other

    q-bio.PE cs.OH physics.soc-ph q-bio.QM

    COVID-19 Epidemic Study II: Phased Emergence From the Lockdown in Mumbai

    Authors: Prahladh Harsha, Sandeep Juneja, Preetam Patil, Nihesh Rathod, Ramprasad Saptharishi, A. Y. Sarath, Sharad Sriram, Piyush Srivastava, Rajesh Sundaresan, Nidhin Koshy Vaidhiyan

    Abstract: The nation-wide lockdown starting 25 March 2020, aimed at suppressing the spread of the COVID-19 disease, was extended until 31 May 2020 in three subsequent orders by the Government of India. The extended lockdown has had significant social and economic consequences and `lockdown fatigue' has likely set in. Phased reopening began from 01 June 2020 onwards. Mumbai, one of the most crowded cities in… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Comments: 34 pages

  9. arXiv:2005.06255  [pdf, other

    cs.IT stat.ML

    Detecting an Odd Restless Markov Arm with a Trembling Hand

    Authors: P. N. Karthik, Rajesh Sundaresan

    Abstract: In this paper, we consider a multi-armed bandit in which each arm is a Markov process evolving on a finite state space. The state space is common across the arms, and the arms are independent of each other. The transition probability matrix of one of the arms (the odd arm) is different from the common transition probability matrix of all the other arms. A decision maker, who knows these transition… ▽ More

    Submitted 31 December, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

    Comments: 46 pages, 1 figure, 1 table. Revision to an earlier submitted version

  10. arXiv:1905.00585  [pdf, other

    cs.SI cs.GT

    Reputation-Based Information Design for Inducing Prosocial Behavior

    Authors: Alexandre Reiffers-Masson, Rajesh Sundaresan

    Abstract: We study the idea of information design for inducing prosocial behavior in the context of electricity consumption. We consider a continuum of agents. Each agent has a different intrinsic motivation to reduce her power consumption. Each agent models the power consumption of the others via a distribution. Using this distribution, agents will anticipate their reputational benefit and choose a power c… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

    Comments: 24 pages, 10 figures

  11. arXiv:1904.11361  [pdf, ps, other

    cs.IT

    Learning to Detect an Odd Markov Arm

    Authors: P. N. Karthik, Rajesh Sundaresan

    Abstract: A multi-armed bandit with finitely many arms is studied when each arm is a homogeneous Markov process on an underlying finite state space. The transition law of one of the arms, referred to as the odd arm, is different from the common transition law of all other arms. A learner, who has no knowledge of the above transition laws, has to devise a sequential test to identify the index of the odd arm… ▽ More

    Submitted 5 December, 2019; v1 submitted 25 April, 2019; originally announced April 2019.

  12. arXiv:1901.09418  [pdf, other

    cs.NI cs.GT

    Double-Auction Mechanisms for Resource Trading Markets

    Authors: K P Naveen, Rajesh Sundaresan

    Abstract: We consider a double-auction mechanism, which was recently proposed in the context of rate allocation in mobile data-offloading markets. Network operators (users) derive benefit from offloading their traffic to third party WiFi or femtocell networks (link-suppliers). Link-suppliers experience costs for the additional capacity that they provide. Users and link-suppliers (collectively referred to as… ▽ More

    Submitted 9 February, 2021; v1 submitted 27 January, 2019; originally announced January 2019.

  13. arXiv:1712.03682  [pdf, ps, other

    cs.IT

    Learning to detect an oddball target with observations from an exponential family

    Authors: Gayathri R Prabhu, Srikrishna Bhashyam, Aditya Gopalan, Rajesh Sundaresan

    Abstract: The problem of detecting an odd arm from a set of K arms of a multi-armed bandit, with fixed confidence, is studied in a sequential decision-making scenario. Each arm's signal follows a distribution from a vector exponential family. All arms have the same parameters except the odd arm. The actual parameters of the odd and non-odd arms are unknown to the decision maker. Further, the decision maker… ▽ More

    Submitted 12 June, 2022; v1 submitted 11 December, 2017; originally announced December 2017.

  14. On Optimal Mechanisms in the Two-Item Single-Buyer Unit-Demand Setting

    Authors: D. Thirumulanathan, Rajesh Sundaresan, Y Narahari

    Abstract: We consider the problem of designing a revenue-optimal mechanism in the two-item, single-buyer, unit-demand setting when the buyer's valuations, $(z_1, z_2)$, are uniformly distributed in an arbitrary rectangle $[c,c+b_1]\times[c,c+b_2]$ in the positive quadrant. We provide a complete and explicit solution for arbitrary nonnegative values of $(c,b_1,b_2)$. We identify five simple structures, each… ▽ More

    Submitted 5 March, 2019; v1 submitted 4 May, 2017; originally announced May 2017.

    Journal ref: Journal of Mathematical Economics (JME), vol. 82, pp.31--60, 2019

  15. arXiv:1701.06347  [pdf, ps, other

    cs.IT

    On The Equivalence of Projections In Relative $α$-Entropy and Rényi Divergence

    Authors: P. N. Karthik, Rajesh Sundaresan

    Abstract: The aim of this work is to establish that two recently published projection theorems, one dealing with a parametric generalization of relative entropy and another dealing with Rényi divergence, are equivalent under a correspondence on the space of probability measures. Further, we demonstrate that the associated "Pythagorean" theorems are equivalent under this correspondence. Finally, we apply Egu… ▽ More

    Submitted 5 May, 2019; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: 13 pages

  16. arXiv:1611.04847  [pdf, ps, other

    cs.LG cs.DS

    The Power of Side-information in Subgraph Detection

    Authors: Arun Kadavankandy, Konstantin Avrachenkov, Laura Cottatellucci, Rajesh Sundaresan

    Abstract: In this work, we tackle the problem of hidden community detection. We consider Belief Propagation (BP) applied to the problem of detecting a hidden Erdős-Rényi (ER) graph embedded in a larger and sparser ER graph, in the presence of side-information. We derive two related algorithms based on BP to perform subgraph detection in the presence of two kinds of side-information. The first variant of sid… ▽ More

    Submitted 6 March, 2017; v1 submitted 10 November, 2016; originally announced November 2016.

  17. Almost Budget Balanced Mechanisms with Scalar Bids For Allocation of a Divisible Good

    Authors: D. Thirumulanathan, H. Vinay, Srikrishna Bhashyam, Rajesh Sundaresan

    Abstract: This paper is about allocation of an infinitely divisible good to several rational and strategic agents. The allocation is done by a social planner who has limited information because the agents' valuation functions are taken to be private information known only to the respective agents. We allow only a scalar signal, called a bid, from each agent to the social planner. Yang and Hajek [Jour. on Se… ▽ More

    Submitted 4 May, 2017; v1 submitted 21 October, 2016; originally announced October 2016.

    Comments: Accepted for publication in the European Journal of Operational Research (EJOR)

  18. Optimal Mechanisms for Selling Two Items to a Single Buyer Having Uniformly Distributed Valuations

    Authors: D. Thirumulanathan, Rajesh Sundaresan, Y Narahari

    Abstract: We consider the design of a revenue-optimal mechanism when two items are available to be sold to a single buyer whose valuation is uniformly distributed over an arbitrary rectangle $[c_1,c_1+b_1]\times[c_2,c_2+b_2]$ in the positive quadrant. We provide an explicit, complete solution for arbitrary nonnegative values of $(c_1,c_2,b_1,b_2)$. We identify eight simple structures, each with at most $4$… ▽ More

    Submitted 5 March, 2019; v1 submitted 21 October, 2016; originally announced October 2016.

    Comments: A preliminary version of the manuscript was published in Proceedings of the 12th Conference on Web and Internet Economics (WINE), 2016, Montreal, Canada

    Journal ref: Journal of Mathematical Economics (JME), vol. 82, pp. 1--30, 2019

  19. arXiv:1508.05572  [pdf, other

    cs.IT

    Learning to detect an oddball target

    Authors: Nidhin Koshy Vaidhiyan, Rajesh Sundaresan

    Abstract: We consider the problem of detecting an odd process among a group of Poisson point processes, all having the same rate except the odd process. The actual rates of the odd and non-odd processes are unknown to the decision maker. We consider a time-slotted sequential detection scenario where, at the beginning of each slot, the decision maker can choose which process to observe during that time slot.… ▽ More

    Submitted 23 September, 2015; v1 submitted 23 August, 2015; originally announced August 2015.

    Comments: 24 pages, 4 figures. Submitted to IEEE Transactions on Information Theory. A new analytical proof replaces the previous proof of Proposition 3, which was based on numerical computations

  20. arXiv:1505.02362  [pdf, other

    cs.IT

    Neural dissimilarity indices that predict oddball detection in behaviour

    Authors: Nidhin Koshy Vaidhiyan, S. P. Arun, Rajesh Sundaresan

    Abstract: Neuroscientists have recently shown that images that are difficult to find in visual search elicit similar patterns of firing across a population of recorded neurons. The $L^{1}$ distance between firing rate vectors associated with two images was strongly correlated with the inverse of decision time in behaviour. But why should decision times be correlated with $L^{1}$ distance? What is the decisi… ▽ More

    Submitted 10 May, 2015; originally announced May 2015.

    Comments: 26 pages

  21. arXiv:1505.02358  [pdf, other

    cs.IT

    Active Search with a Cost for Switching Actions

    Authors: Nidhin Koshy Vaidhiyan, Rajesh Sundaresan

    Abstract: Active Sequential Hypothesis Testing (ASHT) is an extension of the classical sequential hypothesis testing problem with controls. Chernoff (Ann. Math. Statist., 1959) proposed a policy called Procedure A and showed its asymptotic optimality as the cost of sampling was driven to zero. In this paper we study a further extension where we introduce costs for switching of actions. We show that a modifi… ▽ More

    Submitted 10 May, 2015; originally announced May 2015.

    Comments: 8 pages. Presented at 2015 Information Theory and Applications Workshop

  22. arXiv:1410.5550  [pdf, ps, other

    cs.IT math.PR math.ST

    Minimization Problems Based on Relative $α$-Entropy II: Reverse Projection

    Authors: M. Ashok Kumar, Rajesh Sundaresan

    Abstract: In part I of this two-part work, certain minimization problems based on a parametric family of relative entropies (denoted $\mathscr{I}_α$) were studied. Such minimizers were called forward $\mathscr{I}_α$-projections. Here, a complementary class of minimization problems leading to the so-called reverse $\mathscr{I}_α$-projections are studied. Reverse $\mathscr{I}_α$-projections, particularly on l… ▽ More

    Submitted 10 June, 2015; v1 submitted 21 October, 2014; originally announced October 2014.

    Comments: 20 pages; 3 figures; minor change in the title; revised manuscript. Accepted for publication in IEEE Transactions on Information Theory

  23. arXiv:1410.4931  [pdf, ps, other

    cs.IT math.ST

    Relative $α$-Entropy Minimizers Subject to Linear Statistical Constraints

    Authors: M. Ashok Kumar, Rajesh Sundaresan

    Abstract: We study minimization of a parametric family of relative entropies, termed relative $α$-entropies (denoted $\mathscr{I}_α(P,Q)$). These arise as redundancies under mismatched compression when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the usual relative entropy (Kullback-Leibler divergence). Jus… ▽ More

    Submitted 18 October, 2014; originally announced October 2014.

    Comments: 6 pages, 1 figure, submitted to National Conference on Communication (NCC 2015)

  24. arXiv:1410.2346  [pdf, ps, other

    cs.IT math.ST

    Minimization Problems Based on Relative $α$-Entropy I: Forward Projection

    Authors: M. Ashok Kumar, Rajesh Sundaresan

    Abstract: Minimization problems with respect to a one-parameter family of generalized relative entropies are studied. These relative entropies, which we term relative $α$-entropies (denoted $\mathscr{I}_α$), arise as redundancies under mismatched compression when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of… ▽ More

    Submitted 10 June, 2015; v1 submitted 8 October, 2014; originally announced October 2014.

    Comments: 24 pages; 4 figures; minor change in title; revised version. Accepted for publication in IEEE Transactions on Information Theory

  25. arXiv:1309.7841  [pdf, ps, other

    cs.DC cs.IT eess.SY math.OC

    Asynchronous Gossip for Averaging and Spectral Ranking

    Authors: Vivek S. Borkar, Rahul Makhijani, Rajesh Sundaresan

    Abstract: We consider two variants of the classical gossip algorithm. The first variant is a version of asynchronous stochastic approximation. We highlight a fundamental difficulty associated with the classical asynchronous gossip scheme, viz., that it may not converge to a desired average, and suggest an alternative scheme based on reinforcement learning that has guaranteed convergence to the desired avera… ▽ More

    Submitted 6 January, 2014; v1 submitted 30 September, 2013; originally announced September 2013.

    Comments: 14 pages, 7 figures. Minor revision

  26. arXiv:1212.6027  [pdf, ps, other

    math.PR cs.DM cs.IT

    Belief propagation for optimal edge cover in the random complete graph

    Authors: Mustafa Khandwawala, Rajesh Sundaresan

    Abstract: We apply the objective method of Aldous to the problem of finding the minimum-cost edge cover of the complete graph with random independent and identically distributed edge costs. The limit, as the number of vertices goes to infinity, of the expected minimum cost for this problem is known via a combinatorial approach of Hessler and Wästlund. We provide a proof of this result using the machinery of… ▽ More

    Submitted 5 September, 2014; v1 submitted 25 December, 2012; originally announced December 2012.

    Comments: Published in at http://dx.doi.org/10.1214/13-AAP981 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AAP-AAP981

    Journal ref: Annals of Applied Probability 2014, Vol. 24, No. 6, 2414-2454

  27. arXiv:1210.3187  [pdf, ps, other

    cs.IT cs.NI

    An asymptotically optimal push-pull method for multicasting over a random network

    Authors: Vasuki Narasimha Swamy, Srikrishna Bhashyam, Rajesh Sundaresan, Pramod Viswanath

    Abstract: We consider allcast and multicast flow problems where either all of the nodes or only a subset of the nodes may be in session. Traffic from each node in the session has to be sent to every other node in the session. If the session does not consist of all the nodes, the remaining nodes act as relays. The nodes are connected by undirected links whose capacities are independent and identically distri… ▽ More

    Submitted 8 February, 2013; v1 submitted 11 October, 2012; originally announced October 2012.

    Comments: 13 pages, extended version of paper presented at the IEEE International Symposium on Information Theory (ISIT) 2012, minor revision to text to address review comments, to appear in IEEE Transactions in information theory

  28. arXiv:1204.4647  [pdf, ps, other

    cs.NI cs.GT

    Regulation of off-network pricing in a nonneutral network

    Authors: Eitan Altman, Manjesh Kumar Hanawal, Rajesh Sundaresan

    Abstract: Representatives of several Internet service providers (ISPs) have expressed their wish to see a substantial change in the pricing policies of the Internet. In particular, they would like to see content providers (CPs) pay for use of the network, given the large amount of resources they use. This would be in clear violation of the "network neutrality" principle that had characterized the developmen… ▽ More

    Submitted 30 September, 2013; v1 submitted 20 April, 2012; originally announced April 2012.

    Comments: 38 pages, 6 figures

  29. arXiv:1112.1892  [pdf, ps, other

    cs.NI cs.GT

    Combined Base Station Association and Power Control in Multi-channel Cellular Networks

    Authors: Chandramani Singh, Anurag Kumar, Rajesh Sundaresan

    Abstract: A combined base station association and power control problem is studied for the uplink of multichannel multicell cellular networks, in which each channel is used by exactly one cell (i.e., base station). A distributed association and power update algorithm is proposed and shown to converge to a Nash equilibrium of a noncooperative game. We consider network models with discrete mobiles (yielding a… ▽ More

    Submitted 8 December, 2011; originally announced December 2011.

    Comments: 16 pages, 1 figure

  30. arXiv:1110.6127  [pdf, other

    cs.NI eess.SY

    Optimal Forwarding in Delay Tolerant Networks with Multiple Destinations

    Authors: Chandramani Singh, Eitan Altman, Anurag Kumar, Rajesh Sundaresan

    Abstract: We study the trade-off between delivery delay and energy consumption in a delay tolerant network in which a message (or a file) has to be delivered to each of several destinations by epidemic relaying. In addition to the destinations, there are several other nodes in the network that can assist in relaying the message. We first assume that, at every instant, all the nodes know the number of relays… ▽ More

    Submitted 27 October, 2011; originally announced October 2011.

    Comments: 16 pages, 7 figures

  31. arXiv:1107.4142  [pdf, ps, other

    math.PR cs.IT eess.SY math.OC

    Asymptotics of the Invariant Measure in Mean Field Models with Jumps

    Authors: Vivek S. Borkar, Rajesh Sundaresan

    Abstract: We consider the asymptotics of the invariant measure for the process of the empirical spatial distribution of $N$ coupled Markov chains in the limit of a large number of chains. Each chain reflects the stochastic evolution of one particle. The chains are coupled through the dependence of the transition rates on this spatial distribution of particles in the various states. Our model is a caricature… ▽ More

    Submitted 23 January, 2013; v1 submitted 20 July, 2011; originally announced July 2011.

    Comments: 58 pages, reorganised to get quickly to the main results on invariant measure; Stochastic Systems, volume 2, 2012

  32. arXiv:1103.0133  [pdf, ps, other

    cs.NI

    Neighbor Oblivious and Finite-State Algorithms for Circumventing Local Minima in Geographic Forwarding

    Authors: Santosh Ramachandran, Chandramani Singh, S. V. R. Anand, Malati Hegde, Anurag Kumar, Rajesh Sundaresan

    Abstract: We propose distributed link reversal algorithms to circumvent communication voids in geographic routing. We also solve the attendant problem of integer overflow in these algorithms. These are achieved in two steps. First, we derive partial and full link reversal algorithms that do not require one-hop neighbor information, and convert a destination-disoriented directed acyclic graph (DAG) to a dest… ▽ More

    Submitted 4 May, 2012; v1 submitted 1 March, 2011; originally announced March 2011.

    Comments: 9 pages; "Neighbor oblivious link reversal over duty-cycled WSNs"

    Journal ref: National Conference on Communications (NCC) 2010, Chennai, India, Jan. 29-31, 2010, pages 1 - 5

  33. arXiv:1102.4923  [pdf, ps, other

    cs.IT

    Further Results on Geometric Properties of a Family of Relative Entropies

    Authors: Ashok Kumar M., Rajesh Sundaresan

    Abstract: This paper extends some geometric properties of a one-parameter family of relative entropies. These arise as redundancies when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the Kullback-Leibler divergence. They satisfy the Pythagorean property and behave like squared distances. This property, which… ▽ More

    Submitted 28 May, 2011; v1 submitted 24 February, 2011; originally announced February 2011.

    Comments: 7 pages, Prop. 5 modified, in Proceedings of the 2011 IEEE International Symposium on Information Theory

  34. Spatial SINR Games of Base Station Placement and Mobile Association

    Authors: Eitan Altman, Anurag Kumar, Chandramani Singh, Rajesh Sundaresan

    Abstract: We study the question of determining locations of base stations that may belong to the same or to competing service providers. We take into account the impact of these decisions on the behavior of intelligent mobile terminals who can connect to the base station that offers the best utility. The signal to interference and noise ratio is used as the quantity that determines the association. We first… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Journal ref: IEEE INFOCOM, April, 2009, Rio De Janeiro, Brazil

  35. arXiv:1008.1977  [pdf, ps, other

    cs.IT

    Guessing Revisited: A Large Deviations Approach

    Authors: Manjesh Kumar Hanawal, Rajesh Sundaresan

    Abstract: The problem of guessing a random string is revisited. A close relation between guessing and compression is first established. Then it is shown that if the sequence of distributions of the information spectrum satisfies the large deviation property with a certain rate function, then the limiting guessing exponent exists and is a scalar multiple of the Legendre-Fenchel dual of the rate function. Oth… ▽ More

    Submitted 11 August, 2010; originally announced August 2010.

    Comments: 16 pages, to appear in IEEE Transaction on Information Theory

    Report number: TR-PME-2008-08

  36. arXiv:1008.1970  [pdf, ps, other

    cs.IT

    The Shannon Cipher System with a Guessing Wiretapper: General Sources

    Authors: Manjesh Kumar Hanawal, Rajesh Sundaresan

    Abstract: The Shannon cipher system is studied in the context of general sources using a notion of computational secrecy introduced by Merhav & Arikan. Bounds are derived on limiting exponents of guessing moments for general sources. The bounds are shown to be tight for iid, Markov, and unifilar sources, thus recovering some known results. A close relationship between error exponents and correct decoding ex… ▽ More

    Submitted 11 August, 2010; originally announced August 2010.

    Comments: 24 pages, Submitted to IEEE Transactions on Information Theory

    Report number: TR-PME-2009-04

  37. Decentralized sequential change detection using physical layer fusion

    Authors: Leena Zacharias, Rajesh Sundaresan

    Abstract: The problem of decentralized sequential detection with conditionally independent observations is studied. The sensors form a star topology with a central node called fusion center as the hub. The sensors make noisy observations of a parameter that changes from an initial state to a final state at a random time where the random change time has a geometric distribution. The sensors amplify and for… ▽ More

    Submitted 4 August, 2008; v1 submitted 22 July, 2007; originally announced July 2007.

    Comments: 10 pages, two-column, 10 figures, revised based on feedback from reviewers, accepted for publication in IEEE Trans. on Wireless Communications

    Journal ref: IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4999-5008, Dec. 2008

  38. arXiv:0707.2265  [pdf, ps, other

    cs.IT math.OC

    Separable convex optimization problems with linear ascending constraints

    Authors: Arun Padakandla, Rajesh Sundaresan

    Abstract: Separable convex optimization problems with linear ascending inequality and equality constraints are addressed in this paper. Under an ordering condition on the slopes of the functions at the origin, an algorithm that determines the optimum point in a finite number of steps is described. The optimum value is shown to be monotone with respect to a partial order on the constraint parameters. Moreo… ▽ More

    Submitted 16 July, 2007; originally announced July 2007.

    Comments: 15 pages, Submitted to SIAM J. on Opt

    Journal ref: SIAM J. on Optim., vol. 20, no. 3, pp. 1185-1204, online version 19 August 2009

  39. Guessing based on length functions

    Authors: Rajesh Sundaresan

    Abstract: A guessing wiretapper's performance on a Shannon cipher system is analyzed for a source with memory. Close relationships between guessing functions and length functions are first established. Subsequently, asymptotically optimal encryption and attack strategies are identified and their performances analyzed for sources with memory. The performance metrics are exponents of guessing moments and pr… ▽ More

    Submitted 15 April, 2007; v1 submitted 20 February, 2007; originally announced February 2007.

    Comments: 16 pages, Submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security, Simplified proof of Proposition 2

  40. arXiv:cs/0606015  [pdf, ps, other

    cs.IT

    The Size of Optimal Sequence Sets for Synchronous CDMA Systems

    Authors: Rajesh Sundaresan, Arun Padakandla

    Abstract: The sum capacity on a symbol-synchronous CDMA system having processing gain $N$ and supporting $K$ power constrained users is achieved by employing at most $2N-1$ sequences. Analogously, the minimum received power (energy-per-chip) on the symbol-synchronous CDMA system supporting $K$ users that demand specified data rates is attained by employing at most $2N-1$ sequences. If there are $L$ oversi… ▽ More

    Submitted 27 February, 2008; v1 submitted 3 June, 2006; originally announced June 2006.

    Comments: 18 pages, 2 figures, technical report

  41. Guessing under source uncertainty

    Authors: Rajesh Sundaresan

    Abstract: This paper considers the problem of guessing the realization of a finite alphabet source when some side information is provided. The only knowledge the guesser has about the source and the correlated side information is that the joint source is one among a family. A notion of redundancy is first defined and a new divergence quantity that measures this redundancy is identified. This divergence qu… ▽ More

    Submitted 8 September, 2006; v1 submitted 16 March, 2006; originally announced March 2006.

    Comments: 27 pages, submitted to IEEE Transactions on Information Theory, March 2006, revised September 2006, contains minor modifications and restructuring based on reviewers' comments