Skip to main content

Showing 1–5 of 5 results for author: Duffy, K

Searching in archive eess. Search in all archives.
.
  1. arXiv:2506.14756  [pdf, ps, other

    cs.IT eess.SP

    Joint Error Correction and Fading Channel Estimation Enhancement Leveraging GRAND

    Authors: Charles Wiame, Ken R. Duffy, Muriel Médard

    Abstract: We present a novel method for error correction in the presence of fading channel estimation errors (CEE). When such errors are significant, considerable performance losses can be observed if the wireless transceiver is not adapted. Instead of refining the estimate by increasing the pilot sequence length or improving the estimation algorithm, we propose two new approaches based on Guessing Random A… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  2. arXiv:2410.22650  [pdf, ps, other

    cs.IT eess.SP

    Error correction in interference-limited wireless systems

    Authors: Charles Wiame, Ken R. Duffy, Muriel Médard

    Abstract: We introduce a novel approach to error correction decoding in the presence of additive alpha-stable noise, which serves as a model of interference-limited wireless systems. In the absence of modifications to decoding algorithms, treating alpha-stable distributions as Gaussian results in significant performance loss. Building on Guessing Random Additive Noise Decoding (GRAND), we consider two appro… ▽ More

    Submitted 29 October, 2024; originally announced October 2024.

  3. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  4. arXiv:2101.11123  [pdf, other

    cs.IT eess.SP

    A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues

    Authors: Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Medard, Mehrtash Babadi

    Abstract: High-throughput and quantitative experimental technologies are experiencing rapid advances in the biological sciences. One important recent technique is multiplexed fluorescence in situ hybridization (mFISH), which enables the identification and localization of large numbers of individual strands of RNA within single cells. Core to that technology is a coding problem: with each RNA sequence of int… ▽ More

    Submitted 2 February, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: This paper is accepted to The International Symposium on Information Theory and Its Applications (ISITA) 2020

  5. arXiv:1910.13408  [pdf, other

    cs.LG eess.IV stat.ML

    A framework for deep learning emulation of numerical models with a case study in satellite remote sensing

    Authors: Kate Duffy, Thomas Vandal, Weile Wang, Ramakrishna Nemani, Auroop R. Ganguly

    Abstract: Numerical models based on physics represent the state-of-the-art in earth system modeling and comprise our best tools for generating insights and predictions. Despite rapid growth in computational power, the perceived need for higher model resolutions overwhelms the latest-generation computers, reducing the ability of modelers to generate simulations for understanding parameter sensitivities and c… ▽ More

    Submitted 7 January, 2022; v1 submitted 29 October, 2019; originally announced October 2019.

    Comments: 6 pages, 8 figures, 4 tables