Search Results - "Diggavi, Suhas"
-
1
Coded Caching for Multi-level Popularity and Access
Published in IEEE transactions on information theory (01-05-2017)“…To address the exponentially rising demand for wireless content, the use of caching is emerging as a potential solution. It has been recently established that…”
Get full text
Journal Article -
2
Degrees of Freedom of Cache-Aided Wireless Interference Networks
Published in IEEE transactions on information theory (01-07-2018)“…We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both…”
Get full text
Journal Article -
3
Hierarchical Coded Caching
Published in IEEE transactions on information theory (01-06-2016)“…Caching of popular content during off-peak hours is a strategy to reduce network loads during peak hours. Recent work has shown significant benefits of…”
Get full text
Journal Article -
4
Byzantine-Resilient High-Dimensional Federated Learning
Published in IEEE transactions on information theory (01-10-2023)“…We study stochastic gradient descent (SGD) with local iterations in the presence of Byzantine clients, motivated by federated learning. The clients, instead of…”
Get full text
Journal Article -
5
Community-aware group testing
Published in IEEE transactions on information theory (01-07-2023)“…Group testing is a technique that can reduce the number of tests needed to identify infected members in a population, by pooling together multiple diagnostic…”
Get full text
Journal Article -
6
Secure State Estimation Against Sensor Attacks in the Presence of Noise
Published in IEEE transactions on control of network systems (01-03-2017)“…We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary…”
Get full text
Journal Article -
7
Data Encoding for Byzantine-Resilient Distributed Optimization
Published in IEEE transactions on information theory (01-02-2021)“…We study distributed optimization in the presence of Byzantine adversaries, where both data and computation are distributed among <inline-formula> <tex-math…”
Get full text
Journal Article -
8
Models and Information-Theoretic Bounds for Nanopore Sequencing
Published in IEEE transactions on information theory (01-04-2018)“…Nanopore sequencing is an emerging new technology for sequencing Deoxyribonucleic acid (DNA), which can read long fragments of DNA (~50 000 bases), in contrast…”
Get full text
Journal Article -
9
Qsparse-Local-SGD: Distributed SGD With Quantization, Sparsification, and Local Computations
Published in IEEE journal on selected areas in information theory (01-05-2020)“…Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to…”
Get full text
Journal Article -
10
Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths
Published in IEEE transactions on information theory (01-07-2020)“…We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of…”
Get full text
Journal Article -
11
Algorithms for Reconstruction Over Single and Multiple Deletion Channels
Published in IEEE transactions on information theory (01-06-2021)“…Recent advances in DNA sequencing technology and DNA storage systems have rekindled the interest in deletion channels. Multiple recent works have looked at…”
Get full text
Journal Article -
12
Wireless Network Information Flow: A Deterministic Approach
Published in IEEE transactions on information theory (01-04-2011)“…In a wireless network with a single source and a single destination and an arbitrary number of relay nodes, what is the maximum rate of information flow…”
Get full text
Journal Article -
13
Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes
Published in IEEE transactions on information theory (01-12-2013)“…Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of…”
Get full text
Journal Article -
14
Caching With Partial Adaptive Matching
Published in IEEE journal on selected areas in communications (01-08-2018)“…We study the caching problem when we are allowed to match each user to one of a subset of caches after its request is revealed. We focus on non-uniformly…”
Get full text
Journal Article -
15
Harnessing Bursty Interference in Multicarrier Systems With Output Feedback
Published in IEEE transactions on information theory (01-07-2017)“…We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of…”
Get full text
Journal Article -
16
Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes
Published in IEEE transactions on information theory (01-07-2017)“…We investigate whether uncoded schemes are optimal for Gaussian sources on multiuser Gaussian channels. Particularly, we consider two problems: the first is to…”
Get full text
Journal Article -
17
Capacity Results for Multicasting Nested Message Sets Over Combination Networks
Published in IEEE transactions on information theory (01-09-2016)“…The problem of multicasting two nested messages is studied over a class of networks known as combination networks. A source multicasts two messages, a common…”
Get full text
Journal Article -
18
SLATE: A Secure Lightweight Entity Authentication Hardware Primitive
Published in IEEE transactions on information forensics and security (2020)“…Lightweight cryptography has become more and more important in recent years because of the rise of the Internet of Things (IoT) and usage of smart mobile…”
Get full text
Journal Article -
19
Wiretapped Oblivious Transfer
Published in IEEE transactions on information theory (01-04-2017)“…In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users Alice and Bob, in the presence of a passive eavesdropper…”
Get full text
Journal Article -
20
The Approximate Capacity of the Gaussian n-Relay Diamond Network
Published in IEEE transactions on information theory (01-02-2013)“…We consider the Gaussian "diamond" or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even…”
Get full text
Journal Article