3,208 research outputs found
Pareto Boundary of the Rate Region for Single-Stream MIMO Interference Channels: Linear Transceiver Design
We consider a multiple-input multiple-output (MIMO) interference channel
(IC), where a single data stream per user is transmitted and each receiver
treats interference as noise. The paper focuses on the open problem of
computing the outermost boundary (so-called Pareto boundary-PB) of the
achievable rate region under linear transceiver design. The Pareto boundary
consists of the strict PB and non-strict PB. For the two user case, we compute
the non-strict PB and the two ending points of the strict PB exactly. For the
strict PB, we formulate the problem to maximize one rate while the other rate
is fixed such that a strict PB point is reached. To solve this non-convex
optimization problem which results from the hard-coupled two transmit
beamformers, we propose an alternating optimization algorithm. Furthermore, we
extend the algorithm to the multi-user scenario and show convergence. Numerical
simulations illustrate that the proposed algorithm computes a sequence of
well-distributed operating points that serve as a reasonable and complete inner
bound of the strict PB compared with existing methods.Comment: 16 pages, 9 figures. Accepted for publication in IEEE Tans. Signal
Process. June. 201
Community detection for networks with unipartite and bipartite structure
Finding community structures in networks is important in network science,
technology, and applications. To date, most algorithms that aim to find
community structures only focus either on unipartite or bipartite networks. A
unipartite network consists of one set of nodes and a bipartite network
consists of two nonoverlapping sets of nodes with only links joining the nodes
in different sets. However, a third type of network exists, defined here as the
mixture network. Just like a bipartite network, a mixture network also consists
of two sets of nodes, but some nodes may simultaneously belong to two sets,
which breaks the nonoverlapping restriction of a bipartite network. The mixture
network can be considered as a general case, with unipartite and bipartite
networks viewed as its limiting cases. A mixture network can represent not only
all the unipartite and bipartite networks, but also a wide range of real-world
networks that cannot be properly represented as either unipartite or bipartite
networks in fields such as biology and social science. Based on this
observation, we first propose a probabilistic model that can find modules in
unipartite, bipartite, and mixture networks in a unified framework based on the
link community model for a unipartite undirected network [B Ball et al (2011
Phys. Rev. E 84 036103)]. We test our algorithm on synthetic networks (both
overlapping and nonoverlapping communities) and apply it to two real-world
networks: a southern women bipartite network and a human transcriptional
regulatory mixture network. The results suggest that our model performs well
for all three types of networks, is competitive with other algorithms for
unipartite or bipartite networks, and is applicable to real-world networks.Comment: 27 pages, 8 figures.
(http://iopscience.iop.org/1367-2630/16/9/093001
Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework
As the modern world becomes increasingly digitized and interconnected,
distributed signal processing has proven to be effective in processing its
large volume of data. However, a main challenge limiting the broad use of
distributed signal processing techniques is the issue of privacy in handling
sensitive data. To address this privacy issue, we propose a novel yet general
subspace perturbation method for privacy-preserving distributed optimization,
which allows each node to obtain the desired solution while protecting its
private data. In particular, we show that the dual variables introduced in each
distributed optimizer will not converge in a certain subspace determined by the
graph topology. Additionally, the optimization variable is ensured to converge
to the desired solution, because it is orthogonal to this non-convergent
subspace. We therefore propose to insert noise in the non-convergent subspace
through the dual variable such that the private data are protected, and the
accuracy of the desired solution is completely unaffected. Moreover, the
proposed method is shown to be secure under two widely-used adversary models:
passive and eavesdropping. Furthermore, we consider several distributed
optimizers such as ADMM and PDMM to demonstrate the general applicability of
the proposed method. Finally, we test the performance through a set of
applications. Numerical tests indicate that the proposed method is superior to
existing methods in terms of several parameters like estimated accuracy,
privacy level, communication cost and convergence rate
- …