Loading...
Search for: network-information
0.006 seconds
Total 37 records

    New Approaches for Achievability Proof in Network Information Theory: Asymptotic Regime and Beyond

    , Ph.D. Dissertation Sharif University of Technology Yassaee, Mohammad Hossein (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Two new frameworks for achievability proof in network information theory (NIT) are introduced . The first framework which we call it OSRB (Output Statistics of Random Binning) framework, uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the OSRB framework uses pmf approximation arguments instead of counting and typicality which are used widely in conventional achievability proofs in NIT. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the
    distribution of random variables need to be satisfied. These statistical conditions include independence between messages and... 

    The reflection profile engineering approach to optimize VIPA demultiplexer for UWB-Over-Fiber systems

    , Article Proceedings - 10th International Conference on Laser and Fiber-Optical Networks Modeling, LFNM 2010, 12 September 2010 through 14 September 2010 ; September , 2010 , Pages 90-92 ; 9781424469970 (ISBN) Mokhtari, A ; Akbari, M ; Sharif University of Technology
    2010
    Abstract
    We analyze the VIPA demultiplexer for different reflection profiles, i.e., uniform, graded, and Gaussian. It is shown that VIPA demultiplexer characteristics can be improved dramatically by innovative reflection profile engineering. These improvements enhance the performance of demultiplexers in UWB-Over-Fiber systems  

    Achievability proof via output statistics of random binning

    , Article IEEE Transactions on Information Theory ; Vol. 60, issue. 11 , July , 2014 , pages 6760-6786 ; 21578095 ; 978-1-4673-2580-6 Yassaee, M. H ; Aref, M. R ; Gohari, A ; Sharif University of Technology
    Abstract
    This paper introduces a new and ubiquitous framework for establishing achievability results in network information theory problems. The framework uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the framework uses pmf approximation arguments instead of counting and typicality. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the distribution of random variables need to be satisfied. These statistical conditions include independence between messages and eavesdropper's observations in secrecy problems and closeness to a certain distribution (usually, i.i.d. distribution) in... 

    A novel multi-sender algorithm based on multi-cast concept for P2P networks

    , Article 2006 International Symposium on Communications and Information Technologies, ISCIT, Bangkok, 18 October 2006 through 20 October 2006 ; 2006 , Pages 143-147 Firooz, M. H ; Ronasi, K ; Pakravan, M. R ; Avanaki, A. N ; Sharif University of Technology
    2006
    Abstract
    Unlike those on Internet, the media providers on P2P networks are ordinary nodes whose contribution bandwidth is limited. Multi-sender methods are the best solutions known to video streaming on P2P networks. In this paper, we propose use of a multi-cast method on the top of an arbitrary multi-sender method so that all requesting peers receive almost the same expected bit-rate. That is while the existing multi-sender methods maximize the bit-rate delivered to the first receiver and cannot provide acceptable bit-rates to the next requesting nodes. © 2006 IEEE  

    Coordination Among Nodes of a Network: an Information Theoretic
    Perspective

    , M.Sc. Thesis Sharif University of Technology Abroshan, Mahed (Author) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    In this work, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or strong notions of coordination, we define and use a notion of set coordination. This notion of coordination bears similarities with the empirical notion of coordination. We observe that set coordination, in its special case of two nodes with a one-way communication link is equivalent with the “Hide... 

    On secure consensus information fusion over sensor networks

    , Article 2007 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2007, Amman, 13 May 2007 through 16 May 2007 ; 2007 , Pages 108-115 ; 1424410312 (ISBN); 9781424410316 (ISBN) Kefayati, M ; Talebi, M. S ; Rabiee, H. R ; Khalaj, B. H ; Sharif University of Technology
    2007
    Abstract
    In this work we have examined the problem of consensus information fusion from a novel point of view, challenging the fundamental assumption of mutual trust among the fusion parties. In quest for a method to make information fusion possible while preserving the mutual confidentiality and anonymity of the fused information even in case of collusion of the malicious nodes, we propose the Blind Information Fusion Framework (BIFF). In BIFF, which is a secure information fusion framework, the nodes are not aware of the actual information they are processing, yet converging to the intended result(s). We formulate BIFF according to the anonymization transform and discuss its robustness against... 

    Superpoly algebraic normal form monomial test on Trivium

    , Article IET Information Security ; Volume 7, Issue 3 , 2013 , Pages 230-238 ; 17518709 (ISSN) Vardasbi, A ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
    2013
    Abstract
    Recently, AIDA/cube testers have been revealed to be useful in building distinguishers for several cryptography schemes. χ2 tests, on the other hand, are well known and extensively used for distinguishing purposes. In this study, the notion of multi-χ2 test and AIDA/cube testers are utilised to introduce the superpoly algebraic normal form monomial test through which the output of reduced round Trivium is distinguished from being random. The test successfully distinguishes the keystream of Trivium with 830 out of 1152 initialisation rounds with a complexity of 239 operations, which is the most effective distinguisher on reduced Trivium thus far. Applying algebraic IV differential attack... 

    Predicting anchor links between heterogeneous social networks

    , Article Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, 18 August 2016 through 21 August 2016 ; 2016 , Pages 158-163 ; 9781509028467 (ISBN) Sajadmanesh, S ; Rabiee, H. R ; Khodadadi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    People usually get involved in multiple social networks to enjoy new services or to fulfill their needs. Many new social networks try to attract users of other existing networks to increase the number of their users. Once a user (called source user) of a social network (called source network) joins a new social network (called target network), a new inter-network link (called anchor link) is formed between the source and target networks. In this paper, we concentrated on predicting the formation of such anchor links between heterogeneous social networks. Unlike conventional link prediction problems in which the formation of a link between two existing users within a single network is... 

    An Application of Repeated Games in Network Information Theory

    , M.Sc. Thesis Sharif University of Technology Delgosha, Payam (Author) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    Information Theory, as an important part of communication theory, tries to find inner and outer bounds for reliable rate of information transmission in communication networks. In Network Information Theory, It is usually assumed that the channel statistics is known to everyone. However, in some practical situations, we might not know the statistics. The compound channel and the arbitrarily varying channel (AVC) are two categories of models which have considered this problem. In this thesis, in order to have a more general model regarding information transfer in the presence of channel uncertainty, we propose a model which is essentially a combination of compound channel and AVC. In our... 

    Colluding eavesdroppers in large cooperative wireless networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; ISBN: 9781479948789 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    Securing communication against non-colluding passive eavesdroppers has been extensively studied. Colluding eavesdroppers were considered for interference-limited large networks. However, collusion was not investigated for large cooperative networks. This paper closes this gap: we study the improvement the eavesdroppers achieve due to collusion in terms of the information leakage rate in a large cooperative network. We consider a dense network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. We show that if ne (2+2/α) (log ne)γ = o(n l) holds, for some positive γ, then zero-cost secure communication is possible; i.e., ne colluding eavesdroppers can be tolerated. This... 

    Community structure and information cascade in signed networks

    , Article New Generation Computing ; Vol. 32, issue. 3-4 , August , 2014 , p. 257-269 Shafaei, M ; Jalili, M ; Sharif University of Technology
    Abstract
    In this paper, we study information cascade in networks with positive and negative edges. The cascade depth is correlated with community structure of signed networks where communities are defined such that positive inter-community and negative intra-community links are minimized. The cascade is initialized from a number of nodes that are selected randomly. Finally, the number of nodes that have participated in the cascade is interpreted as cascade depth; the more the number of such nodes, the more the depth of the cascade. We investigate influence of community structure (i.e.; percentage of inter-community positive and intra-community negative links) on the cascade depth. We find significant... 

    A review of new advances in resource discovery approaches in unstructured P2P networks

    , Article Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 ; 2013 , Pages 828-833 ; 9781467362153 (ISBN) Sharifkhani, F ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    Since the emergence of peer to peer networks, search efficiency in such networks has been a matter of great concern, as it directly effects resource management of the network and influences users' satisfaction. In unstructured p2p networks, various search algorithms have been proposed so far that offer a tradeoff between scalability, congestion and user's satisfaction. In this paper, we survey newly introduced approaches to overcome search process problems. By reviewing these strategies and comparing them with previous search methods, we propose a new classification of informed search algorithms and we conclude that regarding this classification, informed search algorithms should be applied... 

    Mobile clouds: How to find opportunities

    , Article 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012 ; 2012 , Pages 170-172 ; 9781467331258 (ISBN) Salehi, M. J ; Khalaj, B. H ; Katz, M ; Fazelnia, G ; Karimi, P ; Del Ser, J
    2012
    Abstract
    Smartphones can be regarded as resource pools which are capable of communicating with their outside world using both short-range and long-range links. Such communication capabilities provide a unique opportunity for sharing resources, resulting in new possibilities for end users. In this paper, we present a new data update and processing scheme, designed for local networks of mobile devices which are formed with resource sharing in mind  

    Simultaneously generating multiple keys in a four-terminal network

    , Article IET Information Security ; Volume 6, Issue 3 , 2012 , Pages 190-201 ; 17518709 (ISSN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concealed from terminal 4 (the external wiretapper). The authors assume that all terminals including the external wiretapper have access to distinct correlated i.i.d. sources; there is also a noiseless public channel with unlimited capacity among the terminals. The authors have investigated the model on... 

    Analysis of gossip-based information propagation in wireless mesh networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12 October 2011 through 13 October 2011, Borrowdale ; Volume 6977 LNCS , 2011 , Pages 174-188 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Shamsaie, A ; Fokkink, W ; Habibi, J ; Sharif University of Technology
    Abstract
    Analytical models exist for evaluating gossip-based information propagation. Up to now these models were developed only for fully connected networks. We provide analytical models for information propagation of a push-pull gossiping protocol in a wireless mesh network. The underlying topology is abstracted away by assuming that the wireless nodes are uniformly deployed. We compare our models with simulation results for different topologies  

    Route choice estimation using cell phone data

    , Article MATEC Web of Conferences, 6 July 2016 through 10 July 2016 ; Volume 81 , 2016 ; 2261236X (ISSN) Taghipour, H ; Shafahi, Y ; Figueira, M ; Sharif University of Technology
    EDP Sciences  2016
    Abstract
    Nowadays development of cell phone network provides huge and ubiquitous data, with wide application in transportation science. One of the most important advantages of these kinds of data is enabling the process of collecting information without any active users' interference. A big data set consisting of 300,000 cell phone users' information in Shiraz are studied. This data set includes spatiotemporal information of travelers for every 5 minutes in a time span of 40 hours in two consecutive days. The spatial part of each user's information contains the position of the BTS (Base Transceiver Station) to which his cell phone is currently connected. Due to the existence of outliers, it is... 

    Delay-optimal static relaying policy in a slotted aloha wireless network

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Vaezi, K ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a slotted Aloha-based wireless communication network comprising a source and an active relay, both transmitting to a common destination. The relay node is able to relay the unsuccessfully transmitted packets of the source node, if it can detect them. We find the analytical closed form optimal static relaying policy in order to minimize the average transmission delay (ATD) of source packets, while ATD of its own packets is constrained. A static relaying policy is determined by acceptance and relaying probabilities of the relay node. According to acceptance probability, the relay node decides whether to accept an unsuccessfully transmitted packet from source or not, while the... 

    Analysis of Side Information in Series Relay Network

    , M.Sc. Thesis Sharif University of Technology Iraji, Mohammad Bagher (Author) ; Aref, Mohammad Reza (Supervisor) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this dissertation we discuss various results presented in the literature on single user channels with causal or noncausal side information and multiuser channels with side information such as multiple access channel and broadcast channel. The Series Relay Networks (SRN) with delays, with and without channel state information (CSI) are investigated from an information theoretic point of view. For SRN with unlimited look ahead where the relays can use the whole received block to encode, upper and lower bounds on the capacity are derived which are tight for the degraded case. For SRN without-delay where the relays have access to the present received symbols in addition to the past symbols,... 

    New Approaches for Achievability Proof in Network Information Theory: Asymptotic Regime and Beyond

    , Ph.D. Dissertation Sharif University of Technology Yasaee, Mohammad Hossein (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Two new frameworks for achievability proof in network information theory (NIT) are introduced . The first framework which we call it OSRB (Output Statistics of Random Binning) framework, uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the OSRB framework uses pmf approximation arguments instead of counting and typicality which are used widely in conventional achievability proofs in NIT. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the distribution of random variables need to be satisfied. These statistical conditions include independence between messages and... 

    A framework for resiliency assessment of power communication networks

    , Article Scientia Iranica ; Volume 21, Issue 6, 2014, Pages 2399-2418 , 2014 , Pages 2399-2418 ; ISSN: 10263098 Rad, Z. B ; Jahromi, A. E ; Sharif University of Technology
    Abstract
    Modern societies are strongly dependent on the continuous and efficient operation of electric power systems as a critical infrastructure. Besides, information and communication systems play a crucial role in the resiliency enhancement of the power system. As power communication systems are vulnerable against physical and cyber attack, these systems themselves can be an internal source of threat for power grids. Therefore, there is a need to identify and study the threats and weaknesses of power communication systems using a comprehensive framework. This framework helps power communication network planners evaluate all challenges and their numerous effects on the system, as a very important...