Online Energy Minimization Under a Peak Age of Information Constraint

Submitted by admin on Mon, 06/10/2024 - 05:00
We consider a node where packets of fixed size (inbits) are generated at arbitrary intervals. The node is required to maintain the peak age of information (AoI) at the monitor below a threshold by transmitting potentially a subset of the generated packets. At any time, depending on the packet availability and the current AoI, the node can choose which packet to transmit, and at what transmission speed (in bits per second). Power consumption is a monotonically increasing convex function of the transmission speed.

Timely Multi-Process Estimation Over Erasure Channels With and Without Feedback: Signal-Independent Policies

Submitted by admin on Mon, 06/10/2024 - 05:00
We consider a multi-process remote estimation system observing $K$ independent Ornstein-Uhlenbeck processes. In this system, a shared sensor samples the $K$ processes in such a way that the long-term average sum mean square error (MSE) is minimized using signal-independent sampling policies, in which sampling instances are chosen independently from the processes’ values. The sensor operates under a total sampling frequency constraint $f_{\max }$ .

Partial Homoscedasticity in Causal Discovery With Linear Models

Submitted by admin on Mon, 06/10/2024 - 05:00
Recursive linear structural equation models and the associated directed acyclic graphs (DAGs) play an important role in causal discovery. The classic identifiability result for this class of models states that when only observational data is available, each DAG can be identified only up to a Markov equivalence class. In contrast, recent work has shown that the DAG can be uniquely identified if the errors in the model are homoscedastic, i.e., all have the same variance.

Statistical Age-of-Information Bounds for Parallel Systems: When Do Independent Channels Make a Difference?

Submitted by admin on Mon, 06/10/2024 - 05:00
This paper contributes tail bounds of the age-of-information of a general class of parallel systems and explores their potential. Parallel systems arise in relevant cases, such as in multi-band mobile networks, multi-technology wireless access, or multi-path protocols, just to name a few. Typically, control over each communication channel is limited and random service outages and congestion cause buffering that impairs the age-of-information. The parallel use of independent channels promises a remedy, since outages on one channel may be compensated for by another.

Learning Linear Gaussian Polytree Models With Interventions

Submitted by admin on Mon, 06/10/2024 - 05:00
We present a consistent and highly scalable local approach to learn the causal structure of a linear Gaussian polytree using data from interventional experiments with known intervention targets. Our methods first learn the skeleton of the polytree and then orient its edges. The output is a CPDAG representing the interventional equivalence class of the polytree of the true underlying distribution. The skeleton and orientation recovery procedures we use rely on second order statistics and low-dimensional marginal distributions.

Scheduling to Minimize Age of Information With Multiple Sources

Submitted by admin on Mon, 06/10/2024 - 05:00
Finding an optimal/near-optimal scheduling algorithm to minimize the age of information (AoI) in a multi-source G/G/1 system is well-known to be a hard problem, more so if there is a transmission (energy) cost. In this paper, we consider a multi-source G/G/1 system and the goal is to minimize a weighted sum of the AoI of all sources, subject to an energy cost constraint.

Learning and Communications Co-Design for Remote Inference Systems: Feature Length Selection and Transmission Scheduling

Submitted by admin on Mon, 06/10/2024 - 05:00
In this paper, we consider a remote inference system, where a neural network is used to infer a time-varying target (e.g., robot movement), based on features (e.g., video clips) that are progressively received from a sensing node (e.g., a camera). Each feature is a temporal sequence of sensory data. The inference error is determined by (i) the timeliness and (ii) the sequence length of the feature, where we use Age of Information (AoI) as a metric for timeliness.

Cache-Aided Communication Schemes via Combinatorial Designs and Their q-Analogs

Submitted by admin on Mon, 06/10/2024 - 05:00
We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called cache) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and the channel together optimally. In prior literature, various combinatorial structures have been used to construct coded caching schemes.

A Revisit of Linear Network Error Correction Coding

Submitted by admin on Mon, 06/10/2024 - 05:00
We consider linear network erro correction (LNEC) coding when errors may occur on the edges of a communication network of which the topology is known. In this paper, we first present a framework of additive adversarial network for LNEC coding, and then prove the equivalence of two well-known LNEC coding approaches, which can be unified under this framework. Furthermore, by developing a graph-theoretic approach, we obtain a significantly enhanced characterization of the error correction capability of LNEC codes in terms of the minimum distances at the sink nodes.

Iterative Broadband Source Localization

Submitted by admin on Mon, 06/10/2024 - 05:00
In this paper we consider the problem of localizing a set of broadband sources from a finite window of measurements. In the case of narrowband sources this can be reduced to the problem of spectral line estimation, where our goal is simply to estimate the active frequencies from a weighted mixture of pure sinusoids. There exists a plethora of modern and classical methods that effectively solve this problem. However, for a wide variety of applications the underlying sources are not narrowband and can have an appreciable amount of bandwidth.