Â鶹´«Ã½AV

Program Overview
Time Monday Tuesday Wednesday Thursday Friday
Morning Session I
Ìý(9:00 - 10:30)
Frans WillemsÌý Gerhard Kramer Michael GastparÌý Sennur Ulukus Alex DimakisÌý
ÌýCoffee Break
(10:30 - 11:00)
--Ìý -- --Ìý --Ìý --Ìý
Morning Session II
Ìý(11:00 - 12:30) ÌýÌý
Frans WillemsÌýÌý Gerhard Kramer Michael Gastpar Sennur UlukusÌýÌý Alex DimakisÌýÌý
Lunch
(12:30 - 14:00
)Ìý
--Ìý --Ìý --Ìý --Ìý --Ìý
Afternoon Session I
Ìý(14:00 - 15:30) Ìý
Student
ÌýPresentationsÌý
Session IÌý
StudentÌý
Presentations
Session III
ExcursionÌý ÌýAmos Lapidoth School ClosesÌý
Coffee Break
(15:30 - 16:00) Ìý
-- --Ìý ExcursionÌý --Ìý Ìý
Afternoon Session II
Ìý(16:00 - 18:00) Ìý
Student
Presentations
Session IIÌýÌýÌý
Student
Presentations
Session IVÌýÌýÌý
Excursion Student
Presentations
ÌýSession VÌýÌýÌýÌýÌý
Ìý
Ìý Ìý Ìý Ìý Ìý Ìý
Ìý
Lectures:Ìý
Ìý
Frans Willems Ìý (Eindhoven University of Technology, Netherlands)
Introduction to Universal Source Coding and Biometrics
Monday, April 16, 9:00 - 12:30
Ìý
The lecture consists of two parts. The first part focusses on universal source coding, the second part on biometrics.ÌýIn the first part we consider universal source coding based on waiting times and coding based on weighting over tree models. The waiting-time algorithm hinges on Kacs theorem [1947]. It achieves entropy for stationary ergodic sources and explains the idea underlying the Lempel-Ziv buffer source coding method [1977].ÌýThe weighting-method is based on context trees and arithmetic coding. It achieves entropy for tree sources but moreover minimizes the redundancy. The algorithm can also be applied for learning the tree model producing the data that are observed.
Ìý
In the second part of the lecture we consider biometrics from an information-theoretical perspective. We will consider both authentication and identification protocols, and investigate protected and unprotected databases. The emphasis is on binary biometrics and error exponents.
Ìý
Gerhard KramerÌý (Technical University of Munich, Germany)
Network Flow and Network Coding
Tuesday, April 17, 9:00 - 12:30
Ìý
The lectures treat the basics of network flow via Ford and Fulkerson's flow-augmenting path algorithm and
of linear network coding via Koetter and Medard's linear systems approach. Time-permitting, we show how
the results generalize to classic networks using random network coding, and to generalÌýnetworks, including
wireless networks, using "noisy" or "digital" network coding by viewing network coding as a compress-forward
relaying strategy.
Ìý
Michael Gastpar (UC Berkeley, USA and EPFL, Switzerland)
AlgebraicÌýStructure in Network Information Theory
Wednesday, April 18, 9:00 - 12:30
Ìý
In information-theoretic theorems, achievability arguments are typically established via the IID random coding argument: codewords are sampled randomly from a judiciously chosen probability distribution. By contrast, algebraic methods are used to develop practical encoding and decoding schemes of reasonable complexity. However, an emerging body of work has demonstrated that algebraic methods also have an important role to play in establishing the fundamental capacity limits of networks. That is, in certain scenarios, structured random coding arguments have been able to achieve rates beyond what is possible using the best known i.i.d. random coding methods. This phenomenon was first noticed in 1979 by Korner and Marton for the distributed compression of the parity of two dependent sources. More recently, several groups have shown that algebraic structure can significantly enhance performance in relay networks, interference channels, distributed source coding, distributed interference cancellation, and physical layer network coding, among others. The aim is to provide an accessible introduction to structured random codes and their applications in network information theory. We will start with random linear codes for discrete memoryless channels and move towards random lattice codes for Gaussian channels. To develop intuition, we will first review how these methods can be used to prove capacity results in classical settings. Afterwards, we will discuss several settings in which the inherent algebraic structure of the code provides some advantages.Ìý
Ìý
Sennur Ulukus (University of Maryland, USA)Ìý
Information TheoreticÌýSecurity
Thursday, April 19, 9:00 - 12:30
Ìý
Information-theoretic physical-layer security has emerged in the past few years as a promising new approach to securing wireless communications. This field explores possibilities of providing security in the physical layer using techniques from information theory, communication theory and signal processing. This approach is a fundamental departure from the currently available cryptographic solutions in that the security it provides is unbreakable, provable and quantifiable (in bits/sec/hertz), and is effective even against computationally-unlimited adversaries. This approach exploits unique characteristics of the wireless medium, such as the inherent random fluctuations in the wireless channel, broadcast nature of wireless communications and overheard information, use of multiple antennas, carefully designed multi-user interactions, e.g., cooperative jamming, feedback, signal alignment, etc. In this lecture, I will cover security of single-user and multi-user wireless communication systems. I will start the lecture with Shannon's secrecy system and the one-time pad. I will introduce Wyner's wiretap channel and Csiszar-Korner's generalization of the wiretap channel. I will present the Gaussian wiretap channel, independent parallel wiretap channels, fading wiretap channel, and the MIMO wiretap channel. I will then talk about multi-user wiretap channels and introduce the multiple-access wiretap channel and cooperative jamming, multi-receiver wiretap channel, broadcast channel with confidential messages, relay channel and cooperative secrecy, and interference channel with confidential messages.
Ìý
Amos Lapidoth (ETHZ, Switzerland)
Two by Gelfand and Pinsker
Thursday, April 19, 14:00 - 15:30
Ìý
In 1980 Gel'fand and Pinsker published two influential papers: on the capacity of channels with noncausal side information, and on the capacity of the semi-deterministic broadcast channel. In this talk I shall discuss these two results and present a recent result with Ligong Wang that unifies them.Ìý
Ìý
Alex Dimakis (University of Southern California, USA)Ìý
Network CodingÌýfor Distributed Storage
Friday, April 20, 9:00 - 12:30
Ìý
Modern cloud storage systems need to provide data reliability despiteÌýmultiple node failures per day. ÌýAs the amount of stored informationÌýis increasing, fueled by modern applications like big data analyticsÌýand video sharing, the reliability per bit needs to dramaticallyÌýincrease.To solve this problem, storage systems recently started deployingÌýerasure coding techniques to provide high reliability with smallÌýstorage overheads. We show how network coding techniques canÌýsurprisingly make the maintenance of such encoded system moreÌýefficient by orders of magnitude compared to standard Reed-SolomonÌýcodes. Following recent developments, we show that interferenceÌýalignment, a technique developed for wireless communications, isÌýfundamental for distributed storage problems. We will presentÌýinformation theoretic performance bounds and achievable schemes basedÌýon novel network codes that use interference alignment.
Ìý
Finally, we will discuss implementation issues over the Hadoop Distributed File system. A working system that uses novel regenerating codes over Hadoop and a comparison to the Reed-Solomon HDFS system currently used in Facebook Data warehouses will be presented.Ìý
Ìý
Student Presentations:
Ìý
Session I
Monday, April 16, 14:00 - 15:30
Ìý
1) Nicolo Michelusi Ìý Ìý
Optimal transmission policies for energy harvesting devices
2) Marco Maso Ìý
Channel Estimation Impact for LTE Small Cells based on MU-VFDM
3) Ralph TanbourgiÌý
Adaptive Modulation and Coding in Interference-Limited Wireless Ad Hoc Networks
4) Melda Yuksel Ìý Ìý
New Achievable Rate Regions for Broadcast Relay Channels: Compression for Two Destinations
5) Christoph Schmitz ÌýÌý
Reachability of the Capacity in Parallel Quantised Channels
6) Julia Vinogradova ÌýÌý
Source detection, power estimation, and localization in large dimensional sensor networks in the presence of unknown correlated noise
Ìý
Session II
Monday, April 16, 16:00 - 18:00
Ìý
1) Simon Görtzen Ìý Ìý
Discrete Multi-Carrier Resource Allocation
2) Céline Aubel Ìý Ìý
Sparse recovery guarantees for signals having morphologically different components
3) Laszlo CzapÌý
Secret messages over a broadcast channel
4) Siddhartha Brahma ÌýÌý
Index Coding
5) Morteza Varasteh Ìý Ìý
Joint Source Channel Coding in the presence of the correlated interference
6) Francisco Lázaro BlascoÌý
Time Interference Alignment via Delay Offset For Long Delay Networks
7) Iñaki Estella ÌýÌý
Relay channel with correlated noise
8) Andreas Bollig Ìý
Information theoretic models for neuronal communication
Ìý
Session III
Tuesday, April 17, 14:00 - 15:30
Ìý
1) Liang Li Ìý Ìý
Multiuser diversity in terms of symbol error rate
2) Jonathan Scarlett ÌýÌý
Properties of Random Coding Error Exponents for Mismatched Decoders
3) Reinhard HeckelÌý
The Generalized Multiple Measurement Vector Problem
4) Jing Guo Ìý Ìý
Information combining and polar coding
5) Wei Yang Ìý Ìý
Capacity pre-log of SIMO correlated block-fading channels
6) Sabrina Gerbracht ÌýÌý
Secrecy in Relay Networks
Ìý
Session IV
Tuesday, April 17, 16:00 - 18:00
Ìý
1) Alla Merzakreeva ÌýÌý
Capacity scaling laws for one-dimensional wireless networks
2) Marc Desgroseilliers Ìý Ìý
Degrees of freedom through random matrices
3) David Stotz
Survey on Rényi Information Dimension
4) Nicola di Pietro Ìý Ìý
Integer Low-Density Lattices
5) Christian Kissling Ìý
Stability of Contention Resolution Diversity Slotted ALOHA
6) Germán Corrrales Madueño Ìý Ìý
Packet Random Access Channel in GSM/GPRS for Machine Type Communications
7) Onur Tan Ìý Ìý
Smart Meter Privacy in the Presence of Energy Harvesting and Storage Devices
8) Johannes Richter
Efficient Calculating of Coefficients for Compute-and-forward
Ìý
Session V
Thursday, April 19, 16:00 - 18:00
Ìý
1) Solomon Tesfamicael Ìý
Replica symmetric breaking in compressed sensing
2) Sheng HuangÌý
Coding for Function Computing and Polynomials
3) Kasper Fløe Trillingsgaard Ìý
Wireless Systems with Energy Harvesting and Simple ON-OFF Signaling
4) Maria Gregori ÌýÌý
Efficient Data Transmission strategies for Energy Harvesting Node s
5) Luca Rose ÌýÌý
Degrees of freedom through random matrices
6) Alex Mueller Ìý Ìý
Analysing Interference Mitigation via 3D Beam-forming for CoMP Networks in the Large System Limit
7) Subhash Lakshminaryana Ìý
Cross Layer Optimization for Multi-user MIMO systems
8) Walid AbediseidÌý
To Space-Time Code or Not: A Low Complexity System Design for The Quasi-Static MIMO Channel