no code implementations • 18 Jan 2024 • Holger Boche, Adalbert Fono, Gitta Kutyniok
Motivated by the observation that the current evolution of deep learning models necessitates a change in computing technology, we derive a mathematical framework which enables us to analyze whether a transparent implementation in a computing model is feasible.
no code implementations • 3 Jul 2023 • Aras Bacho, Holger Boche, Gitta Kutyniok
The cause of these computability problems is rooted in the fact that digital hardware is based on the computing model of the Turing machine, which is inherently discrete.
no code implementations • 14 Feb 2023 • Vlad C. Andrei, Xinyang Li, Ullrich J. Mönich, Holger Boche
We address the resilience of future 6G MIMO communications by considering an uplink scenario where multiple legitimate transmitters try to communicate with a base station in the presence of an adversarial jammer.
no code implementations • 15 Jan 2023 • Yunseok Lee, Holger Boche, Gitta Kutyniok
Optimization problems are a staple of today's scientific and technical landscape.
1 code implementation • 15 Oct 2022 • Philipp Scholl, Aras Bacho, Holger Boche, Gitta Kutyniok
Finally, we provide extensive numerical experiments showing that our algorithms in combination with common approaches for learning physical laws indeed allow to guarantee that a unique governing differential equation is learnt, without assuming any knowledge about the function, thereby ensuring reliability.
no code implementations • 10 May 2022 • Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction.
no code implementations • 5 Apr 2022 • Holger Boche, Adalbert Fono, Gitta Kutyniok
For this, we focus on the class of inverse problems, which, in particular, encompasses any task to reconstruct data from measurements.
no code implementations • 28 Feb 2022 • Holger Boche, Adalbert Fono, Gitta Kutyniok
Deep neural networks have seen tremendous success over the last years.
no code implementations • 16 Apr 2021 • Ezra Tampubolon, Holger Boche
In this work, we propose an axiomatic approach for measuring the performance/welfare of a system consisting of concurrent agents in a resource-driven system.
no code implementations • 1 Feb 2021 • Moritz Wiese, Holger Boche
Every member of a mosaic is associated with a unique color, and each color corresponds to a unique message or key value.
Information Theory Combinatorics Information Theory
no code implementations • 12 Nov 2020 • Wafa Labidi, Christian Deppe, Holger Boche
This scheme allows a separation of signal-processing and Gaussian coding.
no code implementations • 11 Nov 2020 • Rami Ezzine, Wafa Labidi, Christian Deppe, Holger Boche
In many new applications such as several machine-to-machine and human-to-machine systems and the tactile internet, the identification, also called the post-Shannon scheme, is more efficient than the classical transmission.
no code implementations • 21 Oct 2020 • Ezra Tampubolon, Haris Ceribasic, Holger Boche
In this work, we study the system of interacting non-cooperative two Q-learning agents, where one agent has the privilege of observing the other's actions.
no code implementations • 21 Oct 2020 • Ezra Tampubolon, Holger Boche
Competitive non-cooperative online decision-making agents whose actions increase congestion of scarce resources constitute a model for widespread modern large-scale applications.
no code implementations • 10 Jun 2020 • Uzi Pereg, Christian Deppe, Holger Boche
Communication over a quantum channel that depends on a quantum state is considered when the encoder has channel side information (CSI) and is required to mask information on the quantum channel state from the decoder.
Information Theory Information Theory Quantum Physics
no code implementations • 21 Oct 2019 • Ezra Tampubolon, Holger Boche
Online-learning literature has focused on designing algorithms that ensure sub-linear growth of the cumulative long-term constraint violations.
no code implementations • 21 Oct 2019 • Ezra Tampubolon, Holger Boche
We give a condition on the step sizes and the degree of the augmentation of the Lagrangian, such that the proposed algorithm converges to a generalized Nash equilibrium.
no code implementations • 21 Oct 2019 • Ezra Tampubolon, Holger Boche
In case that the noise is persistent, and for several choices of the intrinsic parameter of the agents, such as their learning rate, and of the mechanism parameters, such as the learning rate of -, the progressivity of the price-setters, and the extrinsic price sensitivity of the agents, we show that the accumulative violation of the resource constraints of the resulted iterates is sub-linear w. r. t.