• Publications
  • Influence
Fundamentals of Wireless Communication
This paper presents a meta-modelling architecture for multiuser communication based on the MIMO model, which combines spatial multiplexing, channel modeling, and diversity-multiplexing techniques.
Opportunistic beamforming using dumb antennas
This work shows that true beamforming gains can be achieved when there are sufficient users, even though very limited channel feedback is needed, and proposes the use of multiple transmit antennas to induce large and fast channel fluctuations so that multiuser diversity can still be exploited.
Diversity-multiplexing tradeoff in multiple-access channels
The results characterize the fundamental tradeoff between the three types of gain and provide insights on the capabilities of multiple antennas in a network context.
Sum capacity of the vector Gaussian broadcast channel and uplink-downlink duality
We characterize the sum capacity of the vector Gaussian broadcast channel by showing that the existing inner bound of Marton and the existing upper bound of Sato are tight for this channel. We
Optimal sequences, power control, and user capacity of synchronous CDMA systems with linear MMSE multiuser receivers
It turns out that with this optimal allocation of signature sequences and powers, the linear MMSE receiver is just the corresponding matched filter for each user, and the effect of transmit power constraints on the user capacity is characterized.
Extremal Mechanisms for Local Differential Privacy
It is shown that for all information theoretic utility functions studied in this paper, maximizing utility is equivalent to solving a linear program, the outcome of which is the optimal staircase mechanism, which is universally optimal in the high and low privacy regimes.
Optimal sequences and sum capacity of synchronous CDMA systems
The sum capacity of a multiuser synchronous CDMA system is completely characterized in the general case of asymmetric user power constraints-this solves the open problem posed by Rupf and Massey (see
Cognitive Radio: An Information-Theoretic Perspective
This work describes the largest rate at which the cognitive radio can reliably communicate under the constraint that (i) no interference is created for the primary user, and (ii) the primary encoder-decoder pair is oblivious to the presence of the cognitiveRadio.
The Composition Theorem for Differential Privacy
This paper proves an upper bound on the overall privacy level and construct a sequence of privatization mechanisms that achieves this bound by introducing an operational interpretation of differential privacy and the use of a data processing inequality.
All-but-the-Top: Simple and Effective Postprocessing for Word Representations
This paper demonstrates a counter-intuitive, postprocessing technique -- eliminate the common mean vector and a few top dominating directions from the word vectors -- that renders off-the-shelf representations even stronger.