Bharti Centre Talk Series

(with VPaC*)


(Fridays at 3:30pm, EEG-002)

Snacks, Tea Served





Speaker Abstract

27-01-2010
Prof. Animesh Kumar


High resolution sampling of smooth signals using low-precision quantizers



The problem of sampling a bandlimited or smooth non-bandlimited signal with a bounded dynamic range with low-precision quantizers is addressed. A sampling unit, having access to the samples gathered by low-precision quantizers, is required to reconstruct the signal to maximum accuracy.

Bandlimited signals:

The feasibility of having a flexible trade-off between the oversampling rate and the quantization-precision, while achieving the best known exponential accuracy in the number of bits per Nyquist-interval is demonstrated. This exposes an underlying "conservation of bits" principle. Extensions of these results are established in an almost sure sense for amplitude-limited stationary (stochastic) bandlimited fields.

Non-bandlimited signals:

If sampling precedes anti-alias filtering operation, then aliasing error will be present during sampling of non-bandlimited signals. This problem is motivated from distributed sampling constraints, where an anti-aliasing filter cannot be used prior to sampling a spatial field. A framework, which accounts for aliasing as well as quantization errors, is developed for the sampling of smooth non-bandlimited signals having finite first absolute spectral moment. Using this framework, upper bounds on the maximum pointwise reconstruction error will be derived as a function of bit-rate (per meter) spent in recording the signal. Similar to the case of bandlimited signals, a flexible trade-off between oversampling rate and quantizer-precision is obtained.

05-02-2010, 15:30pm
Sagar Shenvi

A simple necessary and sufficient condition for the double unicast problem

We consider a directed acyclic network where there are two source-terminal pairs and the terminals need to receive the symbols generated at the respective sources. Each source independently generates one symbol from a given alphabet in an i.i.d. manner per unit time. Each edge in the network is error-free, delay-free, and can carry one symbol from the alphabet in unit time. We give a simple necessary and sufficient condition for being able to simultaneously satisfy the unicast requirements of the two source-terminal pairs using network coding. Extensions and other applications will also be presented.

19-02-2010, 2:30pm
Prof. Ram Nevatia, USC

Human Activity Recognition at Mid and Near Range from a Single Video Stream


Ram Nevatia is a professor in the Computer Science Department, University of Sothern California

19-02-2010, 3:30pm
Prof. Rahul Vaze, TIFR

Two-Way Transmission Capacity of Wireless ad-Hoc Networks


The transmission capacity of an ad-hoc network is the maximum density of active transmitters in an unit area, given an outage constraint at each receiver for a fixed rate of transmission. Most prior work on finding the transmission capacity of ad-hoc networks, has focused only on one-way communication where a source communicates with destination and no data is sent from destination to the source. In practice, however, two-way or bidirectional data transmission is required to support control functions like packet acknowledgements and channel feedback. This talk extends the concept of transmission capacity to two-way wireless ad-hoc networks, by incorporating the concept of a two-way outage with different rate requirements in both directions.

26-02-2010
Vishweshwara Rao

Automatic Melody Extraction

The melody of a song is an important attribute in music information retrieval applications, such as query-by-humming, and also in musicology and singing pedagogy. Automatic extraction of the melody from polyphonic vocal music is a challenging problem for which no general solutions currently exist. In this talk, we present a melody extraction system, which utilizes a spectral harmonic-matching pitch detection algorithm followed by a dynamic programming-based optimal path finding technique that tracks the voice-pitch within certain melodic smoothness constraints. Extenstions and enhancementst will also be presented.

TBA
Virag Shah

Optimal Timer Schemes for Distributed Selection

Many wireless communication systems envisage the use of a selection mechanism to discover or select the most suitable candidate, from a set of many available candidates. One such example is cooperative systems that has to select the best available relay to exploit spatial diversity. Here, system consists of n wireless nodes. Each node possesses a suitability metric that is known only to that specific node. Our aim is to make a central node determine which node has the highest metric. A simple and effective technique for this is to use timer schemes. A node transmits a packet when its timer expires, where timer value is a monotone non-increasing function of its metric. The best node is selected successfully if no other node’s timer expires within a vulnerability window after its timer expiry, and so long as the sink can hear the available nodes. In this talk, we will present optimal timer schemes that (i) maximizes the probability of success or (ii) minimizes the average selection time subject to a constraint on the probability of success.

19-03-2010
Prof. Onkar Dabeer
(TIFR)

"What's Popular Amongst Your Friends?"

Recommendation systems, like those employed by Netflix and Amazon, suggest relevant content to potential buyers. Given the lack of good statistical models and the massive datasets, the dominant research focus has been on proposing algorithms and testing their scalability and performance on specific data sets. Recently, however, there is emerging interest in provably good techniques. For example, several authors have taken a compressed sensing view of this problem, and derived bounds on the least number of samples required for matrix completion. In earlier work (with S. Aditya and B. Dey) we proposed a new viewpoint motivated by channel coding. In this talk, we further exploit this viewpoint to analyze a simple algorithm motivated by practice. The algorithm considered makes recommendations based on popularity amongst "like-minded" users. The algorithm has competitive performance on the Movielens and Netflix data sets, and for a mathematical model, we provide a detailed bit-error-rate (BER) analysis. In particular, the analysis reveals three distinct performance regimes, and gives insight into the performance of the scheme on real datasets.

TBA
Prof. Shalabh Gupta

TBA

TBA
Prof. Onkar Dabeer (TIFR)

TBA

TBA
Prof. S. N. Merchant

TBA
-----------------------------------------------------------------
* Vada Pav and Chai

Send suggestions and/or comments to: bsraj att ee .