Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Babak Hassibi is active.

Publication


Featured researches published by Babak Hassibi.


IEEE Transactions on Information Theory | 2003

How much training is needed in multiple-antenna wireless links?

Babak Hassibi; Bertrand M. Hochwald

Multiple-antenna wireless communication links promise very high data rates with low error probabilities, especially when the wireless channel response is known at the receiver. In practice, knowledge of the channel is often obtained by sending known training symbols to the receiver. We show how training affects the capacity of a fading channel-too little training and the channel is improperly learned, too much training and there is no time left for data transmission before the channel changes. We compute a lower bound on the capacity of a channel that is learned by training, and maximize the bound as a function of the received signal-to-noise ratio (SNR), fading coherence time, and number of transmitter antennas. When the training and data powers are allowed to vary, we show that the optimal number of training symbols is equal to the number of transmit antennas-this number is also the smallest training interval length that guarantees meaningful estimates of the channel matrix. When the training and data powers are instead required to be equal, the optimal number of symbols may be larger than the number of antennas. We show that training-based schemes can be optimal at high SNR, but suboptimal at low SNR.


IEEE Transactions on Information Theory | 2002

High-rate codes that are linear in space and time

Babak Hassibi; Bertrand M. Hochwald

Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits per second per hertz, Vertical Bell Labs Layered Space-Time (V-BLAST), where every antenna transmits its own independent substream of data, has been shown to have good performance and simple encoding and decoding. Yet V-BLAST suffers from its inability to work with fewer receive antennas than transmit antennas-this deficiency is especially important for modern cellular systems, where a base station typically has more antennas than the mobile handsets. Furthermore, because V-BLAST transmits independent data streams on its antennas there is no built-in spatial coding to guard against deep fades from any given transmit antenna. On the other hand, there are many previously proposed space-time codes that have good fading resistance and simple decoding, but these codes generally have poor performance at high data rates or with many antennas. We propose a high-rate coding scheme that can handle any configuration of transmit and receive antennas and that subsumes both V-BLAST and many proposed space-time block codes as special cases. The scheme transmits substreams of data in linear combinations over space and time. The codes are designed to optimize the mutual information between the transmitted and received signals. Because of their linear structure, the codes retain the decoding simplicity of V-BLAST, and because of their information-theoretic optimality, they possess many coding advantages. We give examples of the codes and show that their performance is generally superior to earlier proposed methods over a wide range of rates and signal-to-noise ratios (SNRs).


IEEE Transactions on Information Theory | 2005

On the capacity of MIMO broadcast channels with partial side information

Masoud Sharif; Babak Hassibi

In multiple-antenna broadcast channels, unlike point-to-point multiple-antenna channels, the multiuser capacity depends heavily on whether the transmitter knows the channel coefficients to each user. For instance, in a Gaussian broadcast channel with M transmit antennas and n single-antenna users, the sum rate capacity scales like Mloglogn for large n if perfect channel state information (CSI) is available at the transmitter, yet only logarithmically with M if it is not. In systems with large n, obtaining full CSI from all users may not be feasible. Since lack of CSI does not lead to multiuser gains, it is therefore of interest to investigate transmission schemes that employ only partial CSI. We propose a scheme that constructs M random beams and that transmits information to the users with the highest signal-to-noise-plus-interference ratios (SINRs), which can be made available to the transmitter with very little feedback. For fixed M and n increasing, the throughput of our scheme scales as MloglognN, where N is the number of receive antennas of each user. This is precisely the same scaling obtained with perfect CSI using dirty paper coding. We furthermore show that a linear increase in throughput with M can be obtained provided that M does not not grow faster than logn. We also study the fairness of our scheduling in a heterogeneous network and show that, when M is large enough, the system becomes interference dominated and the probability of transmitting to any user converges to 1/n, irrespective of its path loss. In fact, using M=/spl alpha/logn transmit antennas emerges as a desirable operating point, both in terms of providing linear scaling of the throughput with M as well as in guaranteeing fairness.


IEEE Transactions on Information Theory | 2011

The Secrecy Capacity of the MIMO Wiretap Channel

Frédérique E. Oggier; Babak Hassibi

We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers. Our technique involves a careful study of a Sato-like upper bound via the solution of a certain algebraic Riccati equation.


asilomar conference on signals, systems and computers | 2003

On the capacity of MIMO broadcast channel with partial side information

Masoud Sharif; Babak Hassibi

Since having full channel state information in the transmitter is not reasonable in many applications and lack of channel knowledge does not lead to linear growth of the sum rate capacity as the number transmit antennas increases, it is therefore of interest to investigate transmission schemes that employ only partial CSI. In this paper, we propose a scheme that constructs M random beams and that transmits information to the users with the highest signal-to-noise-plus-interference ratios (SINRs), which can be made available to the transmitter with very little feedback. For fixed M and n increasing, the sum-rate capacity of our scheme scales as M log log n, which is precisely the same scaling obtained with perfect channel information. We furthermore show that linear increase in capacity can be obtained provided that M does not grow faster than O(log n). We also study the fairness of our scheduling scheme and show that, when M is large enough, the system becomes interference-dominated and the probability of transmitting to any user converges to 1/n, irrespective of its path-loss. In fact, using M = /spl alpha/ log n transmit antennas emerges as a desirable operating point, both in terms of providing linear increase in capacity as well as in guaranteeing fairness.


Archive | 1999

Indefinite-quadratic estimation and control: a unified approach to H 2 and H ∞ theories

Babak Hassibi; Ali H. Sayed

This monograph presents a unified mathematical framework for a wide range of problems in estimation and control. The authors discuss the two most commonly used methodologies: the stochastic H^2 approach and the deterministic (worst-case) H∞ approach. Despite the fundamental differences in the philosophies of these two approaches, the authors have discovered that, if indefinite metric spaces are considered, they can be treated in the same way and are essentially the same. The benefits and consequences of this unification are pursued in detail, with discussions of how to generalize well-known results from H^2 theory to H∞ setting, as well as new results and insight, the development of new algorithms, and applications to adaptive signal processing.


Automatica | 2006

On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage

Vijay Gupta; Timothy H. Chung; Babak Hassibi; Richard M. Murray

In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measurements are then exchanged among all the sensors. What is the sensor schedule that results in the minimum error covariance? We describe a stochastic sensor selection strategy that is easy to implement and is computationally tractable. The problem described above comes up in many domains out of which we discuss two. In the sensor selection problem, there are multiple sensors that cannot operate simultaneously (e.g., sonars in the same frequency band). Thus measurements need to be scheduled. In the sensor coverage problem, a geographical area needs to be covered by mobile sensors each with limited range. Thus from every position, the sensors obtain a different view-point of the area and the sensors need to optimize their trajectories. The algorithm is applied to these problems and illustrated through simple examples.


international symposium on information theory | 2008

The secrecy capacity of the MIMO wiretap channel

Frédérique E. Oggier; Babak Hassibi

We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers. Our technique involves a careful study of a Sato-like upper bound via the solution of a certain algebraic Riccati equation.


IEEE Transactions on Information Theory | 2006

Capacity of wireless erasure networks

Amir F. Dana; Radhika Gowaikar; Ravi Palanki; Babak Hassibi; Michelle Effros

In this paper, a special class of wireless networks, called wireless erasure networks, is considered. In these networks, each node is connected to a set of nodes by possibly correlated erasure channels. The network model incorporates the broadcast nature of the wireless environment by requiring each node to send the same signal on all outgoing channels. However, we assume there is no interference in reception. Such models are therefore appropriate for wireless networks where all information transmission is packetized and where some mechanism for interference avoidance is already built in. This paper looks at multicast problems over these networks. The capacity under the assumption that erasure locations on all the links of the network are provided to the destinations is obtained. It turns out that the capacity region has a nice max-flow min-cut interpretation. The definition of cut-capacity in these networks incorporates the broadcast property of the wireless medium. It is further shown that linear coding at nodes in the network suffices to achieve the capacity region. Finally, the performance of different coding schemes in these networks when no side information is available to the destinations is analyzed


IEEE Transactions on Signal Processing | 2009

On the Reconstruction of Block-Sparse Signals With an Optimal Number of Measurements

Mihailo Stojnic; Farzad Parvaresh; Babak Hassibi

Let A be an M by N matrix (M 1 - 1/d, and d = Omega(log(1/isin)/isin3) . The relaxation given in (*) can be solved in polynomial time using semi-definite programming.

Collaboration


Dive into the Babak Hassibi's collaboration.

Top Co-Authors

Avatar

Haris Vikalo

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Ali H. Sayed

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Samet Oymak

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Amin Khajehnejad

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Christos Thrampoulidis

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Richard M. Murray

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Amir F. Dana

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Vijay Gupta

University of Notre Dame

View shared research outputs
Researchain Logo
Decentralizing Knowledge