Nebojsa Milosavljevic
University of California, Berkeley
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nebojsa Milosavljevic.
international symposium on information theory | 2011
Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran
In this paper we study the problem of data exchange, where each node in the system has a number of linear combinations of the data packets. Communicating over a public channel, the goal is for all nodes to reconstruct the entire set of the data packets in minimal total number of bits exchanged over the channel. We present a novel divide and conquer based architecture that determines the number of bits each node should transmit. This along with the well known fact, that it is sufficient for the nodes to broadcast linear combinations of their local information, provides a polynomial time deterministic algorithm for reconstructing the entire set of the data packets at all nodes in minimal amount of total communication.
information theory workshop | 2011
Galen Reeves; Naveen Goela; Nebojsa Milosavljevic; Michael Gastpar
A multiplicative Gaussian wire-tap channel inspired by compressed sensing is studied. Lower and upper bounds on the secrecy capacity are derived, and shown to be relatively tight in the large system limit for a large class of compressed sensing matrices. Surprisingly, it is shown that the secrecy capacity of this channel is nearly equal to the capacity without any secrecy constraint provided that the channel of the eavesdropper is strictly worse than the channel of the intended receiver. In other words, the eavesdropper can see almost everything and yet learn almost nothing. This behavior, which contrasts sharply with that of many commonly studied wiretap channels, is made possible by the fact that a small number of linear projections can make a crucial difference in the ability to estimate sparse vectors.
IEEE Transactions on Information Theory | 2016
Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran
In this paper, we study the data exchange problem, where a set of users is interested in gaining access to a common file, but where each has only partial knowledge about it as side-information. Assuming that the file is broken into packets, the side-information considered is in the form of linear combinations of the file packets. Given that the collective information of all the users is sufficient to allow recovery of the entire file, the goal is for each user to gain access to the file, while minimizing some communication cost. We assume that the users can communicate over a noiseless broadcast channel, and that the communication cost is a sum of each users cost function over the number of bits it transmits. For instance, the communication cost could simply be the total number of bits that needs to be transmitted. In the most general case studied in this paper, each user can have any arbitrary convex cost function. We provide deterministic, polynomial-time algorithms (in the number of users and packets), which find an optimal communication scheme that minimizes the communication cost. To further lower the complexity, we also propose a simple randomized algorithm inspired by our deterministic algorithm, which is based on a random linear network-coding scheme.
international symposium on information theory | 2009
Nebojsa Milosavljevic; Michael Gastpar; Kannan Ramchandran
Confidential communication aided by a relay without security clearance is studied. General strategies and outer bounds are derived for the problem of secret communication and secret key generation when correlated observations at all terminals are available. In a variation of the problem, it is assumed that the quality of the channel to the relay is known only to the relay. If the throughput-maximizing strategy is used according to the relays claimed channel quality, the question is: what should the relay claim about the channel in order to maximize its eavesdropping capabilities? We propose a strategy that Alice and Bob may agree on in order to suppress any leakage of confidential communication between the source and the receiver.
allerton conference on communication, control, and computing | 2012
Nebojsa Milosavljevic; Sameer Pawar; Michael Gastpar; Kannan Ramchandran
arXiv: Information Theory | 2011
Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran
international symposium on information theory | 2012
Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran
arXiv: Information Theory | 2012
Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran
Archive | 2016
Derrick Pallas; Raluca Musaloiu-elefteri; Nebojsa Milosavljevic