Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nebojsa Milosavljevic is active.

Publication


Featured researches published by Nebojsa Milosavljevic.


international symposium on information theory | 2011

Deterministic algorithm for the cooperative data exchange problem

Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran

In this paper we study the problem of data exchange, where each node in the system has a number of linear combinations of the data packets. Communicating over a public channel, the goal is for all nodes to reconstruct the entire set of the data packets in minimal total number of bits exchanged over the channel. We present a novel divide and conquer based architecture that determines the number of bits each node should transmit. This along with the well known fact, that it is sufficient for the nodes to broadcast linear combinations of their local information, provides a polynomial time deterministic algorithm for reconstructing the entire set of the data packets at all nodes in minimal amount of total communication.


information theory workshop | 2011

A compressed sensing wire-tap channel

Galen Reeves; Naveen Goela; Nebojsa Milosavljevic; Michael Gastpar

A multiplicative Gaussian wire-tap channel inspired by compressed sensing is studied. Lower and upper bounds on the secrecy capacity are derived, and shown to be relatively tight in the large system limit for a large class of compressed sensing matrices. Surprisingly, it is shown that the secrecy capacity of this channel is nearly equal to the capacity without any secrecy constraint provided that the channel of the eavesdropper is strictly worse than the channel of the intended receiver. In other words, the eavesdropper can see almost everything and yet learn almost nothing. This behavior, which contrasts sharply with that of many commonly studied wiretap channels, is made possible by the fact that a small number of linear projections can make a crucial difference in the ability to estimate sparse vectors.


IEEE Transactions on Information Theory | 2016

Efficient Algorithms for the Data Exchange Problem

Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran

In this paper, we study the data exchange problem, where a set of users is interested in gaining access to a common file, but where each has only partial knowledge about it as side-information. Assuming that the file is broken into packets, the side-information considered is in the form of linear combinations of the file packets. Given that the collective information of all the users is sufficient to allow recovery of the entire file, the goal is for each user to gain access to the file, while minimizing some communication cost. We assume that the users can communicate over a noiseless broadcast channel, and that the communication cost is a sum of each users cost function over the number of bits it transmits. For instance, the communication cost could simply be the total number of bits that needs to be transmitted. In the most general case studied in this paper, each user can have any arbitrary convex cost function. We provide deterministic, polynomial-time algorithms (in the number of users and packets), which find an optimal communication scheme that minimizes the communication cost. To further lower the complexity, we also propose a simple randomized algorithm inspired by our deterministic algorithm, which is based on a random linear network-coding scheme.


international symposium on information theory | 2009

Secure communication using an untrusted relay via sources and channels

Nebojsa Milosavljevic; Michael Gastpar; Kannan Ramchandran

Confidential communication aided by a relay without security clearance is studied. General strategies and outer bounds are derived for the problem of secret communication and secret key generation when correlated observations at all terminals are available. In a variation of the problem, it is assumed that the quality of the channel to the relay is known only to the relay. If the throughput-maximizing strategy is used according to the relays claimed channel quality, the question is: what should the relay claim about the channel in order to maximize its eavesdropping capabilities? We propose a strategy that Alice and Bob may agree on in order to suppress any leakage of confidential communication between the source and the receiver.


allerton conference on communication, control, and computing | 2012

Efficient algorithms for the data exchange problem under fairness constraints

Nebojsa Milosavljevic; Sameer Pawar; Michael Gastpar; Kannan Ramchandran


arXiv: Information Theory | 2011

Optimal Deterministic Polynomial-Time Data Exchange for Omniscience

Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran


international symposium on information theory | 2012

Data exchange problem with helpers

Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran


arXiv: Information Theory | 2012

Minimum Cost Multicast with Decentralized Sources

Nebojsa Milosavljevic; Sameer Pawar; Salim El Rouayheb; Michael Gastpar; Kannan Ramchandran


Archive | 2016

Performance Characterization by Available Capacity

Derrick Pallas; Raluca Musaloiu-elefteri; Nebojsa Milosavljevic

Collaboration


Dive into the Nebojsa Milosavljevic's collaboration.

Top Co-Authors

Avatar

Michael Gastpar

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sameer Pawar

University of California

View shared research outputs
Top Co-Authors

Avatar

Salim El Rouayheb

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Naveen Goela

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge