Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Theodoros K. Dikaliotis is active.

Publication


Featured researches published by Theodoros K. Dikaliotis.


international symposium on information theory | 2009

On the delay of network coding over line networks

Theodoros K. Dikaliotis; Alexandros G. Dimakis; Tracey Ho; Michelle Effros

We analyze a simple network where a source and a receiver are connected by a line of erasure channels of different reliabilities. Recent prior work has shown that random linear network coding can achieve the min-cut capacity and therefore the asymptotic rate is determined by the worst link of the line network. In this paper we investigate the delay for transmitting a batch of packets, which is a function of all the erasure probabilities and the number of packets in the batch. We show a monotonicity result on the delay function and derive simple expressions which characterize the expected delay behavior of line networks. Further, we use a martingale bounded differences argument to show that the actual delay is tightly concentrated around its expectation.


international symposium on information theory | 2010

Security in distributed storage systems by communicating a logarithmic number of bits

Theodoros K. Dikaliotis; Alexandros G. Dimakis; Tracey Ho

We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that are built into the existing redundancy of the system, we propose a simple linear hashing scheme to detect errors in the storage nodes. Our main result is that for storing a data object of total size M using an (n, k) MDS code over a finite field Fq, up to t1 = ⌊(n − k)/2⌋ errors can be detected, with probability of failure smaller than 1/M, by communicating only O(n(n−k) logM) bits to a trusted verifier. Our result constructs small projections of the data that preserve the errors with high probability and builds on a pseudorandom generator that fools linear functions. The transmission rate achieved by our scheme is asymptotically equal to the min-cut capacity between the source and any receiver.


IEEE Transactions on Information Theory | 2011

Multiple-Access Network Information-Flow and Correction Codes

Theodoros K. Dikaliotis; Tracey Ho; Sidharth Jaggi; Svitlana Vyetrenko; Hongyi Yao; Michelle Effros; Joerg Kliewer; Elona Erez

This work considers the multiple-access multicast error-correction scenario over a packetized network with z malicious edge adversaries. The network has min-cut m and packets of length l, and each sink demands all information from the set of sources S. The capacity region is characterized for both a “side-channel” model (where sources and sinks share some random bits that are secret from the adversary) and an “omniscient” adversarial model (where no limitations on the adversarys knowledge are assumed). In the “side-channel” adversarial model, the use of a secret channel allows higher rates to be achieved compared to the “omniscient” adversarial model, and a polynomial-complexity capacity-achieving code is provided. For the “omniscient” adversarial model, two capacity-achieving constructions are given: the first is based on random subspace code design and has complexity exponential in lm, while the second uses a novel multiple-field-extension technique and has O(lm|S|) complexity, which is polynomial in the network size. Our code constructions are “end-to-end” in that all nodes except the sources and sinks are oblivious to the adversaries and may simply implement predesigned linear network codes (random or otherwise). Also, the sources act independently without knowledge of the data from other sources.


information theory workshop | 2010

On the delay advantage of coding in packet erasure networks

Theodoros K. Dikaliotis; Alexandros G. Dimakis; Tracey Ho; Michelle Effros

We consider the delay of network coding compared to routing for a family of simple networks with parallel links. We investigate the sub-linear term in the block delay required for unicasting n packets and show that there is an unbounded gap between network coding and routing. In particular, we show that delay benefit of network coding is scaling at least as fast as √n. The main technical contribution involves showing that the delay function for the routing retransmission strategy is unbounded. This problem is equivalent to computing the expected maximum of two negative binomial random variables. This problem has also been addressed previously and we derive the first exact characterization which might be of independent interest.


allerton conference on communication, control, and computing | 2010

Outer bounds on the error correction capacity region for non-multicast networks

Svitlana Vyetrenko; Tracey Ho; Theodoros K. Dikaliotis

In this paper we study the capacity regions of non-multicast networks that are susceptible to adversarial errors. We derive outer bounds on the error correction capacity region and give a family of single- and two-source two-sink 3-layer networks for which these bounds are tight.


allerton conference on communication, control, and computing | 2012

Network equivalence in the presence of an eavesdropper

Theodoros K. Dikaliotis; Hongyi Yao; Tracey Ho; Michelle Effros; Joerg Kliewer

We consider networks of noisy degraded wiretap channels in the presence of an eavesdropper. For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands, is equivalent to that of a corresponding network where each noisy wiretap channel is replaced by a noiseless wiretap channel. Thus in this case there is a separation between wiretap channel coding on each channel and secure network coding on the resulting noiseless network. We show with an example that such separation does not hold when the eavesdropper can access multiple channels at the same time, for which case we provide upper and lower bounding noiseless networks.


information theory workshop | 2010

Multi-source operator channels: Efficient capacity-achieving codes

Hongyi Yao; Theodoros K. Dikaliotis; Sidharth Jaggi; Tracey Ho

The network communication scenario where one or more receivers request all the information transmitted by different sources is considered. We introduce the first polynomial-time (in network size) network codes that achieve any point inside the rate-region for the problem of multiple-source multicast in the presence of malicious errors, for any fixed number of sources. Our codes are fully distributed and different sources require no knowledge of the data transmitted by their peers. Our codes are “end-to-end”, that is, all nodes apart from the sources and the receivers are oblivious to the adversaries present in the network and simply implement random linear network coding.


international conference on acoustics, speech, and signal processing | 2009

Progressive distributed estimation over noisy channels in wireless sensor networks

Li Zhang; Xian-Da Zhang; Tracey Ho; Theodoros K. Dikaliotis

This paper presents a new progressive distributed estimation scheme (DES) along with the power scheduling among sensors under AWGN channels. The progressive DES consists of a transmission bit allocation scheme and a quasi best linear unbiased estimate (BLUE) of the unknown parameter at each sensor. This scheme is shown to outperform the traditional progressive DES. Moreover, the power scheduling among sensors, which minimizes the total transmission power subject to the desired MSE performance tolerance, is formulated as a convex problem and the optimal solution is derived analytically.


international conference on signal processing | 2012

Low-complexity near-optimal codes for Gaussian relay networks

Theodoros K. Dikaliotis; Hongyi Yao; A. Salman Avestimehr; Sidharth Jaggi; Tracey Ho

We consider the problem of information flow over Gaussian relay networks. Similar to the recent work by Avestimehr et al. [1], we propose network codes that achieve up to a constant gap from the capacity of such networks. However, our proposed codes are also computationally tractable. Our main technique is to use the codes of Avestimehr et al. as inner codes in a concatenated coding scheme.


IEEE Transactions on Information Theory | 2014

On the Delay Advantage of Coding in Packet Erasure Networks

Theodoros K. Dikaliotis; Alexandros G. Dimakis; Tracey Ho; Michelle Effros

We consider the delay of network coding compared to routing for a family of simple networks with parallel links. We investigate the sub-linear term in the block delay required for unicasting n packets and show that there is an unbounded gap between network coding and routing. In particular, we show that delay benefit of network coding is scaling at least as fast as √n. The main technical contribution involves showing that the delay function for the routing retransmission strategy is unbounded. This problem is equivalent to computing the expected maximum of two negative binomial random variables. This problem has also been addressed previously and we derive the first exact characterization which might be of independent interest.

Collaboration


Dive into the Theodoros K. Dikaliotis's collaboration.

Top Co-Authors

Avatar

Tracey Ho

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Michelle Effros

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Alexandros G. Dimakis

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Hongyi Yao

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sidharth Jaggi

The Chinese University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Joerg Kliewer

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Svitlana Vyetrenko

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

A. Salman Avestimehr

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge