https://arxiv.org/api/s2VwyYysrcLKWnK4n/RZmB2Hfgk 2026-03-28T09:16:12Z 53623 45 15 http://arxiv.org/abs/2603.23837v1 A Measurement-Calibrated AI-Assisted Digital Twin for Terahertz Wireless Data Centers 2026-03-25T01:45:15Z Terahertz (THz) wireless communication has emerged as a promising solution for future data center interconnects; however, accurate channel characterization and system-level performance evaluation in complex indoor environments remain challenging. In this work, a measurement-calibrated AI-assisted digital twin (DT) framework is developed for THz wireless data centers by tightly integrating channel measurements, ray-tracing (RT), and implicit neural field (INF) modeling. Specifically, channel measurements are first conducted using a vector network analyzer at 300 GHz under both line-of-sight (LoS) and non-line-of-sight (NLoS) scenarios. RT simulations performed on the Sionna platform capture the dominant multipath structures and show good consistency with measured results. Building upon measurement and RT data, an RT-conditioned INF is developed to construct a continuous radio-frequency (RF) field representation, enabling accurate prediction in RT-missing NLoS regions. The comprehensive RF map generated by DT can provide system-level analysis and decisions for wireless data centers. 2026-03-25T01:45:15Z Mingjie Zhu Yejian Lyu Ziming Yu Chong Han http://arxiv.org/abs/2410.17198v2 One-shot Multiple Access Channel Simulation 2026-03-25T01:42:23Z We consider the problem of shared randomness-assisted multiple access channel (MAC) simulation for product inputs and characterize the one-shot communication cost region via almost-matching inner and outer bounds in terms of the smooth max-information of the channel, featuring auxiliary random variables of bounded size. The achievability relies on a rejection-sampling algorithm to simulate an auxiliary channel between each sender and the decoder, and producing the final output based on the output of these intermediate channels. The converse follows via information-spectrum based arguments. To bound the cardinality of the auxiliary random variables, we employ the perturbation method from [Anantharam et al., IEEE Trans. Inf. Theory (2019)] in the one-shot setting. For the asymptotic setting and vanishing errors, our result expands to a tight single-letter rate characterization and consequently extends a special case of the simulation results of [Kurri et al., IEEE Trans. Inf. Theory (2022)] for fixed, independent and identically distributed (iid) product inputs to universal simulation for any product inputs. We broaden our discussion into the quantum realm by studying feedback simulation of quantum-to-classical (QC) MACs with product measurements [Atif et al., IEEE Trans. Inf. Theory (2022)]. For fixed product inputs and with shared randomness assistance, we give a quasi tight one-shot communication cost region with corresponding single-letter asymptotic iid expansion. 2024-10-22T17:18:38Z Total 42 pages, main text 23 pages, References and Appendices 19 pages, 2 Figures, Updated with the journal version. Characterization of smooth Imax for bounding cardinality of auxiliaries A. Nema, S. Sreekumar and M. Berta, "One-Shot Multiple Access Channel Simulation," in IEEE Transactions on Information Theory, vol. 72, no. 3, pp. 1463-1492, March 2026 Aditya Nema Sreejith Sreekumar Mario Berta 10.1109/TIT.2026.3652087 http://arxiv.org/abs/2603.23787v1 Digital Twin-Assisted Measurement Design and Channel Statistics Prediction 2026-03-24T23:43:59Z Prediction of wireless channels and their statistics is a fundamental procedure for ensuring performance guarantees in wireless systems. Statistical radio maps powered by Gaussian processes (GPs) offer flexible, non-parametric frameworks, but their performance depends critically on the choice of mean and covariance functions. These are typically learned from dense measurements without exploiting environmental geometry. Digital twins (DTs) of wireless environments leverage computational power to incorporate geometric information; however, they require costly calibration to accurately capture material and propagation characteristics. This work introduces a hybrid channel prediction framework that leverages uncalibrated DTs derived from open-source maps to extract geometry-induced prior information for GP prediction. These structural priors are fused with a small number of channel measurements, enabling data-efficient prediction of channel statistics across the entire environment. By exploiting the uncertainty quantification inherent to GPs, the framework supports principled measurement selection by identifying informative probing locations under resource constraints. Through this integration of imperfect DTs with statistical learning, the proposed method reduces measurement overhead, improves prediction accuracy, and establishes a practical approach for resource-efficient wireless channel prediction. 2026-03-24T23:43:59Z 6 pages, 3 figures. Accepted for 2026 IEEE International Conference on Communications Workshops: Workshop on Data Driven and AI-Enabled Digital Twin Networks and Applications (TwinNetApp) Robin J. Williams Mahmoud Saad Abouamer Petar Popovski http://arxiv.org/abs/2312.04183v3 Enhanced Uplink Data Detection for Massive MIMO with 1-Bit ADCs: Analysis and Joint Detection 2026-03-24T21:26:58Z We present a new analytical framework on the uplink data detection for massive multiple-input multiple-output systems with 1-bit analog-to-digital converters (ADCs). We first characterize the expected values of the soft-estimated symbols (after the linear receiver and prior to the data detection), which are affected by the 1-bit quantization during both the channel estimation and the uplink data transmission. In our analysis, we consider conventional receivers such as maximum ratio combining (MRC), zero forcing, and minimum mean squared error (MMSE), with multiple user equipments (UEs) and correlated Rayleigh fading. Additionally, we design a linear minimum mean dispersion (LMMD) receiver tailored for the data detection with 1-bit ADCs, which exploits the expected values of the soft-estimated symbols previously derived. Then, we propose a joint data detection (JD) strategy that exploits the interdependence among the soft-estimated symbols of the interfering UEs, along with its low-complexity variant. These strategies are compared with the robust maximum likelihood data detection with 1-bit ADCs. Numerical results examining the symbol error rate show that MMSE exhibits a considerable performance gain over MRC, whereas the proposed LMMD receiver significantly outperforms all the conventional receivers. Lastly, the proposed JD and its low-complexity variant provide a significant boost in comparison with the single-UE data detection. 2023-12-07T10:11:20Z Accepted in IEEE TSP (transaction on signal processing). arXiv admin note: text overlap with arXiv:2303.18061 Amin Radbord Italo Atzeni Antti Tolli http://arxiv.org/abs/2511.05176v2 Deterministic list decoding of Reed-Solomon codes 2026-03-24T21:00:02Z We show that Reed-Solomon codes of dimension $k$ and block length $n$ over any finite field $\mathbb{F}$ can be deterministically list decoded from agreement $\sqrt{(k-1)n}$ in time $\text{poly}(n, \log |\mathbb{F}|)$. Prior to this work, the list decoding algorithms for Reed-Solomon codes, from the celebrated results of Sudan and Guruswami-Sudan, were either randomized with time complexity $\text{poly}(n, \log |\mathbb{F}|)$ or were deterministic with time complexity depending polynomially on the characteristic of the underlying field. In particular, over a prime field $\mathbb{F}$, no deterministic algorithms running in time $\text{poly}(n, \log |\mathbb{F}|)$ were known for this problem. Our main technical ingredient is a deterministic algorithm for solving the bivariate polynomial factorization instances that appear in the algorithm of Sudan and Guruswami-Sudan with only a $\text{poly}(\log |\mathbb{F}|)$ dependence on the field size in its time complexity for every finite field $\mathbb{F}$. While the question of obtaining efficient deterministic algorithms for polynomial factorization over finite fields is a fundamental open problem even for univariate polynomials of degree $2$, we show that additional information from the received word can be used to obtain such an algorithm for instances that appear in the course of list decoding Reed-Solomon codes. 2025-11-07T11:45:19Z 33 Pages Soham Chatterjee Prahladh Harsha Mrinal Kumar http://arxiv.org/abs/2406.00300v3 Coded Computing for Resilient Distributed Computing: A Learning-Theoretic Framework 2026-03-24T19:04:07Z Coded computing has emerged as a promising framework for tackling significant challenges in large-scale distributed computing, including the presence of slow, faulty, or compromised servers. In this approach, each worker node processes a combination of the data, rather than the raw data itself. The final result then is decoded from the collective outputs of the worker nodes. However, there is a significant gap between current coded computing approaches and the broader landscape of general distributed computing, particularly when it comes to machine learning workloads. To bridge this gap, we propose a novel foundation for coded computing, integrating the principles of learning theory, and developing a framework that seamlessly adapts with machine learning applications. In this framework, the objective is to find the encoder and decoder functions that minimize the loss function, defined as the mean squared error between the estimated and true values. Facilitating the search for the optimum decoding and functions, we show that the loss function can be upper-bounded by the summation of two terms: the generalization error of the decoding function and the training error of the encoding function. Focusing on the second-order Sobolev space, we then derive the optimal encoder and decoder. We show that in the proposed solution, the mean squared error of the estimation decays with the rate of $\mathcal{O}(S^3 N^{-3})$ and $\mathcal{O}(S^{\frac{8}{5}}N^{\frac{-3}{5}})$ in noiseless and noisy computation settings, respectively, where $N$ is the number of worker nodes with at most $S$ slow servers (stragglers). Finally, we evaluate the proposed scheme on inference tasks for various machine learning models and demonstrate that the proposed framework outperforms the state-of-the-art in terms of accuracy and rate of convergence. 2024-06-01T05:01:25Z 35 pages, 7 figures 38th Conference on Neural Information Processing Systems (NeurIPS 2024) Parsa Moradi Behrooz Tahmasebi Mohammad Ali Maddah-Ali http://arxiv.org/abs/2603.23643v1 Approximation theorems in bilipschitz invariant theory 2026-03-24T18:30:25Z Bilipschitz invariant theory concerns low-distortion embeddings of orbit spaces into Euclidean space. To date, embeddings with the smallest-possible distortion are known for only a few cases, to include: (a) planar rotations, (b) real phase retrieval, and (c) finite reflection groups. Here, we prove that for all three of these cases, the smallest possible distortion is nearly achieved by a composition of a "max filter bank" with a linear transformation. Our proof amounts to a two-step process: first, we show it suffices to demonstrate a certain inclusion of Lipschitz function spaces, and second, we prove that inclusion, using fundamentally different approaches for the three cases. We also show that these cases interact differently with a few related function spaces, which suggests that a unified treatment would be nontrivial. 2026-03-24T18:30:25Z Jameson Cahill Joseph W. Iverson Dustin G. Mixon Nathan Willey http://arxiv.org/abs/2603.23476v1 Index-Based Scheduling for a Resource-Constrained Quantum Switch 2026-03-24T17:42:01Z We consider a quantum switch with a finite number of quantum memory registers that aims to serve multipartite entanglement requests among $N$ users. We propose scheduling policies that aim to optimize the average number of requests served per unit time by efficiently utilizing the switch's available memory. To measure the performance of the scheduling policies, we employ the newly introduced metric of age of entanglement establishment (AoEE). We formulate the scheduling problem in a restless multi-armed bandit (RMAB) framework. We show that the scheduling of entanglement requests is indexable. Subsequently, we find a closed-form expression of the Whittle index for all possible request-age pairs. By modeling the Whittle index of each request as its reward and its cardinality as its cost, we formulate the memory-constrained scheduling problem as a $0$-$1$ knapsack problem and solve it via dynamic programming. Furthermore, we consider two low-complexity sequential greedy policies that leverage two different modified Whittle indices. 2026-03-24T17:42:01Z Subhankar Banerjee Stavros Mitrolaris Sennur Ulukus http://arxiv.org/abs/2506.16309v4 Data Compression with Relative Entropy Coding 2026-03-24T17:26:49Z Over the last few years, machine learning unlocked previously infeasible features for compression, such as providing guarantees for users' privacy or tailoring compression to specific data statistics (e.g., satellite images or audio recordings of animals) or users' audiovisual perception. This, in turn, has led to an explosion of theoretical investigations and insights that aim to develop new fundamental theories, methods and algorithms better suited for machine learning-based compressors. In this thesis, I contribute to this trend by investigating relative entropy coding, a mathematical framework that generalises classical source coding theory. Concretely, relative entropy coding deals with the efficient communication of uncertain or randomised information. One of its key advantages is that it extends compression methods to continuous spaces and can thus be integrated more seamlessly into modern machine learning pipelines than classical quantisation-based approaches. Furthermore, it is a natural foundation for developing advanced compression methods that are privacy-preserving or account for the perceptual quality of the reconstructed data. The thesis considers relative entropy coding at three conceptual levels: After introducing the basics of the framework, (1) I prove results that provide new, maximally tight fundamental limits to the communication and computational efficiency of relative entropy coding; (2) I use the theory of Poisson point processes to develop and analyse new relative entropy coding algorithms, whose performance attains the theoretic optima and (3) I showcase the strong practical performance of relative entropy coding by applying it to image, audio, video and protein data compression using small, energy-efficient, probabilistic neural networks called Bayesian implicit neural representations. 2025-06-19T13:31:45Z PhD Thesis. 224 pages, 19 figures Gergely Flamich 10.17863/CAM.118972 http://arxiv.org/abs/2603.23585v1 Reverse Reconciliation with Soft Information for Discrete-Modulation CV-QKD at Long Range 2026-03-24T17:07:45Z We recently introduced a reverse reconciliation scheme with soft information. In this paper, we assess its performance at ultra-low SNR, thus proving that such scheme is a versatile solution to the reverse reconciliation problem. 2026-03-24T17:07:45Z Accepted for an in-person poster presentation at the Optica Quantum 2.0 Conference and Exhibition ( https://www.optica.org/events/topical_meetings/quantum/ ) Marco Origlia Erdem Eray Cil Laurent Schmalen Marco Secondini http://arxiv.org/abs/2603.23417v1 Single-letter one-way distillable entanglement for non-degradable states 2026-03-24T16:50:48Z The one-way distillable entanglement is a central operational measure of bipartite entanglement, quantifying the optimal rate at which maximally entangled pairs can be extracted by one-way LOCC. Despite its importance, it is notoriously hard to compute, since it is defined by a regularized optimization over many copies and adaptive one-way protocols. At present, single-letter formulas are only known for (conjugate) degradable and PPT states. More generally, it has remained unclear when one-way distillable entanglement can still be additive beyond degradability and PPT settings, and how such additivity relates to additivity questions of quantum capacity of channels. In this paper, we address this gap by identifying three explicit families of non-degradable and non-PPT states whose one-way distillable entanglement is nevertheless single-letter. First, we introduce two weakened degradability-type conditions--regularized less-noisy and informationally degradable--and prove that each guarantees additivity and hence a single-letter formula. Second, we show a stability result for orthogonally flagged mixtures: when one component has orthogonal support on Alice's system and zero one-way distillable entanglement, the mixture remains single-letter, even though degradability is typically lost under such mixing. Finally, we propose a generalized spin-alignment principle for entropy minimization in tensor-product settings, which we establish in several key cases, including a complete Rényi-2 result. As an application, we obtain additivity results for generalized direct-sum channels and their corresponding Choi states. 2026-03-24T16:50:48Z Rabsan Galib Ahmed Graeme Smith Peixue Wu http://arxiv.org/abs/2603.23364v1 Canonical Byte-String Encoding for Finite-Ring Cryptosystems 2026-03-24T15:58:20Z Ring-mapping protocols need a canonical byte-to-residue layer before any algebraic encryption step can begin. This paper isolates that layer and presents the base-m length codec, a canonical map from byte strings of length less than 2^64 to lists of residues modulo m. The encoder builds on and adapts an rANS-based system proposed by Duda. Decoding is exact for all moduli satisfying the paper's parameter bounds. Because the encoding carries the byte length in its fixed-width header, decoding is also tolerant to appended valid suffix digits. The paper is accompanied by a Rust implementation of the described protocol, a Lean 4 formalization of the abstract codec with machine-checked proofs, and performance benchmarks. The Lean 4 formalization establishes fixed-width prefix inversion and payload-state bounds below 2^64, stream-level roundtrip correctness, and that every emitted symbol is a valid residue modulo m. We conclude with a complexity analysis and a discussion of practical considerations arising in real-world use of the codec. 2026-03-24T15:58:20Z Kyrylo Riabov Serhii Kryvyi http://arxiv.org/abs/2505.08432v3 Low-complexity Detection for Noncoherent Massive MIMO Communications 2026-03-24T15:13:41Z This work studies a point-to-point MIMO uplink in which user equipment transmits data to a base station employing a massive array. Signal detection is noncoherent and fading is assumed to follow the Weichselberger model. By exploiting the spatial stationarity of fading at the base station, a cyclostationary structure emerges naturally in the space-time representation, which suggests formulating the statistical properties of the received signal in the Karhunen-Loève domain. This allows the derivation of a low-complexity receiver that approximates maximum likelihood detection even for a moderate array size. The spectral analysis of the problem provides valuable insights on the design of space-time codewords. 2025-05-13T10:52:18Z Accepted version of the article published in Journal on Advances in Signal Processing J. Adv. Signal Process. 2026, 17 (2026) Marc Vilà-Insa Jaume Riba 10.1186/s13634-025-01291-y http://arxiv.org/abs/2603.23262v1 Autoencoder-based Optimization of Multi-user Molecule Mixture Communication Systems 2026-03-24T14:25:54Z In this paper, we introduce an autoencoder (AE)-based scheme for end-to-end optimization of a multi-user molecule mixture communication system. In the proposed scheme, each transmitter leverages an encoder network that maps the user symbol to a molecule mixture. The mixtures then propagate through the channel to the receiver, which samples the channel using a non-linear, cross-reactive sensor array. A decoder network then estimates the symbol transmitted by each user based on the sensor observations. The proposed scheme achieves, for a given signal-to-noise ratio, lower symbol error rates than a baseline scheme from the literature in a single-user setting with full channel state information. We additionally demonstrate that the proposed AE-based scheme allows reliable communication when the channel is unknown or changing. Finally, we show that for multiple access the system can account for different user priorities. In summary, the proposed AE-based scheme enables end-to-end system optimization in complex scenarios unsuitable for analytical treatment and thereby brings molecular communication systems closer to real-world deployment. 2026-03-24T14:25:54Z Bastian Heinlein Nuria Zurita Jiménez Kaikai Zhu Sümeyye Carkit-Yilmaz Robert Schober Vahid Jamali Maximilian Schäfer http://arxiv.org/abs/2603.23260v1 Ellipsoidal Manifold Optimization for Distributed Antenna Beamforming 2026-03-24T14:23:57Z This paper addresses the weighted sum-rate (WSR) maximization problem in a downlink distributed antenna system subject to per-cluster power constraints. This optimization scenario presents significant challenges due to the high dimensionality of beamforming variables in dense antenna deployments and the structural complexity of multiple independent power constraints. To overcome these difficulties, we generalize the low-dimensional subspace property--previously established for sum-power constraints--to the per-cluster power constraint case. We prove that all stationary-point beamformers reside in a reduced subspace spanned by the channel vectors of the corresponding antenna cluster. Leveraging this property, we reformulate the original high-dimensional constrained problem into an unconstrained optimization task over a product of ellipsoidal manifolds, thereby achieving significant dimensionality reduction. We systematically derive the necessary Riemannian geometric structures for this specific manifold, including the tangent space, Riemannian metric, orthogonal projection, retraction, and vector transport. Subsequently, we develop a tailored Riemannian conjugate gradient algorithm to solve the reformulated problem. Numerical simulations demonstrate that the proposed algorithm achieves the same local optima as standard benchmarks, such as the weighted minimum mean square error (WMMSE) method and conventional manifold optimization, but with substantially higher computational efficiency and scalability, particularly as the number of antenna clusters increases. 2026-03-24T14:23:57Z 13 pages Minhao Zhu Kaiming Shen