skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Leshem, Amir"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. How can non-communicating agents learn to share congested resources efficiently? This is a challeng- ing task when the agents can access the same resource simultaneously (in contrast to multi-agent multi-armed bandit problems) and the resource valuations differ among agents. We present a fully distributed algorithm for learning to share in congested environments and prove that the agents’ regret with respect to the optimal allocation is poly-logarithmic in the time horizon. Performance in the non-asymptotic regime is illustrated in numerical simulations. The distributed algorithm has applications in cloud computing and spectrum sharing. 
    more » « less
    Free, publicly-accessible full text available November 1, 2025
  2. Computational spectrometry is an emerging field that uses photodetection in conjunction with numerical algorithms for spectroscopic measurements. Compact single photodetectors made from layered materials are particularly attractive since they eliminate the need for bulky mechanical and optical components used in traditional spectrometers and can easily be engineered as heterostructures to optimize device performance. However, such photodetectors are typically nonlinear devices, which adds complexity to extracting optical spectra from their response. Here, we train an artificial neural network to recover the full nonlinear spectral photoresponse of a single GeSe-InSe p-n heterojunction device. The device has a spectral range of 400 to 1100 nm, a small footprint of ~25 × 25 square micrometers, and a mean reconstruction error of 2 × 10−4for the power spectrum at 0.35 nanometers. Using our device, we demonstrate a solution to metamerism, an apparent matching of colors with different power spectral distributions, which is a fundamental problem in optical imaging. 
    more » « less
  3. null (Ed.)
  4. null (Ed.)
  5. We present a method to deterministically obtain broad bandwidth frequency combs in microresonators. These broadband frequency combs correspond to cnoidal waves in the limit when they can be considered soliton crystals or single solitons. The method relies on moving adiabatically through the (frequency detuning)×(pump amplitude) parameter space, while avoiding the chaotic regime. We consider in detail Si3N4microresonators with small or intermediate dimensions and an SiO2microresonator with large dimensions, corresponding to prior experimental work. We also discuss the impact of thermal effects on the stable regions for the cnoidal waves. Their principal effect is to increase the detuning for all the stable regions, but they also skew the stable regions, since higher pump power corresponds to higher power and hence increased temperature and detuning. The change in the detuning is smaller for single solitons than it is for soliton crystals. Without temperature effects, the stable regions for single solitons and soliton crystals almost completely overlap. When thermal effects are included, the stable region for single solitons separates from the stable regions for the soliton crystals, explaining in part the effectiveness of backwards-detuning to obtaining single solitons. 
    more » « less
  6. This paper studies the security aspect of gossip-based decentralized optimization algorithms for multi agent systems against data injection attacks. Our contributions are two-fold. First, we show that the popular distributed projected gradient method (by Nedi´c et al.) can be attacked by coordinated insider attacks, in which the attackers are able to steer the final state to a point of their choosing. Second, we propose a metric that can be computed locally by the trustworthy agents processing their own iterates and those of their neighboring agents. This metric can be used by the trustworthy agents to detect and localize the attackers. We conclude the paper by supporting our findings with numerical experiments. 
    more » « less