default search action
47th Allerton Conference 2009: Monticello, IL, USA
- 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009, Monticello, IL, USA, September 30 - October 2, 2009. IEEE 2009, ISBN 978-1-4244-5870-7
- Bane Vasic, Shashi Kiran Chilappagari, Dung Viet Nguyen, Shiva Kumar Planjery:
Trapping set ontology. 1-7 - Alexandros G. Dimakis, Pascal O. Vontobel:
LP decoding meets LP decoding: A connection between channel coding and compressed sensing. 8-15 - S. Hamed Hassani, Satish Babu Korada, Rüdiger L. Urbanke:
The compound capacity of polar codes. 16-21 - Hessam Mahdavifar, Alexander Vardy:
Optimal interleaving algorithms for generalized concatenated codes. 22-29 - Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli:
Compressed sensing with probabilistic measurements: A group testing solution. 30-35 - Radu Berinde, Piotr Indyk:
Sequential Sparse Matching Pursuit. 36-43 - Chinmay Hegde, Richard G. Baraniuk:
Compressive sensing of streams of pulses. 44-51 - Dongning Guo, Dror Baron, Shlomo Shamai:
A single-letter characterization of optimal noisy compressed sensing. 52-59 - Irina Rish, Genady Grabarnik:
Sparse signal recovery with exponential-family noise. 60-66 - Viveck R. Cadambe, Syed Ali Jafar:
Interference alignment via random codes and he capacity of a class of deterministic interference channels. 67-74 - Hieu T. Do, Tobias J. Oechtering, Mikael Skoglund:
An achievable rate region for the Gaussian Z-interference channel with conferencing. 75-81 - Lalitha Sankar, Jan Vondrák, H. Vincent Poor:
K-user fading interference channels: The ergodic very strong case. 82-87 - Amin Jafarian, Jubin Jose, Sriram Vishwanath:
Algebraic lattice alignment for K-user interference channels. 88-93 - Marco Levorato, Urbashi Mitra, Michele Zorzi:
Cognitive interference management in retransmission-based wireless networks. 94-101 - Jinsung Lee, Junhee Lee, Yung Yi, Song Chong, Alexandre Proutière, Mung Chiang:
Implementing utility-optimal CSMA. 102-111 - Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Scheduling policies for single-hop networks with heavy-tailed traffic. 112-120 - Mor Harchol-Balter, Alan Scheller-Wolf, Andrew R. Young:
Why segregating short jobs from long jobs under high variability is not always a win. 121-127 - David Plonka, Paul Barford:
Network anomaly confirmation, diagnosis and remediation. 128-135 - Fernando Paganini, Ao Tang, Andrés Ferragut, Lachlan L. H. Andrew:
Stability of networks under general file size distribution with alpha fair rate allocation. 136-142 - Di Niu, Baochun Li:
Asymptotic rate limits for randomized broadcasting with network coding. 143-150 - Sachin Adlakha, Seyed Reza Mirghaderi, Sanjay Lall, Andrea Goldsmith:
Decentralized team decision via coding. 151 - Nevroz Sen, Fady Alajaji, Serdar Yüksel:
Feedback capacity of a class of symmetric finite-state Markov channels. 152-159 - Gabriel M. Lipsa, Nuno C. Martins:
Optimal state estimation in the presence of communication costs and packet drops. 160-169 - Matthew Malloy, Akbar M. Sayeed:
Signal detection in sparse multipath channels. 170-177 - Karumbu Premkumar, Anurag Kumar, Joy Kuri:
Distributed detection and localization of events in large ad hoc wireless sensor networks. 178-185 - Yilin Mo, Roberto Ambrosino, Bruno Sinopoli:
A convex optimization approach of multi-step sensor selection under correlated noise. 186-193 - Elizabeth Bodine-Baron, Babak Hassibi, Adam Wierman:
Generalizing Kronecker graphs in order to model searchable networks. 194-201 - Usman A. Khan, Soummya Kar, José M. F. Moura:
Distributed localization and tracking with coordinated and uncoordinated motion models. 202-208 - Hongyi Yao, Elad Verbin:
Network coding is highly non-approximable. 209-213 - Wei Zhang, Xiaoli Ma, Giwan Choi:
Enhancing data persistence for energy constrained networks by network modulation. 214-221 - Michael Langberg, Muriel Médard:
On the multiple unicast network coding, conjecture. 222-227 - Joseph C. Koo, John T. Gill III:
Low-complexity non-uniform demand multicast network coding problems. 228-235 - Arian Maleki:
Coherence analysis of iterative thresholding algorithms. 236-243 - Marco F. Duarte, Volkan Cevher, Richard G. Baraniuk:
Model-based compressive sensing for signal ensembles. 244-250 - Garvesh Raskutti, Martin J. Wainwright, Bin Yu:
Minimax rates of convergence for high-dimensional regression under ℓq-ball sparsity. 251-257 - Gongguo Tang, Arye Nehorai:
Performance analysis of support recovery with joint sparsity constraints. 258-264 - Guy Bresler, David N. C. Tse:
3 User interference channel: Degrees of freedom as a function of channel diversity. 265-271 - Yi Cao, Biao Chen:
Capacity bounds for two-hop interference networks. 272-279 - Cheng Chang:
Interference channel capacity region for randomized fixed-composition codes. 280-287 - Sung Ho Chae, Sang Won Choi, Sae-Young Chung:
Optimal multiplexing gain of K-user line-of-sight interference channels with polarization. 288-293 - Michel X. Goemans, Satoru Iwata, Rico Zenklusen:
An algorithmic framework for wireless information flow. 294-300 - Meng Wang, Ao Tang:
Conditions for a unique non-negative solution to an underdetermined system. 301-307 - Jun Luo, Dongning Guo:
Compressed neighbor discovery for wireless ad hoc networks: The Rayleigh fading case. 308-313 - Joseph Knuth, Prabir Barooah:
Distributed collaborative localization of multiple vehicles from relative pose measurements. 314-321 - Minyi Huang, Peter E. Caines, Roland P. Malhamé:
Social optima in mean field LQG control: Centralized and decentralized strategies. 322-329 - Aditya Mahajan, Sekhar Tatikonda:
Sequential team form and its simplification using graphical models. 330-339 - Fu Lin, Makan Fardad, Mihailo R. Jovanovic:
Synthesis of H2 optimal static structured controllers: Primal and dual formulations. 340-346 - Boris N. Oreshkin, Mark J. Coates, Michael G. Rabbat:
Optimization and analysis of distributed averaging with memory. 347-354 - George K. Atia, Venkatesh Saligrama:
Noisy group testing: An information theoretic perspective. 355-362 - Dragana Bajovic, Bruno Sinopoli, João Xavier:
Robust linear dimensionality reduction for hypothesis testing with application to sensor selection. 363-370 - Ruoheng Liu, Yingbin Liang, H. Vincent Poor:
Fading cognitive multiple-access channels with confidential messages. 371-377 - Minghua Chen, Mung Chiang, Phil Chou, Jin Li, Shao Liu, Sudipta Sengupta:
P2P streaming capacity: Survey and recent results. 378-387 - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:
Degrees of freedom of multi-source relay networks. 388-393 - Yingbin Liang, Lifeng Lai, John Halloran:
Distributed algorithm for collaborative detection in cognitive radio networks. 394-399 - Hamid Saeedi, Hossein Pishro-Nik, Amir H. Banihashemi:
On systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels. 400-407 - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:
Can iterative decoding for erasure correlated sources be universal? 408-415 - Elchanan Mossel, Omer Tamuz:
Iterative maximum likelihood on networks. 416-423 - Chao-Yu Chen, Qin Huang, Jingyu Kang, Li Zhang, Shu Lin:
A binary message-passing decoding algorithm for LDPC codes. 424-430 - O. Patrick Kreidl, Alan S. Willsky:
Message quantization in belief propagation: Structural results in the low-rate regime. 431-438 - Danny Bickson, Alexander T. Ihler, Harel Avissar, Danny Dolev:
A low density lattice decoder via non-parametric belief propagation. 439-446 - Soheil Feizi, Muriel Médard:
When do only sources need to compute? On functional compression in tree networks. 447-454 - Ming Ouyang, Lei Ying:
On scheduling in multi-channel wireless downlink networks with limited feedback. 455-461 - Randy Cogill, Brooke Shrader:
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding. 462-468 - Mahdi Lotfinezhad, Peter Marbach:
On channel access delay of CSMA policies in wireless networks with primary interference constraints. 469-476 - Murat Alanyali, Maxim Dashouk:
On fair sharing of spectrum via CSMA. 477-482 - Gagan Raj Gupta, Sujay Sanghavi, Ness B. Shroff:
Is it enough to drain the heaviest bottlenecks? 483-490 - Sung Hyun Chun, Richard J. La:
Auction-based dynamic spectrum trading market - Spectrum allocation and profit sharing. 491-498 - Hang Zhou, Randall A. Berry, Michael L. Honig, Rakesh Vohra:
Complementarities in spectrum markets. 499-506 - Yufang Xi, Edmund M. Yeh:
Pricing, competition, and routing in relay networks. 507-514 - Holger Boche, Siddharth Naik:
Mechanism design and implementation theoretic perspective of interference coupled wireless systems. 515-522 - Patrick L. Harrington, Alfred O. Hero III:
Information theoretic adaptive tracking of epidemics in complex networks. 523-530 - Alejandro Lage-Castellanos, Andrea Pagnani, Martin Weigt:
The importance of dilution in the inference of biological networks. 531-538 - Yaniv Erlich, Noam Shental, Amnon Amir, Or Zuk:
Compressed sensing approach for high throughput carrier screen. 539-544 - John MacLaren Walsh, Steven Weber:
A recursive construction of the set of binary entropy vectors. 545-552 - Kaveh Mahdaviani, Shervin Shahidi, Shima Haddadi, Masoud Ardakani, Chintha Tellambura:
Improving the Sphere-Packing Bound for binary codes over memoryless symmetric channels. 553-557 - Yücel Altug, Aaron B. Wagner:
Source and channel simulation using arbitrary randomness. 558-565 - Lav R. Varshney, Sanjoy K. Mitter, Vivek K. Goyal:
Channels that die. 566-573 - Shraga I. Bross, Amos Lapidoth, Ligong Wang:
The Poisson channel with side information. 574-578 - Vaneet Aggarwal, Salman Avestimehr, Ashutosh Sabharwal:
Distributed universally optimal strategies for interference channels with partial message passing. 579-584 - Wei Liu, Biao Chen:
Interference channels with arbitrarily correlated sources. 585-592 - Oliver Kosut, Lang Tong, David Tse:
Nonlinear network coding is necessary to combat general Byzantine attacks. 593-599 - Xiaoheng Chen, Qin Huang, Shu Lin, Venkatesh Akella:
FPGA-based low-complexity high-throughput tri-mode decoder for quasi-cyclic LDPC codes. 600-606 - Samuel Cheng, Shuang Wang, Lijuan Cui:
Adaptive Slepian-Wolf decoding using particle filtering based belief propagation. 607-612 - Venkat Chandar, Devavrat Shah, Gregory W. Wornell:
A locally encodable and decodable compressed data structure. 613-619 - Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf:
LDPC codes for the cascaded BSC-BAWGN channel. 620-627 - Serdar Yüksel:
A random time stochastic drift result and application to stochastic stabilization over noisy channels. 628-635 - Vincent Conitzer:
Approximation guarantees for fictitious play. 636-643 - Ning Bao, John Musacchio:
Optimizing the decision to expel attackers from an information system. 644-651 - Sarah-Jane Whittaker, Karen Rudie, P. James McLellan, Stefan Haar:
Choice-point nets: A discrete-event modelling technique for analyzing health care protocols. 652-659 - Creag Winacott, Karen Rudie:
Limited lookahead supervisory control of probabilistic discrete-event systems. 660-667 - Wen-Chiao Lin, Humberto E. Garcia, David Thorsley, Tae-Sic Yoo:
Sequential window diagnoser for discrete-event systems under unreliable observations. 668-675 - Ya Meng, Navin Kashyap:
Controlling errors in the process of molecular self-assembly. 676-677 - Haris Vikalo, Babak Hassibi:
Limits of performance of real-time DNA microarrays. 678-683 - Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:
How do the structure and the parameters of Gaussian tree models affect structure learning? 684-691 - Osvaldo Simeone, Deniz Gündüz, Shlomo Shamai:
Compound relay channel with informed relay and destination. 692-699 - Mukul Agarwal, Swastik Kopparty, Sanjoy K. Mitter:
Universal capacity of channels with given rate-distortion in absence of common randomness, and failure of universal source-channel separation. 700-707 - Cheng Chang:
Joint source-channel with side information coding error exponents. 708-715 - Aaron B. Wagner, Benjamin G. Kelly, Yücel Altug:
The lossy one-helper conjecture is false. 716-723 - Samar Agnihotri, Rajesh Venkatachalapathy, H. S. Jamadagni:
Distributed function computation in asymmetric communication scenarios. 724-731 - Tuncer C. Aysal, Anand D. Sarwate, Alexandros G. Dimakis:
Reaching consensus in wireless networks with probabilistic broadcast. 732-739 - Aman Jain, Sanjeev R. Kulkarni, Sergio Verdú:
Minimum energy per bit for Gaussian broadcast channels with common message and cooperating receivers. 740-747 - Chandrasekharan Raman, Gerard J. Foschini, Reinaldo A. Valenzuela, Roy D. Yates, Narayan B. Mandayam:
Power savings from half-duplex relaying in downlink cellular systems. 748-753 - Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
A note on information-theoretic secret key exchange over wireless channels. 754-761 - Yuanyuan He, Subhrakanti Dey:
Efficient algorithms for outage minimization in parallel fading channels with limited feedback. 762-770 - Bahman Gharesifard, Jorge Cortés:
Distributed strategies for making a digraph weight-balanced. 771-777 - Victor M. Preciado, Alireza Tahbaz-Salehi, Ali Jadbabaie:
Asymptotic analysis of quadratic error of consensus in large-scale random directed networks. 778-782 - Takao Inoue, Robert W. Heath Jr.:
Grassmannian predictive coding for delayed limited feedback MIMO systems. 783-788 - Achilleas Anastasopoulos:
A sequential transmission scheme for the multiple access channel with noiseless feedback. 789-794 - An Liu, Ashutosh Sabharwal, Youjian Liu, Haige Xiang, Wu Luo:
Distributed MIMO network optimization based on duality and local message passing. 795-802 - Maxim Raginsky, Alexander Rakhlin:
Information complexity of black-box convex optimization: A new look via feedback information theory. 803-510 - Xiang He, Aylin Yener:
Interference channels with strong secrecy. 811-818 - Raef Bassily, Sennur Ulukus:
A new achievable ergodic secrecy rate region for the fading multiple access wiretap channel. 819-826 - Shantanu Rane, Wei Sun, Anthony Vetro:
Secure function evaluation based on secret sharing and homomorphic encryption. 827-834 - João Almeida, João Barros:
Joint compression and data protection. 835-842 - Bobak Nazer, Michael Gastpar, Syed Ali Jafar, Sriram Vishwanath:
Interference alignment at finite SNR: General message sets. 843-848 - Jeffrey G. Andrews, Steven Weber, Marios Kountouris, Martin Haenggi:
A simple upper bound on random access transport capacity. 849-856 - Iñaki Esnaola, Javier Garcia-Frías:
Distributed analog coding of correlated Gaussian sources. 857-864 - Baris Nakiboglu, Lizhong Zheng:
Upper bounds to error probability with feedback. 865-871 - Ehsan Ardetsanizadeh, Tara Javidi, Young-Han Kim, Michèle A. Wigger:
On the sum capacity of the Gaussian multiple access channel with feedback. 872-878 - Fatemeh Fazel, D. Richard Brown:
On the endogenous formation of energy efficient cooperative wireless networks. 879-886 - Alireza Keshavarz-Haddad, Mohammad Ali Khojastepour:
On capacity of deterministic wireless networks under node half-duplexity constraint. 887-891 - Chuan Huang, Jinhua Jiang, Shuguang Cui:
Asymptotic capacity of randomly-failing relay networks with DF strategy. 892-898 - Chun-Hung Liu, Jeffrey G. Andrews:
Diversity-multiplexing tradeoff of network coding with bidirectional random relaying. 899-905 - Dimos V. Dimarogonas, Emilio Frazzoli:
Distributed event-triggered control strategies for multi-agent systems. 906-910 - Yilin Mo, Bruno Sinopoli:
Secure control against replay attacks. 911-918 - Xiaojun Lin, V. J. Venkataramanan:
On the large-deviations optimality of scheduling policies minimizing the drift of a Lyapunov function. 919-926 - Anthony Auer, Juergen Dingel, Karen Rudie:
Concurrency control generation for dynamic threads using Discrete-Event Systems. 927-934 - Ofer Shayevitz:
Posterior matching variants and fixed-point elimination. 935-939 - Vishwesh V. Kulkarni, Vincent Fromion, Tansu Alpcan, Michael G. Safonov:
Loss of continuity in cellular networks under stabilizing transmit power control. 940-946 - Harish Ganapathy, Siddhartha Banerjee, Nedialko B. Dimitrov, Constantine Caramanis:
Optimal feedback allocation algorithms for multi-user uplink. 947-954 - Himanshu Tyagi:
Capacity region of a state dependent degraded broadcast channel with noncausal transmitter CSI. 955-961 - Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Parrilo, Alan S. Willsky:
Sparse and low-rank matrix decompositions. 962-967 - John S. Baras, Pedram Hovareshti, Senni Perumal:
Dynamic self-organization and clustering in distributed networked systems for performance improvement. 968-975 - Puneet Sharma:
An entropy-based framework for dynamic clustering and coverage problems. 976-983 - Ketan Savla, Emilio Frazzoli:
Game-theoretic learning algorithm for a spatial coverage problem. 984-990 - Syed Ali Jafar, Viveck R. Cadambe, Chenwei Wang:
Interference alignment with asymmetric complex signaling. 991-996 - Ralf Koetter, Michelle Effros, Muriel Médard:
Beyond network equivalence. 997-1004 - Waheed U. Bajwa, Akbar M. Sayeed, Robert Nowak:
A restricted isometry property for structurally-subsampled unitary matrices. 1005-1012 - Donald Goldfarb, Shiqian Ma, Zaiwen Wen:
Solving low-rank matrix completion problems efficiently. 1013-1020 - M. Salman Asif, William Mantzel, Justin Romberg:
Random channel coding and blind deconvolution. 1021-1025 - Weiyu Xu, M. Amin Khajehnejad, Amir Salman Avestimehr, Babak Hassibi:
Breaking the ℓ1 recovery thresholds with reweighted ℓ1 optimization. 1026-1030 - Anxiao Jiang, Michael Langberg, Robert Mateescu, Jehoshua Bruck:
Data movement in flash memories. 1031-1038 - Fan Zhang, Henry D. Pfister:
Modulation codes for flash memory based on load-balancing theory. 1039-1046 - Yingquan Wu:
Novel burst error correcting algorithms for Reed-Solomon codes. 1047-1052 - Wei Mao, Babak Hassibi:
Violating the Ingleton inequality with finite groups. 1053-1060 - Ravi Tandon, Sennur Ulukus, Kannan Ramchandran:
Secure source coding with a helper. 1061-1068 - Ebrahim MolavianJazi, Matthieu R. Bloch, J. Nicholas Laneman:
Arbitrary jamming can preclude secure communication. 1069-1075 - Tùng T. Kim, H. Vincent Poor:
Secure relaying: Can publicly transferred keys increase degrees of freedom? 1076-1081 - Ting He, Lang Tong, Ananthram Swami:
Maximum throughput of clandestine relay. 1082-1089 - Yunus Sarikaya, Özgür Erçetin:
On physically secure and stable slotted ALOHA system. 1090-1096 - Bilal Sadiq, Gustavo de Veciana:
Throughput optimality of delay-driven MaxWeight scheduler for a wireless system with flow dynamics. 1097-1102 - Krishna Jagannathan, Eytan H. Modiano:
The impact of queue length information on buffer overflow in parallel queues. 1103-1110 - Libin Jiang, Jean C. Walrand:
Stable and utility-maximizing scheduling for stochastic processing networks. 1111-1119 - Anil Kumar Chorppath, Srikrishna Bhashyam, Rajesh Sundaresan:
Almost budget-balanced mechanisms for allocation of divisible resources. 1120-1125 - Gareth Middleton, Behnaam Aazhang, Jorma Lilleberg:
A flexible framework for polynomial-time resource allocation in multiflow wireless networks. 1126-1133 - Amitav Mukherjee, A. Lee Swindlehurst:
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels. 1134-1141 - Mahmoud Taherzadeh, H. Vincent Poor:
Limits on the robustness of MIMO joint source-channel codes. 1142-1144 - Sungho Yun, Constantine Caramanis:
Multiclass support vector machines for adaptation in MIMO-OFDM wireless systems. 1145-1152 - Mustafa Cenk Gursoy:
MIMO wireless communications under statistical queueing constraints. 1153-1160 - Omar Bakr, Mark Johnson, Raghuraman Mudumbai, Upamanyu Madhow:
Interference suppression in the presence of quantization errors. 1161-1168 - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes against online adversaries. 1169-1176 - Christian G. Claudel, Matthieu Nahoum, Alexandre M. Bayen:
Minimal error certificates for detection of faulty sensors using convex optimization. 1177-1186 - Omur Ozel, Elif Uysal-Biyikoglu:
A power control game with smooth reduction of SINR objectives. 1187-1194 - Jun Xiao, Vaneet Aggarwal, Ashutosh Sabharwal, Youjian Liu:
Interference networks with local view: A distributed optimization approach. 1195-1202 - Vojislav Gajic, Jianwei Huang, Bixio Rimoldi:
Competition of wireless providers for atomic users: Equilibrium and social optimality. 1203-1210 - Vaneet Aggarwal, Lorne Applebaum, Amir Bennatan, A. Robert Calderbank, Stephen D. Howard, Stephen J. Searle:
Enhanced CDMA communications using compressed-sensing reconstruction methods. 1211-1215 - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:
Low-rank matrix completion with noisy observations: A quantitative comparison. 1216-1222 - Emmanuel J. Candès, Yaniv Plan:
Accurate low-rank matrix recovery from a small number of linear measurements. 1223-1230 - Venkatesan Guruswami, James R. Lee, Avi Wigderson:
Expander codes over reals, Euclidean sections, and compressed sensing. 1231-1234 - Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan:
A rate-distortion perspective on multiple decoding attempts for Reed-Solomon codes. 1235-1242 - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar, Kannan Ramchandran:
Explicit construction of optimal exact regenerating codes for distributed storage. 1243-1249 - Songqing Zhao, Daniela Tuninetti, Rashid Ansari, Dan Schonfeld:
Distortion exponent for multiple description coding. 1250-1255 - Shirin Jalali, Tsachy Weissman:
Multiple description coding of discrete ergodic sources. 1256-1261 - Kalyana C. Bollapalli, Yiyue Wu, Kanupriya Gulati, Sunil P. Khatri, A. Robert Calderbank:
Highly parallel decoding of space-time codes on graphics processing units. 1262-1269 - Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, M. Kivanç Mihçak:
A detection theoretic approach to digital fingerprinting with focused receivers under uniform linear averaging Gaussian attacks. 1270-1277 - Ersen Ekrem, Sennur Ulukus:
Secrecy capacity region of the degraded compound multi-receiver wiretap channel. 1278-1285 - Lan Zhang, Rui Zhang, Ying-Chang Liang, Yan Xin, Shuguang Cui:
On the relationship between the multi-antenna secrecy communications and cognitive radio communications. 1286-1292 - Victor M. Preciado, Ali Jadbabaie:
Spectral analysis of dynamically evolving networks with linear preferential attachment. 1293-1299 - Daniel Genin, Vladimir Marbukh:
Bursty fluid approximation of TCP for modeling internet congestion at the flow level. 1300-1306 - Jung Ryu, Sandeep Bhadra, Sanjay Shakkottai:
TCP with feed-forward source coding for wireless downlink networks. 1307-1314 - Ka-Hung Hui, Dongning Guo, Randall Berry, Martin Haenggi:
Performance analysis of MAC protocols in wireless line networks using statistical mechanics. 1315-1322 - Chris T. K. Ng, Howard C. Huang:
Efficient linear precoding in downlink cooperative cellular networks with soft interference nulling. 1323-1329 - Mohammad Ali Khojastepour, Alireza Keshavarz-Haddad:
Rotational coding achieves multicast capacity of deterministic wireless networks. 1330-1337 - Yan Zhu, Dongning Guo:
Isotropic MIMO interference channels without CSIT: The loss of degrees of freedom. 1338-1344 - An Liu, Ashutosh Sabharwal, Youjian Liu, Haige Xiang, Wu Luo:
Distributed MIMO network optimization based on duality and local message passing. 1345-1352 - Marc Lelarge:
Economics of malware: Epidemic risks model, network externalities and incentives. 1353-1360 - Sahand Haji Ali Ahmad, Mingyan Liu:
Multi-channel opportunistic access: A case of restless bandits with multiple plays. 1361-1368 - Vahideh H. Manshadi, Ramesh Johari:
Supermodular network games. 1369-1376 - Ali Kakhbod, Demosthenis Teneketzis:
An individually rational, budget-balanced mechanism that implements in Nash equilibria the solution of the unicast service provisioning problem. 1377-1386 - Sukwon Kim, Tracey Ho, Michelle Effros, Salman Avestimehr:
Network error correction with unequal link capacities. 1387-1394 - Mohammad Naghshvar, Hairuo Zhuang, Tara Javidi:
A general class of throughput optimal routing policies in multi-hop wireless networks. 1395-1402 - Daniel E. Lucani, Muriel Médard, Milica Stojanovic, David R. Karger:
Sharing information in time-division duplexing channels: A network coding approach. 1403-1410 - Chiranjib Choudhuri, Urbashi Mitra:
On the capacity of the symbol-asynchronous relay channel. 1411-1418 - Yao Li, Emina Soljanin:
Rateless codes for single-server streaming to diverse users. 1419-1426 - N. P. Santhanam:
Connections between probability estimation and graph theory. 1427-1429 - Arunabha Sen, Sujogya Banerjee, Pavel Ghosh, Shahrzad Shirazipourazad:
Impact of region-based faults on the connectivity of wireless networks. 1430-1437 - Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov:
Swarming secrets. 1438-1445 - Joshua Reich, Augustin Chaintreau:
Replication schemes for opportunistic networks with impatient users. 1446-1451 - Ravi Prakash, Ehsan Nourbakhsh, Kunal Sahu:
Data aggregation in sensor networks: No more a slave to routing. 1452-1459 - Alejandro Cornejo, Nancy A. Lynch, Saira Viqar, Jennifer L. Welch:
Neighbor discovery in mobile ad hoc networks using an abstract MAC layer. 1460-1467 - Balakrishnan Narayanaswamy, Rohit Negi, Pradeep K. Khosla:
Robust detection of random variables using sparse measurements. 1468-1475 - Jia Ye, Qing Zhao:
Quickest change detection in multiple on-off processes: Switching with memory. 1476-1481 - Manqi Zhao, Venkatesh Saligrama:
Outlier detection via localized p-value estimation. 1482-1489 - Tariq R. Qureshi, Michael D. Zoltowski, A. Robert Calderbank:
Target detection in MIMO radar using Golay complementary sequences in the presence of Doppler. 1490-1493 - Onur Özyesil, M. Kivanç Mihçak, Yücel Altug:
On detection with partial information in the Gaussian setup. 1494-1501 - Jin Meng, En-Hui Yang:
Interactive encoding and decoding based on syndrome accumulation over binary LDPC ensembles: Universality and rate-adaptivity. 1502-1509 - Nan Ma, Prakash Ishwar:
Infinite-message distributed source coding for two-terminal interactive computing. 1510-1517 - Ying Zhang, Sorina Dumitrescu, Jun Chen, Zhibin Sun:
LDGM-based codes for successive refinement. 1518-1524 - Ramachandran Rajesh, Vinod Sharma:
Distributed transmission of functions of correlated sources over a fading multiple access channel. 1225-1232 - Juyul Lee, Nihar Jindal:
Asymptotically optimal policies for hard-deadline scheduling over fading channels. 1533-1540 - Jing Huang, Sundeep Venkatraman, Krishnan Padmanabhan, Oliver M. Collins:
Information rates of the noncoherent frequency selective fading channel. 1541-1548 - Aditya Mahajan, Sekhar Tatikonda:
A training based scheme for communicating over unknown channels with feedback. 1549-1553 - Yang Yang, Zixiang Xiong:
The sum-rate bound for a new class of quadratic Gaussian multiterminal source coding problems. 1554-1561 - Giacomo Como, Fabio Fagnani:
Scaling limits for continuous opinion dynamics systems. 1562-1566 - Osman Yagan, Armand M. Makowski:
On the existence of triangles in random key graphs. 1567-1574 - Jing Wang, Nicola Elia:
Distributed agreement in the presence of noise. 1575-1581 - Julien M. Hendrickx, Alex Olshevsky, John N. Tsitsiklis:
Distributed anonymous function computation in information fusion and multiagent systems. 1582-1589 - Nicholas Ruozzi, Justin Thaler, Sekhar Tatikonda:
Graph covers and quadratic minimization. 1590-1596 - Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, Randall Berry, Aylin Yener:
Cost sharing with network coding in two-way relay networks. 1597-1604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.