default search action
49th Allerton Conference 2011: Monticello, IL, USA
- 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011. IEEE 2011, ISBN 978-1-4577-1817-5
Coding Theory I
- Lorne Applebaum, Waheed U. Bajwa, A. Robert Calderbank, Stephen D. Howard:
Choir codes: Coding for full duplex interference management. 1-8 - Arya Mazumdar, Alexander Barg:
Sparse recovery properties of statistical RIP matrices. 9-12 - Arya Mazumdar, Alexander Barg, Gilles Zémor:
Parameters of rank modulation codes: Examples. 13-17 - Silvija Kokalj-Filipovic, Emina Soljanin, Predrag Spasojevic:
Is rateless paradigm fitted for lossless compression of erasure-impaired sources? 18-25 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky:
Expected query complexity of symmetric boolean functions. 26-29
Wireless Communication I
- Yücel Altug, Aaron B. Wagner:
Refinement of the sphere packing bound for symmetric channels. 30-37 - Bernd Bandemer, Abbas El Gamal:
An achievable rate region for the 3-user-pair deterministic interference channel. 38-44 - Yu Xiang, Lele Wang, Young-Han Kim:
Information flooding. 45-51 - Yury Polyanskiy, Sergio Verdú:
Relative entropy at the channel output of a capacity-achieving code. 52-59 - Himanshu Asnani, Tsachy Weissman:
On real time coding with limited lookahead. 60-67
Capacity with Feedback and Side Information
- Maël Le Treust, Abdellatif Zaidi, Samson Lasaulce:
An achievable rate region for the broadcast wiretap channel with asymmetric side information. 68-75 - Chinmay S. Vaze, Mahesh K. Varanasi:
Can feedback increase the degrees of freedom of a wireless network with delayed CSIT? 76-83 - Chong Li, Nicola Elia:
Upper bound on the capacity of Gaussian channels with noisy feedback. 84-89 - Chong Li, Nicola Elia:
Capacity of finite alphabet channels with noisy feedback. 90-95 - Rui Ma, Todd P. Coleman:
Generalizing the Posterior Matching Scheme to higher dimensions via optimal transportation. 96-102
Pricing and Congestion Control
- Patrick Loiseau, Galina Schwartz, John Musacchio, Saurabh Amin:
Incentive schemes for Internet congestion management: Raffles versus time-of-day pricing. 103-110 - Shiyao Chen, Lang Tong, Ting He:
Optimal deadline scheduling with commitment. 111-118 - Shreeshankar Bodas, Devavrat Shah, Damon Wischik:
Interference is not noise. 119-126 - Chao Yang, Scott Jordan:
Power and rate allocation for video conferencing in cellular networks. 127-134 - Shaolei Ren, Jaeok Park, Mihaela van der Schaar:
Profit maximization on user-generated content platforms. 135-142
Network Algorithms and Analysis I
- Zheng Lu, Gustavo de Veciana:
Opportunistic transport for stored video delivery over wireless networks: Optimal anticipative and causal approximations. 143-150 - Dragana Bajovic, Dusan Jakovetic, José M. F. Moura, João Manuel Freitas Xavier, Bruno Sinopoli:
Large deviations analysis of consensus+innovations detection in random networks. 151-155 - Tian Lan, Mung Chiang:
Measuring fairness: Axioms and applications. 156-163
Source Coding and Compression
- Lei Zhao, Yeow-Khiang Chia, Tsachy Weissman:
Compression with actions. 164-171 - Yonatan Kaspi, Neri Merhav:
Structure theorems for real-time variable rate coding with side information. 172-179 - Da Wang, Amir Ingber, Yuval Kochman:
The dispersion of joint source-channel coding. 180-187 - Chung Chan:
Multiterminal secure source coding for a common secret source. 188-195 - Amine Laourine, Aaron B. Wagner:
Compressing neighbors in a Gauss-Markov tree. 196-203
Coding Theory II
- Brian K. Butler, Paul H. Siegel:
Error floor approximation for LDPC codes in the AWGN channel. 204-211 - Hulya Seferoglu, Lorenzo Keller, Blerim Cici, Anh Le, Athina Markopoulou:
Cooperative video streaming on smartphones. 220-227 - Woomyoung Park, Alexander Barg:
Multilevel polarization for nonbinary codes and parallel channels. 228-234
Wireless Communication II
- Paul Cuff, Curt Schieler:
Hybrid codes needed for coordination over the point-to-point channel. 235-239 - Kumar Appaiah, Onur Ozan Koyluoglu, Sriram Vishwanath:
Polar alignment for interference networks. 240-246 - Ihn-Jung Baik, Sae-Young Chung:
Causal relay networks and new cut-set bounds. 247-252 - Siddharth Barman, Xishuo Liu, Stark C. Draper, Benjamin Recht:
Decomposition methods for large scale LP decoding. 253-260
Statistical Signal Processing
- Badri Narayan Bhaskar, Benjamin Recht:
Atomic norm denoising with applications to line spectral estimation. 261-268 - Nima Noorshams, Martin J. Wainwright:
Stochastic belief propagation: Low-complexity message-passing with guarantees. 269-276 - Ahmed Abdul Quadeer, Syed Faraz Ahmed, Tareq Y. Al-Naffouri:
Structure based Bayesian sparse reconstruction using non-Gaussian prior. 277-283 - David R. Karger, Sewoong Oh, Devavrat Shah:
Budget-optimal crowdsourcing using low-rank matrix approximations. 284-291 - Syamantak Datta Gupta, Ravi R. Mazumdar, Peter W. Glynn:
On the asymptotic behavior of the spectral density of autoregressive estimates. 292-298 - Arian Maleki, Manjari Narayan, Richard G. Baraniuk:
Suboptimality of nonlocal means on images with sharp edges. 299-305
Dynamic Games and Decision Theory
- Yu Zhang, Mihaela van der Schaar:
Influencing the long-term evolution of online communities using social norms. 306-313 - M. H. R. Khouzani, Santosh S. Venkatesh, Saswati Sarkar:
Market-based control of epidemics. 314-320 - Sérgio Daniel Pequito, A. Pedro Aguiar, Bruno Sinopoli, Diogo A. Gomes:
Unsupervised learning of finite mixture models using mean field games. 321-328 - Nikhil Karamchandani, Paolo Minero, Massimo Franceschetti:
Cooperation in multi-access networks via coalitional game theory. 329-336 - Hamza Fawzi, Paulo Tabuada, Suhas N. Diggavi:
Secure state-estimation for dynamical systems under active adversaries. 337-344 - Wenyuan Tang, Rahul Jain:
Stochastic resource auctions for renewable energy integration. 345-352
Network Algorithms and Analysis II
- Michael J. Neely:
Online fractional programming for Markov decision systems. 353-360 - Alexander L. Stolyar, Elena Yudovina:
Instability of natural load balancing in large-scale flexible-server systems. 361-368 - Naumaan Nayyar, Yi Gai, Bhaskar Krishnamachari:
On a restless multi-armed bandit problem with non-identical arms. 369-376 - Urtzi Ayesta, Martin Erausquin, Peter Jacko:
Resource-sharing in a single server with time-varying capacity. 377-383 - Niek Bouman, Sem C. Borst, Johan van Leeuwaarden:
Achievable delay performance in CSMA networks. 384-391 - Ana Busic, Emilie Coupechoux:
Perfect sampling with aggregated envelopes. 392-399
Relay, Two-Way, and Broadcast Channels
- Yu-Chih Huang, Krishna R. Narayanan, Tie Liu:
Coding for parallel Gaussian bi-directional relay channels: A deterministic approach. 400-407 - Ming Fai Wong, Michelle Effros:
On capacity bounds for networks containing two-way channels. 408-417 - Soheil Mohajer, Suhas N. Diggavi, H. Vincent Poor, Shlomo Shamai:
On the parallel relay wire-tap network. 418-425 - Peng Zhong, Mai Vu:
Compress-forward without Wyner-Ziv binning for the one-way and two-way relay channels. 426-433 - Zhiyu Cheng, Natasha Devroye:
Multi-user two-way deterministic modulo 2 adder channels - When adaptation is useless. 434-438 - Masahito Hayashi, Ryutaroh Matsumoto:
Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages. 439-444
Underwater Acoustic Communications I
- Parastoo Qarabaqi, Milica Stojanovic:
Modeling the large scale transmission loss in underwater acoustic channels. 445-452 - Kexin Zhao, Jun Ling, Jian Li:
On estimating sparse and frequency modulated channels for MIMO underwater acoustic communications. 453-460 - Atulya Yellepeddi, James C. Preisig:
Direct-form adaptive equalization using soft information. 461-468 - Uri Erez, Gregory W. Wornell:
A super-nyquist architecture for reliable underwater acoustic communication. 469-476 - Nicolò Michelusi, Urbashi Mitra, Andreas F. Molisch, Michele Zorzi:
Hybrid sparse/diffuse channels: A new model and estimators for wideband channels. 477-484
Detection and Estimation I
- Keqin Liu, Qing Zhao:
Multi-armed bandit problems with heavy-tailed reward distributions. 485-492 - Yanina Y. Shkel, Stark C. Draper, Bobak Nazer:
On the cooperative red alert exponent for the AWGN-MAC with feedback. 493-500 - Guangjie Huang, Jitendra K. Tugnait:
On cyclic autocorrelation based spectrum sensing for cognitive radio systems in Gaussian noise. 501-507 - Y. Ming Tsang, Ada S. Y. Poon:
Successive AoA estimation: Revealing the second path for 60 GHz communication system. 508-515 - Milutin Pajovic, James C. Preisig:
Performance analysis of the least squares based LTI channel identification algorithm using random matrix methods. 516-523
MIMO Systems
- Boon Sim Thian, Andrea Goldsmith:
Decoding for MIMO systems with correlated channel estimation errors. 524-530 - Arun Kumar Singh, Petros Elia, Joakim Jaldén:
Vanishing the gap to exact lattice search at a subexponential complexity: LR-aided regularized decoding. 531-538 - Nadya Markin, Frédérique E. Oggier:
Iterated MIDO space-time code constructions. 539-544 - Jakob Hoydis, Stephan ten Brink, Mérouane Debbah:
Massive MIMO: How many antennas do we need? 545-550 - Fanggang Wang, Soung Chang Liew, Dongning Guo:
Wireless MIMO switching with zero-forcing relaying. 551-558
Multi-Agent Systems and Robot Control
- Vishwesh V. Kulkarni, Marc D. Riedel, Guy-Bart Stan:
Networks of passive oscillators. 559-565 - Qing Hui, Zhenyi Liu:
A semistabilizability/semidetectability approach to semistable H2 and H∞ control problems. 566-571 - Lichun Li, Michael D. Lemmon:
Weakly coupled event triggered output feedback control in wireless networked control systems. 572-579 - Aseem Wadhwa, Upamanyu Madhow, João Pedro Hespanha, Brian M. Sadler:
Following an RF trail to its source. 580-587
Network Algorithms and Analysis III
- R. Gummadi, Peter B. Key, Alexandre Proutière:
Optimal bidding strategies in dynamic auctions with budget constraints. 588 - Richard T. B. Ma, Vishal Misra:
Congestion equilibrium for differentiated service classes. 589-594
Interference Channels I
- Lei Zhou, Wei Yu:
Incremental relaying for the Gaussian interference channel with a degraded broadcasting relay. 595-602 - Ruchen Duan, Yingbin Liang:
Capacity bounds for a class of cognitive interference channels with state. 603-608 - Omar Fawzi, Patrick M. Hayden, Ivan Savov, Pranab Sen, Mark M. Wilde:
Quantum interference channels. 609-616 - Minqi Shen, Anders Høst-Madsen:
Wideband slope of interference channel: Finite bandwidth case. 617-624 - Mohammad Javad Abdoli, Akbar Ghasemi, Amir Keyvan Khandani:
On the degrees of freedom of SISO interference and X channels with delayed CSIT. 625-632
Underwater Acoustic Communications II
- Kai Tu, Tolga M. Duman, Milica Stojanovic, John G. Proakis:
OFDMA for underwater acoustic communications. 633-638 - Pooyan Amini, Rong-Rong Chen, Behrouz Farhang-Boroujeny:
Filterbank multicarrier for underwater communications. 639-646 - Andreja Radosevic, Tolga M. Duman, John G. Proakis, Milica Stojanovic:
Selective decision directed channel estimation for UWA OFDM systems. 647-653 - Zijian Tang, Rob Remis, Tao Xu, Geert Leus, Magnus Lundberg Nordenvaad:
Equalization for multi-scale multi-lag OFDM channels. 654-661
Information and Game Theoretic Security I
- Lifeng Lai, Yingbin Liang, Wenliang Du:
PHY-based cooperative key generation in wireless networks. 662-669 - Murat Kantarcioglu, Alain Bensoussan, SingRu Celine Hoe:
Impact of security risks on cloud computing adoption. 670-674 - Galina A. Schwartz, Saurabh Amin, Assane Gueye, Jean C. Walrand:
Network design game with both reliability and security failures. 675-681 - Mathias Humbert, Mohammad Hossein Manshaei, Jean-Pierre Hubaux:
One-to-n scrip systems for cooperative privacy-enhancing technologies. 682-692 - Abhishek Mishra, Parv Venkitasubramaniam:
The anonymity of an almost fair chaum mix. 693-700
Stochastic Systems and Control
- John C. Duchi, Alekh Agarwal, Mikael Johansson, Michael I. Jordan:
Ergodic mirror descent. 701-706 - Vivek S. Borkar, Aditya Karnik:
Controlled gossip. 707-711 - Mohamed Kashef, Anthony Ephremides:
Optimal scheduling for energy harvesting sources on time varying wireless channels. 712-718 - Han-I Su, Abbas El Gamal:
Modeling and analysis of the role of fast-response energy storage in the smart grid. 719-726 - Nicolò Michelusi, Petar Popovski, Marco Levorato, Osvaldo Simeone, Michele Zorzi:
Cognitive transmissions under a primary ARQ process via backward interference cancellation. 727-735
Detection and Estimation II
- Christoph Studer, Richard G. Baraniuk:
Recovery guarantees for restoration and separation of approximately sparse signals. 736-743 - Joseph Wang, Venkatesh Saligrama, David A. Castañón:
Structural similarity and distance in learning. 744-751 - Chenlu Qiu, Namrata Vaswani:
Recursive sparse recovery in large but correlated noise. 752-759 - Parikshit Shah, Venkat Chandrasekaran:
Iterative projections for signal identification on manifolds: Global recovery guarantees. 760-767 - Dror Baron, Marco F. Duarte:
Universal MAP estimation in compressed sensing. 768-775 - Ammar Ammar, Devavrat Shah:
Ranking: Compare, don't score. 776-783
Network Algorithms and Analysis IV
- Xiaohang Li, Chih-Chun Wang, Xiaojun Lin:
Optimal immediately-decodable inter-session network coding (IDNC) schemes for two unicast sessions with hard deadline constraints. 784-791 - Michael T. Goodrich, Michael Mitzenmacher:
Invertible bloom lookup tables. 792-799 - Yichuan Hu, Alejandro Ribeiro:
Optimal random access for wireless networks in the presence of fading. 800-807 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:
Towards achieving full secrecy rate and low delays in wireless networks. 808-815
Interference Channels II
- Kanes Sutuntivorakoon, Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:
Maximal k-Clique Scheduling: A simple algorithm to bound maximal independent graph scheduling. 816-823 - Chinmay S. Vaze, Mahesh K. Varanasi:
The degrees of freedom of the 2×2×2 interference network with delayed CSIT and with limited Shannon feedback. 824-831 - Lili Zhang, Tie Liu, Shuguang Cui:
Symmetric Gaussian interference channel with state information. 832-838 - Hieu T. Do, Tobias J. Oechtering, Mikael Skoglund:
Noisy network coding approach to the interference channel with receiver cooperation. 839-846 - Suvarup Saha, Randall A. Berry:
Sum-capacity of a class of K-user Gaussian interference channels within O(K) bits. 847-854 - Ravi Tandon, H. Vincent Poor:
On the symmetric feedback capacity of the K-user cyclic interference channel. 855-862
Wireless Communication III
- Jiaming Xu, Jeffrey G. Andrews, Syed Ali Jafar:
The net benefit of delayed finite-rate feedback in the MISO broadcast channel. 863-870 - Mingguang Xu, Dongning Guo, Michael L. Honig:
Uplink-downlink bidirectional training of multiuser MIMO filters and precoders. 871-878 - Hye Won Chung, Saikat Guha, Lizhong Zheng:
On capacity of optical channels with coherent detection. 879-885 - Ansuman Adhikary, Haralabos C. Papadopoulos, Sean A. Ramprashad, Giuseppe Caire:
Multi-user MIMO with outdated CSI: Training, feedback and scheduling. 886-893 - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interference channel with binary fading: Effect of delayed network state information. 894-901
Statistics and Information Theory in Signal Processing I
- Mike E. Davies, Chunli Guo:
Sample-distortion functions for compressed sensing. 902-908 - Mahdi Cheraghchi:
Coding-theoretic methods for sparse recovery. 909-916 - Behtash Babadi, Vahid Tarokh:
Spectral distribution of the product of two random matrices based on binary block codes. 917-919 - Wei Dai, Tao Xu, Wenwu Wang:
Simultaneous codeword optimization (SimCO) for dictionary learning. 920-927
Security
- Tzu-Han Chou, Vincent Y. F. Tan, Stark C. Draper:
The sender-excited secret key agreement model: Capacity theorems. 928-935 - Onur Ozan Koyluoglu, Rajiv Soundararajan, Sriram Vishwanath:
State amplification under masking constraints. 936-943 - Lei Zhao, Yeow-Khiang Chia:
The efficiency of common randomness generation. 944-950 - Jun Kurihara, Tomohiko Uyematsu:
Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight. 951-957
Inference and Learning
- Maxim Raginsky:
Directed information and pearl's causal calculus. 958-965 - Brian D. Ziebart:
Factorized decision forecasting via combining value-based and reward-based estimation. 966-973 - Konstantinos I. Tsianos, Michael G. Rabbat:
Distributed consensus and optimization under communication delays. 974-982 - Cem Tekin, Mingyan Liu:
Adaptive learning of uncontrolled restless bandits with logarithmic regret. 983-990
Games, Auctions, and Mean Field Limits
- Hamidou Tembine, Raúl Tempone, Pedro Vilanova:
Mean field interaction in biochemical reaction networks. 991-997 - Diogo A. Gomes:
Continuous time finite state space mean field games - A variational approach. 998-1001 - Krishnamurthy Iyer, Ramesh Johari, Mukund Sundararajan:
Mean field equilibria of dynamic auctions with learning: A dynamic revenue equivalence theorem. 1002-1003
LDPC Codes and Iterative Coding Techniques
- Birgit Schotsch, Radu Lupoaie, Peter Vary:
The performance of low-density random linear fountain codes over higher order galois fields under maximum likelihood decoding. 1004-1011 - Mayur Agrawal, David J. Love, Venkataramanan Balakrishnan:
An iteratively optimized linear coding scheme for correlated Gaussian channels with noisy feedback. 1012-1018 - Osso Vahabzadeh, Masoud Salehi:
Design of complexity-optimized bilayer lengthened LDPC codes for relay channels. 1019-1024 - Shuai Zhang, Christian Schlegel:
Causes and dynamics of LDPC error floors on AWGN channels. 1025-1032
Wireless Communication IV
- Jaemin Han, Chih-Chun Wang, Ness B. Shroff:
Analysis of precoding-based intersession network coding and the corresponding 3-unicast interference alignment scheme. 1033-1040 - Tiangao Gou, Chenwei Wang, Syed Ali Jafar:
Aligned interference neutralization and the degrees of freedom of the 2×2×2 interference channel with interfering relays. 1041-1047 - Soheil Feizi, Muriel Médard:
A power efficient sensing/communication scheme: Joint source-channel-network coding by using compressive sensing. 1048-1054 - Sem C. Borst, Mihalis G. Markakis, Iraj Saniee:
Distributed power allocation and user assignment in OFDMA cellular networks. 1055-1063 - Mohsen Mollanoori, Majid Ghaderi:
On the complexity of wireless uplink scheduling with successive interference cancellation. 1064-1071
Statistics and Information Theory in Signal Processing II
- Yue M. Lu, Pier Luigi Dragotti, Martin Vetterli:
Localization of diffusive sources using spatiotemporal measurements. 1072-1076 - Kevin G. Jamieson, Robert D. Nowak:
Low-dimensional embedding using adaptively selected ordinal data. 1077-1084 - Ehsan Elhamifar, René Vidal:
Sparsity in unions of subspaces for classification and clustering of high-dimensional data. 1085-1089 - Yuxin Chen, Andrea J. Goldsmith, Yonina C. Eldar:
Shannon meets Nyquist: The interplay between capacity and sampling. 1090-1097
Information and Game Theoretic Security II
- Ersen Ekrem, Sennur Ulukus:
Secure lossy source coding with side information. 1098-1105 - Igor Stanojev, Aylin Yener:
Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach. 1106-1112 - Majed Ben-Kalefa, Feng Lin:
Supervisory control for opacity of discrete event systems. 1113-1119 - Omur Ozel, Sennur Ulukus:
Rate-equivocation region of cyclic shift symmetric wiretap channels. 1120-1127 - Chung Chan:
Delay of linear perfect secret key agreement. 1128-1135
Optimization, Consensus and Social Networks
- Sibren Isaacman, Stratis Ioannidis, Augustin Chaintreau, Margaret Martonosi:
Distributed collaborative filtering over social networks. 1136-1142 - Ioannis Mitliagkas, Aditya Gopalan, Constantine Caramanis, Sriram Vishwanath:
User rankings from comparisons: Learning permutations in high dimensions. 1143-1150 - Anand D. Sarwate, Tara Javidi:
Opinion dynamics and distributed learning of distributions. 1151-1158
Performance Issues in Cloud Computing
- Minghong Lin, Adam Wierman, Lachlan L. H. Andrew, Eno Thereska:
Online dynamic capacity provisioning in data centers. 1159-1163 - Anshul Gandhi, Mor Harchol-Balter:
How data center size impacts the effectiveness of dynamic power management. 1164-1169 - Yuxiong He, Sameh Elnikety:
Scheduling for data center interactive services. 1170-1181
Multi-Terminal Information Theory
- Xiang He, Ashish Khisti, Aylin Yener:
MIMO multiple access channel with an arbitrarily varying eavesdropper. 1182-1189 - Michelle Effros:
On sources and networks: Can computational tools derive information theoretic limits? 1190-1194 - Cecilia G. Galarza, Pablo Piantanida, Marios Kountouris:
On the block error probability of finite-length codes in decentralized wireless networks. 1195-1201 - V. Lalitha, N. Prakash, K. Vinodh, P. Vijay Kumar, S. Sandeep Pradhan:
A nested linear codes approach to distributed function computation over subspaces. 1202-1209 - Nevroz Sen, Giacomo Como, Serdar Yüksel, Fady Alajaji:
On the capacity of memoryless finite-state multiple access channels with asymmetric noisy state information at the encoders. 1210-1215 - Nan Jiang, Yang Yang, Anders Høst-Madsen, Zixiang Xiong:
Energy efficient hybrid transmission of correlated sources over the MAC. 1216-1221
Distributed Inference in Sensor Networks I
- Mukul Gagrani, Pranay Sharma, Satish G. Iyengar, V. Sriram Siddhardh Nadendla, Aditya Vempaty, Hao Chen, Pramod K. Varshney:
On noise-enhanced distributed inference in the presence of Byzantines. 1222-1229 - Jayakrishnan Unnikrishnan, Martin Vetterli:
Sampling trajectories for mobile sensing. 1230-1237 - Brandon M. Jones, Mark E. Campbell, Lang Tong:
Maximum likelihood combining of stochastic maps. 1238-1241 - Matthew S. Nokleby, Waheed U. Bajwa, A. Robert Calderbank, Behnaam Aazhang:
Gossiping in groups: Distributed averaging over the wireless medium. 1242-1249
Wireless Communication V
- Qiao Fu, Lin Zhang, Wei Feng, Yixin Zheng:
DAWN: A density adaptive routing algorithm for vehicular delay tolerant sensor networks. 1250-1257 - Vivek Shripad Borkar, Rajesh Sundaresan:
Asymptotics of the invariant measure in mean field models with jumps. 1258-1263 - Guy Bresler, Dustin Cartwright, David Tse:
Geometry of the 3-user MIMO interference channel. 1264-1271 - Hien Quoc Ngo, Erik G. Larsson, Thomas L. Marzetta:
Uplink power efficiency of multiuser MIMO with very large antenna arrays. 1272-1279
Pricing/Design/Operations of Power Markets
- Aswin Kannan, Victor M. Zavala:
A game-theoretical model predictive control framework for electricity markets. 1280-1285 - Ross Baldick:
Minimum uplift assignment of transmission charges to beneficiaries. 1286-1293 - Luciano De Castro, Joisa Dutra:
The economics of the smart grid. 1294-1301 - Justin M. Foster, Pablo A. Ruiz, Aleksandr Rudkevich, Michael C. Caramanis:
Economic and corrective applications of tractable transmission topology control. 1302-1309 - Yashodhan Kanoria, Andrea Montanari, David Tse, Baosen Zhang:
Distributed storage for intermittent energy sources: Control design and performance limits. 1310-1317
Optimization
- Garvesh Raskutti, Martin J. Wainwright, Bin Yu:
Early stopping for non-parametric regression: An optimal data-dependent stopping rule. 1318-1325 - Nof Abuzainab, Anthony Ephremides:
Energy/delay tradeoffs in data transmission over a time varying wireless link. 1326-1333 - Libin Jiang, Steven H. Low:
Real-time demand response with uncertain renewable energy in smart grid. 1334-1341 - Subhonmesh Bose, Dennice F. Gayme, Steven H. Low, K. Mani Chandy:
Optimal power flow over tree networks. 1342-1348
Data Storage
- Thomas A. Courtade, Richard D. Wesel:
Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both. 1349-1357 - Craig Armstrong, Alexander Vardy:
Distributed storage with communication costs. 1358-1365 - Joseph C. Koo, John T. Gill III:
Scalable constructions of fractional repetition codes in distributed storage systems. 1366-1373 - Zhiying Wang, Itzhak Tamo, Jehoshua Bruck:
On codes for optimal rebuilding access. 1374-1381 - Dimitris S. Papailiopoulos, Alexandros G. Dimakis, Viveck R. Cadambe:
Repair optimal erasure codes through hadamard designs. 1382-1389
Information Theory and Circuits
- Zafar Takhirov, Bobak Nazer, Ajay Joshi:
A preliminary look at error avoidance in digital logic via feedback equalization. 1390-1391 - Pulkit Grover, Andrea Goldsmith, Anant Sahai, Jan M. Rabaey:
Information theory meets circuit design: Why capacity-approaching codes require more chip area and power. 1392-1399 - Bing Shi, Ankur Srivastava:
Cooling of 3D-IC using non-uniform micro-channels and sensor based dynamic thermal management. 1400-1407
Coding Theory III
- Feng Wang, Defne Aktas, Tolga M. Duman:
On capacity and coding for segmented deletion channels. 1408-1413 - Malihe Aliasgari, Mohammad-Reza Sadeghi, Daniel Panario:
Gröbner bases for lattices and an algebraic decoding algorithm. 1414-1415 - Qing Li:
WOM codes against inter-cell interference in NAND memories. 1416-1423 - Myounghae Hyun, Won Taek Song, Jinho Choi, Seungjae Yoo, Jeongseok Ha:
Code design for type-I wiretap channel thanks. 1424-1429 - Hessam Mahdavifar, Alexander Vardy:
Algebraic list-decoding of subspace codes with multiplicities. 1430-1437 - David Conti, Nigel Boston:
Matrix representations of trellises and enumerating trellis pseudocodewords. 1438-1445
Network Coding
- Kwang Taik Kim, Wonjong Noh, Vahid Tarokh:
Robust scalable physical layer network coding. 1446-1453 - Ömer Faruk Tekin, Svitlana Vyetrenko, Tracey Ho, Hongyi Yao:
Erasure correction for nested receivers. 1454-1461 - Easton Li Xu, Guangyue Han:
Bounds and exact values in network encoding complexity with two sinks. 1462-1469 - Jiening Zhan, Se Yong Park, Michael Gastpar, Anant Sahai:
Function computation in networks: Duality and constant gap results. 1470-1477 - Michael Langberg, Michelle Effros:
Network coding: Is zero error always possible? 1478-1485
Emerging Paradigms for Control and Optimization in Power Grids
- Florian Dörfler, Fabio Pasqualetti, Francesco Bullo:
Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach. 1486-1491 - Bernard C. Lesieutre, Daniel K. Molzahn, Alexander R. Borden, Christopher L. DeMarco:
Examining the limits of the application of semidefinite programming to power flow problems. 1492-1499 - Christoforos N. Hadjicostis, Themistoklis Charalambous:
Asynchronous coordination of distributed energy resources for the provisioning of ancillary services. 1500-1507 - Baosen Zhang, David Tse:
Geometry of feasible injection region of power networks. 1508-1515
Distributed Inference in Sensor Networks II
- Ge Xu, Biao Chen:
Information for inference. 1516-1520 - Burkay Orten, Prakash Ishwar, William Clement Karl, Venkatesh Saligrama:
Sensing structure in learning-based binary classification of high-dimensional data. 1521-1528 - K. S. Jithin, V. Sharma:
Novel algorithms for distributed sequential hypothesis testing. 1529-1536 - Waseem A. Malik, Nuno C. Martins, Ananthram Swami:
Optimal sensor placement for intruder detection: New design principles. 1537-1543 - Sriram Venkateswaran, Upamanyu Madhow:
Space-time localization using times of arrival. 1544-1551 - Ivan Dokmanic, Juri Ranieri, Amina Chebira, Martin Vetterli:
Sensor networks for diffusion fields: Detection of sources in space and time. 1552-1558
Multi-Layer Multi-Resolution Games
- Laurent Lessard, Sanjay Lall:
A state-space solution to the two-player decentralized optimal control problem. 1559-1564 - Bahman Gharesifard, Jorge Cortés:
Exploration of misperceptions in hypergames. 1565-1570 - Srinivas Sridharan, William M. McEneaney:
Risk-sensitive methods in deception games. 1571-1575 - Farhad Farokhi, Karl Henrik Johansson:
Dynamic control design based on limited model information. 1576-1583 - Jean C. Walrand, Elijah Polak, Hoam Chung:
Harbor attack: A pursuit-evasion game. 1584-1591
Wireless Communication VI
- Premkumar Karumbu, Xiaomin Chen, Douglas J. Leith:
Utility optimal coding for packet transmission over wireless networks - Part I: Networks of binary symmetric channels. 1592-1599 - Premkumar Karumbu, Xiaomin Chen, Douglas J. Leith:
Utility optimal coding for packet transmission over wireless networks - Part II: Networks of packet erasure channels. 1600-1606 - Urs Niesen, Bobak Nazer, Phil Whiting:
Computation alignment: Capacity approximation without noise accumulation. 1607-1612 - Peyman Hesami, J. Nicholas Laneman:
Low-complexity incremental use of multiple transmitters in wireless communication systems. 1613-1618 - Evan Everett, Debashis Dash, Chris Dick, Ashutosh Sabharwal:
Self-interference cancellation in multi-hop full-duplex networks via structured signaling. 1619-1626
Wireless Communication VII
- Harpreet S. Dhillon, Radha Krishna Ganti, François Baccelli, Jeffrey G. Andrews:
Coverage and ergodic rate in K-tier downlink heterogeneous cellular networks. 1627-1632 - Marco Levorato, Sina Firouzabadi, Andrea Goldsmith:
A reinforcement learning optimization framework for cognitive interference networks. 1633-1640 - Santhosh Kumar, Jean-François Chamberland, Henry D. Pfister:
Large deviations on empirical service for erasure channels with memory. 1641-1648 - Sayandev Mukherjee:
Downlink SINR distribution in a heterogeneous cellular wireless network with max-SINR connectivity. 1649-1656 - Prasanna Madhusudhanan, Timothy X. Brown, Youjian Eugene Liu:
On the interference due to cooperative cognitive radios in the presence of multiple low-power primary users. 1657-1664 - Ebrahim A. Gharavol, Erik G. Larsson:
Robust joint optimization of MIMO two-way relay channels with imperfect CSI. 1657-1664 - Yang Zhang, Edwin K. P. Chong, Jan Hannig, Donald J. Estep:
Continuum modeling and control of large nonuniform networks. 1670-1677
Information Theory
- Zoran Utkovski, Petar Popovski:
Protocol coding with reordering of user resources: Capacity results for the Z-channel. 1678-1685 - A. Taufiq Asyhari, Tobias Koch, Albert Guillen i Fabregas:
Nearest neighbour decoding with pilot-assisted channel estimation for fading multiple-access channels. 1686-1693 - Yuanpeng Liu, Elza Erkip:
Completion time in broadcast channel and interference channel. 1694-1701 - Peng Zhang, Frans M. J. Willems, Li Huang:
Investigations of noncoherent OOK based schemes with soft and hard decisions for WSNs. 1702-1709 - Md Saifur Rahman, Aaron B. Wagner:
Rate region of the vector Gaussian one-helper source-coding problem. 1710-1717 - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Multilevel polarization of polar codes over arbitrary discrete memoryless channels. 1718-1725 - Xiangyun Zhou, Radha Krishna Ganti, Jeffrey G. Andrews, Are Hjørungnes:
Secrecy transmission capacity of decentralized wireless networks. 1726-1732
Information Theory and the Biological Sciences
- Shreepriya Das, Haris Vikalo:
Base-calling for Illumina's next-generation DNA sequencing systems via Viterbi algorithm. 1733-1736 - Toby Berger, William B. Levy, Jie Xing:
Energy efficient neurons with generalized inverse Gaussian interspike interval durations. 1737-1742 - Sharon Aviran, Julius B. Lucks, Lior Pachter:
RNA structure characterization from chemical mapping experiments. 1743-1750 - Narayana Prasad Santhanam, Dharmendra S. Modha:
Lossy Lempel-Ziv like compression algorithms for memoryless sources. 1751-1756 - Lav R. Varshney, Devavrat Shah:
Informational limits of neural circuits. 1757-1763
Coding Techniques and Applications
- Shirin Jalali, Arian Maleki:
Minimum complexity pursuit. 1764-1770 - Bike Xie, Mihaela van der Schaar, Thomas A. Courtade, Richard D. Wesel:
Minimizing weighted sum finish time for one-to-many file transfer in peer-to-peer networks. 1771-1778 - Ronit Bustin, Shlomo Shamai:
Properties of the MMSE of "bad" codes. 1779-1784 - Mehdi Mortazawi Molu, Norbert Goertz:
A study on relaying soft information with error prone relays. 1785-1792 - Yanpei Liu, Jing Yang, Stark C. Draper:
Exploiting route diversity in multi-packet transmission using mutual information accumulation. 1793-1800 - Arvind Yedla, Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan:
Universal codes for the Gaussian MAC via spatial coupling. 1801-1808 - Hongyi Yao, Tracey Ho:
Privacy preserving data aggregating with multiple access channel. 1809-1815
Detection and Estimation III
- Gabriel H. Tucci, Philip A. Whiting:
Asymptotic results on generalized Vandermonde matrices and their extreme eigenvalues. 1816-1823 - Aswin C. Sankaranarayanan, Chinmay Hegde, Sriram Nagaraj, Richard G. Baraniuk:
Go with the flow: Optical flow-based transport operators for image manifolds. 1824-1831 - Chun Lam Chan, Pak Hou Che, Sidharth Jaggi, Venkatesh Saligrama:
Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms. 1832-1839 - Mesrob I. Ohannessian, Vincent Y. F. Tan, Munther A. Dahleh:
Canonical estimation in a rare-events regime. 1840-1847 - Guido H. Jajamovich, Ali Tajer, Xiaodong Wang:
Optimal combined detection and estimation. 1848-1852 - Jiayao Hu, Yingbin Liang, Eric P. Xing:
Nonparametric decision making based on tree-structured information aggregation. 1853-1860 - Reza Khosravi-Farsani, Farokh Marvasti:
Interference networks with general message sets: a random coding scheme. - Hassan Tavakoli, Mahmoud Ahmadian-Attari, M. Reza Peyghami:
Optimal rate and maximum erasure probability LDPC codes in binary erasure channel.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.