default search action
50th Allerton Conference 2012: Monticello, IL, USA
- 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, October 1-5, 2012. IEEE 2012, ISBN 978-1-4673-4537-8
- Sergio Verdú:
Non-asymptotic achievability bounds in multiuser information theory. 1-8 - Bernd Bandemer, Abbas El Gamal, Young-Han Kim:
Simultaneous nonunique decoding is rate-optimal. 9-16 - Fatemeh Hamidi-Sepehr, Jean-François Chamberland, Henry D. Pfister:
On the performance of random block codes over finite-state fading channels. 17-25 - Binnan Zhuang, Dongning Guo, Michael L. Honig:
Energy management of dense wireless heterogeneous networks over slow timescales. 26-32 - Nihat Engin Tunali, Krishna R. Narayanan, Joseph J. Boutros, Yu-Chih Huang:
Lattices over Eisenstein integers for compute-and-forward. 33-40 - Karla Kvaternik, Jaime Llorca, Daniel C. Kilper, Lacra Pavel:
A decentralized coordination strategy for networked multiagent systems. 41-47 - Laurent Lessard:
Optimal control of a fully decentralized quadratic regulator. 48-54 - Carsten W. Scherer:
Distributed control with dynamic dissipation constraints. 55-62 - Andrea Simonetto, Tamás Keviczky, Dimos V. Dimarogonas:
Distributed solution for a Maximum Variance Unfolding Problem with sensor and robotic network applications. 63-70 - Anthony Kelman, Francesco Borrelli:
Parallel nonlinear predictive control. 71-78 - Tyler H. Summers, John Lygeros:
Distributed model predictive consensus via the Alternating Direction Method of Multipliers. 79-84 - Fu Lin, Makan Fardad, Mihailo R. Jovanovic:
Identification of sparse communication graphs in consensus networks. 85-89 - Anil Aswani, Claire J. Tomlin:
Incentive design for efficient building quality of service. 90-97 - Ahmed Elmahdi, Ahmad F. Taha, Stefen Hui, Stanislaw H. Zak:
A hybrid scheduling protocol to improve quality of service in networked control systems. 98-105 - Ismail Bayezit, Tjalling Veldhuizen, Baris Fidan, Jan Paul Huissoon, Henk Lupker:
Design of string stable adaptive cruise controllers for highway and urban missions. 106-113 - Vishwesh V. Kulkarni, Theerachai Chanyaswad, Marc D. Riedel, Jongmin Kim:
Robust tunable in vitro transcriptional oscillator networks. 114-119 - Stacy Patterson, Mike P. Wittie, Kevin C. Almeroth, Bassam Bamieh:
Network optimization with dynamic demands and link prices. 120-127 - Martin Kasparick, Gerhard Wunder:
Wireless network design under service constraints. 128-135 - Babak Fotouhi, Michael G. Rabbat:
Migration in a small world: A network approach to modeling immigration processes. 136-143 - David Conti, Nigel Boston:
The Factorization Theorem and new algebraic insights into the theory of linear trellises. 144-151 - Hamed Mirghasemi, Aslan Tchamkerten:
On the capacity of the one-bit deletion and duplication channel. 152-159 - Po-Ning Chen, Hsuan-Yin Lin, Stefan M. Moser:
Weak flip codes and applications to optimal code design on the binary erasure channel. 160-167 - Christian Senger:
The periodicity transform in algebraic decoding of Reed-Solomon codes. 168-175 - Santhosh Kumar, Andrew J. Young, Nicolas Macris, Henry D. Pfister:
A proof of threshold saturation for spatially-coupled LDPC codes on BMS channels. 176-184 - Qing Li:
Compressed Rank Modulation. 185-192 - Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom of the Gaussian wiretap channel with helpers. 193-200 - Tiance Wang, John Sturm, Paul W. Cuff, Sanjeev R. Kulkarni:
Condorcet voting methods avoid the paradoxes of voting theory. 201-203 - Xiang He, Aylin Yener:
The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise. 204-211 - Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami:
Security games for voltage control in smart grid. 212-219 - SingRu Celine Hoe, Murat Kantarcioglu, Alain Bensoussan:
Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games. 220-224 - Giacomo Bacci, Luca Sanguinetti, Marco Luise, H. Vincent Poor:
Improving the energy efficiency of contention-based synchronization of (O)FDMA networks. 225-232 - Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments. 233-240 - Olav Tirkkonen, Riku Jäntti:
On α-proportional fair packet scheduling in OFDMA downlink. 241-245 - Joseph G. McMichael, Kenneth E. Kolodziej:
Optimal tuning of analog self-interference cancellers for full-duplex wireless communication. 246-251 - Ali Tajer, H. Vincent Poor:
Cost of proportional fairness in multiuser networks. 252-257 - Tong Zhen, Martin Haenggi:
Transport density vs. channel access time in wireless networks: Power control and efficient mac design. 258-263 - Phisan Kaewprapha, Tiffany Jing Li, Nattakan Puttarak:
Cognitive radio sensing through belief propagation and distributed consensus. 264-271 - Vincent Y. F. Tan:
Transmission of correlated sources over a MAC: A Gaussian approximation-based analysis. 272-277 - En-Hui Yang, Jin Meng:
Channel capacity in the non-asymptotic regime: Taylor-type expansion and computable benchmarks. 278-285 - Ebrahim MolavianJazi, J. Nicholas Laneman:
A random coding approach to Gaussian multiple access channels with finite blocklength. 286-293 - Yury Polyanskiy:
ℓp-norms of codewords from capacity- and dispersion-achieveing Gaussian codes. 294-301 - Adrià Tauste Campo, Gonzalo Vazquez-Vilar, Albert Guillen i Fabregas, Alfonso Martinez:
Converse bounds for finite-length joint source-channel coding. 302-307 - Adam N. Jacobvitz, A. Robert Calderbank, Daniel J. Sorin:
Writing cosets of a convolutional code to increase the Lifetime of Flash memory. 308-318 - G. David Forney Jr.:
Codes on graphs: Past, present and future. 319-325 - Gauri Joshi, Yanpei Liu, Emina Soljanin:
Coding for fast content download. 326-333 - Swarnendu Kar, Pramod K. Varshney:
Controlled collaboration for linear coherent estimation in wireless sensor networks. 334-341 - Yi Ouyang, Demosthenis Teneketzis:
On the optimality of a myopic policy in multi-state channel probing. 342-349 - Vikram Krishnamurthy:
Optimal sampling control with quickest change detection. 350-357 - William Moran, Stephen D. Howard, Douglas Cochran, Sofia Suvorova:
Sensor management via riemannian geometry. 358-362 - David A. Castañón:
Controlled sensing for classification using image-based sensor networks. 363-370 - Yu Zhang, Mihaela van der Schaar:
Collective ratings for online labor markets. 371-378 - Anand D. Sarwate:
Merging opinions by social sampling of posteriors. 379-385 - Michael P. Wellman, Bryce Wiedenbeck:
An empirical game-theoretic analysis of credit network formation. 386-393 - Felix Ming, Fai Wong, Peter Marbach:
Similarity-based network formation. 394-399 - K. Lakshmanan, Shalabh Bhatnagar:
A novel Q-learning algorithm with function approximation for constrained Markov decision processes. 400-405 - Jing Xie, Peter I. Frazier, Sethuraman Sankaran, Alison L. Marsden, Saleh Elmohamed:
Optimization of computationally expensive simulations with Gaussian processes and parameter uncertainty: Application to cardiovascular surgery. 406-413 - Peter J. Haas, Nicole C. Barberis, Piyaphol Phoungphol, Ignacio G. Terrizzano, Wang-Chiew Tan, Patricia G. Selinger, Paul P. Maglio:
Splash: Simulation optimization in complex systems of systems. 414-425 - Ka-Hung Hui, Vijay G. Subramanian, Dongning Guo, Randall Berry:
Diffusion of innovation in two-sided markets. 426-433 - Ceyhun Eksin, Pooya Molavi, Alejandro Ribeiro, Ali Jadbabaie:
Learning in linear games over networks. 434-440 - Vijay Kamble, Jean C. Walrand:
The price of insecurity: Public information transmission in zero-sum games. 441-448 - Ari Arapostathis:
Time asymptotic behavior of the HJB equation associated with a class of mean-field games. 449-451 - Yuanzhang Xiao, Mihaela van der Schaar:
Repeated resource sharing among selfish players with imperfect binary feedback. 452-459 - Vivek S. Borkar, Rahul M. Makhijani:
Who is the fairest of them all? 460-465 - Serdar Yüksel:
Jointly Optimal LQG quantization and control policies for multi-dimensional linear Gaussian sources. 466-473 - Jake V. Bouvrie, Mauro Maggioni:
Efficient solution of Markov decision problems with multiscale representations. 474-481 - Sergey G. Bobkov, Mokshay M. Madiman:
An equipartition property for high-dimensional log-concave distributions. 482-488 - Narayana P. Santhanam, Venkat Anantharam:
Universal algorithms: Building a case for pointwise convergence. 489-493 - Waheed U. Bajwa, Dustin G. Mixon:
Group model selection using marginal correlations: The good, the bad and the Ugly. 494-501 - Nebojsa Milosavljevic, Sameer Pawar, Michael Gastpar, Kannan Ramchandran:
Efficient algorithms for the data exchange problem under fairness constraints. 502-508 - Weifei Zeng, Viveck R. Cadambe, Muriel Médard:
An Edge Reduction Lemma for linear network coding and an application to two-unicast networks. 509-516 - Ulric J. Ferner, Muriel Médard, Emina Soljanin:
Toward sustainable networking: Storage area networks with network coding. 517-524 - Christopher S. Chang, Tracey Ho, Michelle Effros:
Peer-to-peer anonymous networking using coding. 525-532 - Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto:
New parameters of linear codes expressing security performance of universal secure network coding. 533-540 - Thomas Stahlbuhk, Brooke Shrader:
Reliability guarantees for lossy network coding subgraph construction. 541-548 - François Leduc-Primeau, Warren J. Gross:
Faulty Gallager-B decoding with optimal message repetition. 549-556 - Felix Poloczek, Florin Ciucu:
Coding of Brownian motion by quantization of exit times. 557-564 - Matthieu R. Bloch, Laura Luzzi, Jörg Kliewer:
Strong coordination with polar codes. 565-571 - Zachary Dutton, Saikat Guha, Mark M. Wilde:
Performance of polar codes for quantum and private classical communication. 572-579 - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Polar codes for sources with finite reconstruction alphabets. 580-586 - Manolis C. Tsakiris, Danielle C. Tarraf:
On decompositions of finite horizon DP Problems with linear dynamics. 587-592 - Konstantinos I. Tsianos, Michael G. Rabbat:
Distributed strongly convex optimization. 593-600 - Annie I. Chen, Asuman E. Ozdaglar:
A fast distributed proximal-gradient method. 601-608 - Ajit Gopalakrishnan, Arvind U. Raghunathan, Daniel Nikovski, Lorenz T. Biegler:
Global optimization of Optimal Power Flow using a branch & bound algorithm. 609-616 - Avhishek Chatterjee, Lei Ying, Sriram Vishwanath:
Revenue and reputation: A stochastic control approach to profit maximization. 617-623 - Shlomi Vituri, Meir Feder:
Dispersion of infinite constellations in fast fading channels. 624-631 - Yongseok Yoo, Onur Ozan Koyluoglu, Sriram Vishwanath, Ila Fiete:
Dynamic shift-map coding with side information at the decoder. 632-639 - Duo Xu, Jin Meng, En-Hui Yang:
Non-asymptotic fixed-rate Slepian-Wolf coding theorem. 640-647 - Chiranjib Choudhuri, Urbashi Mitra:
On non-causal side information at the encoder. 648-655 - Mostafa Khoshnevisan, J. Nicholas Laneman:
Intermittent communication and partial divergence. 656-662 - Yücel Altug, Aaron B. Wagner:
A refinement of the random coding bound. 663-670 - Karthik Ganesan, Pulkit Grover, Andrea Goldsmith:
How far are LDPC codes from fundamental limits on total power consumption? 671-678 - Christoph Roth, Christian Benkeser, Christoph Studer, Georgios Karakonstantis, Andreas Burg:
Data mapping for unreliable memories. 679-685 - Christoph Reller, Murthy V. Devarakonda, Hans-Andrea Loeliger:
Glue factors, likelihood computation, and filtering in state space models. 686-689 - Dinesh Ramasamy, Sriram Venkateswaran, Upamanyu Madhow:
Compressive tracking with 1000-element arrays: A framework for multi-Gbps mm wave cellular downlinks. 690-697 - Reinhard Heckel, Helmut Bölcskei:
Joint sparsity with different measurement matrices. 698-702 - Erman Ayday, Jun Zou, Arash Einolghozati, Faramarz Fekri:
A recommender system based on Belief Propagation over Pairwise Markov Random Fields. 703-707 - Mohammad Hassan Lotfi, Saswati Sarkar:
Uncertain price competition in a duopoly: Impact of heterogeneous availability of the commodity under sale. 708-715 - Srdjan Z. Budisin, Predrag Spasojevic:
Filter bank representation of complementary sequence pairs. 716-723 - Dragana Bajovic, João Manuel Freitas Xavier, Bruno Sinopoli:
Products of stochastic matrices: Large deviation rate for Markov chain temporal dependencies. 724-729 - Yoojin Choi, Petar Momcilovic:
On a critical regime for linear finite-buffer networks. 730-737 - Harsha Honnappa, Rahul Jain, Amy R. Ward:
The A(i)/GI/l Queue: A new model of transitory queueing. 738-745 - Sharayu Moharir, Sujay Sanghavi:
Online load balancing and correlated randomness. 746-753 - Dongyue Xue, Eylem Ekici:
On reducing delay and temporal starvation of queue-length-based CSMA algorithms. 754-761 - Gugan Thoppe:
Generalized network tomography. 762-769 - Alexander Shpiner, Erez Kantor, Pu Li, Israel Cidon, Isaac Keslassy:
On the capacity of bufferless Networks-on-Chip. 770-777 - Gongguo Tang, Badri Narayan Bhaskar, Parikshit Shah, Benjamin Recht:
Compressive sensing off the grid. 778-785 - Mayank Bakshi, Sidharth Jaggi, Sheng Cai, Minghua Chen:
SHO-FA: Robust compressive sensing with order-optimal complexity, measurements, and bits. 786-793 - Kishore Jaganathan, Samet Oymak, Babak Hassibi:
On robust phase retrieval for sparse signals. 794-799 - Jean Barbier, Florent Krzakala, Marc Mézard, Lenka Zdeborová:
Compressed sensing of approximately-sparse signals: Phase transitions and optimal reconstruction. 800-807 - Maria Chiara Angelini, Federico Ricci-Tersenghi, Yoshiyuki Kabashima:
Compressed sensing with sparse, structured matrices. 808-814 - Philip Schniter, Sundeep Rangan:
Compressive phase retrieval via generalized approximate message passing. 815-822 - Rami Atar, Avishai Mandelbaum, Asaf Zviran:
Control of Fork-Join Networks in heavy traffic. 823-830 - Vinay Joseph, Gustavo de Veciana, Ari Arapostathis:
Resource allocation: Realizing mean-variability-fairness tradeoffs. 831-838 - Nicolò Michelusi, Kostas Stamatiou, Michele Zorzi:
Performance analysis of energy harvesting sensors with time-correlated energy supply. 839-846 - Jianhang Gao, Qing Zhao, Ananthram Swami:
The thinnest path problem for secure communications: A directed hypergraph approach. 847-852 - Dileep M. Kalathil, Naumaan Nayyar, Rahul Jain:
Multi-player multi-armed bandits: Decentralized learning with IID rewards. 853-860 - Raman Arora, Andrew Cotter, Karen Livescu, Nathan Srebro:
Stochastic optimization for PCA and PLS. 861-868 - Nigel Boston:
On the Belgian chocolate problem and output feedback stabilization: Efficacy of algebraic methods. 869-870 - Jun Geng, Lifeng Lai, Erhan Bayraktar:
Quickest change point detection with sampling right constraints. 874-881 - Babak Ahsant, R. Viswanathan, Sakthivel Jeyaratnam, Sudharman K. Jayaweera:
New results on large sample performance of counting rules. 882-885 - Francesco Fusco, Amadou Ba:
Fault diagnosis of water distribution networks based on state-estimation and hypothesis testing. 886-892 - Yasin Yilmaz, George V. Moustakides, Xiaodong Wang:
Sequential decentralized detection under noisy channels. 893-900 - Ali Tajer, H. Vincent Poor:
Hypothesis testing for partial sparse recovery. 901-908 - Chris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai:
On identifying the causative network of an epidemic. 909-914 - Barlas Oguz, Venkat Anantharam, Ilkka Norros:
Stable, distributed P2P protocols based on random peer sampling. 915-919 - Siddhartha Banerjee, Nidhi Hegde, Laurent Massoulié:
The price of privacy in untrusted recommendation engines. 920-927 - Jaron Sanders, Sem C. Borst, Johan van Leeuwaarden:
Achievable performance in product-form networks. 928-935 - Dan P. Guralnik, Daniel E. Koditschek:
Toward a memory model for autonomous topological mapping and navigation: The case of binary sensors and discrete actions. 936-945 - Ömür Arslan, Dan P. Guralnik, Daniel E. Koditschek:
Hierarchically clustered navigation of distinct Euclidean particles. 946-953 - Masahito Hayashi, Ryutaroh Matsumoto:
Secure multiplex coding with dependent and non-uniform multiple messages. 954-959 - Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network equivalence in the presence of an eavesdropper. 960-967 - Curt Schieler, Eva C. Song, Paul Cuff, H. Vincent Poor:
Source-channel secrecy with causal disclosure. 968-973 - Ninoslav Marina, Toni Draganov Stojanovski, H. Vincent Poor:
Increasing the information-theoretic secrecy by cooperative relaying and jamming. 974-981 - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
On multiaccess channel with unidirectional cooperation and security constraints. 982-987 - Mohammad Kazemi, Azadeh Vosoughi:
Capacity region and optimum power allocation strategies for fading cognitive relay multiple access channels. 988-995 - Lav R. Varshney:
Participation in crowd systems. 996-1001 - Apostol T. Gjika, Marco Levorato, Antonio Ortega, Urbashi Mitra:
Online learning in wireless networks via directed graph lifting transform. 1002-1009 - Guangyu Zhou, Xiaochen Zhao, Wei Dai:
Low rank matrix completion: A smoothed l0-search. 1010-1017 - Samet Oymak, Babak Hassibi:
On a relation between the minimax risk and the phase transitions of compressed recovery. 1018-1025 - Gautam Dasarathy, Parikshit Shah, Badri Narayan Bhaskar, Robert D. Nowak:
Covariance sketching. 1026-1033 - Naresh Sharma, Naqueeb Ahmad Warsi:
Non-asymptotic information theoretic bound for some multi-party scenarios. 1034-1041 - Nikhil Karamchandani, Urs Niesen, Suhas N. Diggavi:
Computation over mismatched channels. 1042-1048 - Changho Suh, Naveen Goela, Michael Gastpar:
Computation in multicast networks: Function alignment and converse theorems. 1049-1056 - Sudeep Kamath, Venkat Anantharam:
Non-interactive simulation of joint distributions: The Hirschfeld-Gebelein-Rényi maximal correlation and the hypercontractivity ribbon. 1057-1064 - Yu Xiang, Young-Han Kim:
Interactive hypothesis testing with communication constraints. 1065-1072 - Pablo A. Ruiz, Aleksandr Rudkevich, Michael C. Caramanis, Evgeniy Goldis, Elli Ntakou, C. Russ Philbrick:
Reduced MIP formulation for transmission topology control. 1073-1079 - Aleksandr Rudkevich:
A nodal capacity market for co-optimization of generation and transmission expansion. 1080-1088 - Michael C. Caramanis, Evgeniy Goldis, Pablo A. Ruiz, Aleksandr Rudkevich:
Power market reform in the presence of flexible schedulable distributed loads. New bid rules, equilibrium and tractability issues. 1089-1096 - Luciano Irineu de Castro, Peter Cramton:
Prediction markets for electricity demand. 1097-1104 - Mahdi Kefayati, Ross Baldick:
Harnessing demand flexibility to match renewable production using localized policies. 1105-1109 - Ramakrishna Gummadi, Ramesh Johari, Jia Yuan Yu:
Mean field equilibria of multi armed bandit games. 1110 - Arastoo Fazeli, Ali Jadbabaie:
Targeted marketing and seeding products with positive externality. 1111-1117 - Michael Mitzenmacher, Justin Thaler:
Peeling arguments and double hashing. 1118-1125 - Michael Mitzenmacher, George Varghese:
The complexity of object reconciliation, and open problems related to set difference and coding. 1126-1132 - Vo Tam Van, Chau Yuen, Jing (Tiffany) Li:
Non-homogeneous distributed storage systems. 1133-1140 - Amit Berman, Yitzhak Birk, Ori Rottenstreich:
Probabilistic performance of write-once memory with Linear Wom codes - Analysis and insights. 1141-1149 - Natalia Silberstein, Ankit Singh Rawat, Sriram Vishwanath:
Error resilience in distributed storage via rank-metric codes. 1150-1157 - Mohammad Reza Zakerinasab, Mea Wang:
An update model for network coding in cloud storage systems. 1158-1165 - Karthikeyan Shanmugam, Dimitris S. Papailiopoulos, Alexandros G. Dimakis, Giuseppe Caire:
A repair framework for scalar MDS codes. 1166-1173 - Oktay Ölmez, Aditya Ramamoorthy:
Repairable replication-based storage systems using resolvable designs. 1174-1181 - Matthew Thill, Babak Hassibi:
Frames, group codes, and subgroups of (Z/pZ)×. 1182-1189 - Antonios Pitarokoilis, Saif Khan Mohammed, Erik G. Larsson:
Effect of oscillator phase noise on uplink performance of large MU-MIMO systems. 1190-1197 - Günther Koliander, Erwin Riegler, Giuseppe Durisi, Veniamin I. Morgenshtern, Franz Hlawatsch:
A lower bound on the noncoherent capacity pre-log for the MIMO channel with temporally correlated fading. 1198-1205 - Srinivas Yerramalli, Rahul Jain, Urbashi Mitra:
Characterization of equilibria for the degraded Gaussian broadcast and sum power MAC channels. 1206-1212 - Yue Zhao, Suhas N. Diggavi, Andrea Goldsmith, H. Vincent Poor:
Convex optimization for precoder design in MIMO interference networks. 1213-1219 - Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam:
Cellular systems with many antennas: Large system analysis under pilot contamination. 1220-1224 - Nan Liu, Wei Kang:
Capacity results for a class of Z channels with degraded message sets. 1225-1231 - Alex Dytso, Natasha Devroye, Daniela Tuninetti:
The sum-capacity of the symmetric linear deterministic Complete K-user Z-Interference Channel. 1232-1237 - Ranga Prasad, N. Srinidhi, A. Chockalingam:
Bounds on the sum-rate capacity of the Gaussian MIMO X channel. 1238-1245 - Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Capacity of distributed opportunistic scheduling in heterogeneous networks. 1246-1253 - Jinyuan Chen, Petros Elia:
Can imperfect delayed CSIT be as useful as perfect delayed CSIT? DoF analysis and constructions for the BC. 1254-1261 - Namyoon Lee, Robert W. Heath Jr.:
Not too delayed CSIT achieves the optimal degrees of freedom. 1262-1269 - Christoph Studer, Wotao Yin, Richard G. Baraniuk:
Signal representations with minimum ℓ∞-norm. 1270-1277 - Andreas Winkelbauer, Gerald Matz:
Blind estimation of bit and block error probabilities using soft information. 1278-1285 - Bans Fidan, Ahmet Camlica:
Least-squares based adaptive source localization by mobile agents. 1286-1291 - Kartik Venkat, Tsachy Weissman, Yair Carmon, Shlomo Shamai:
On information, estimation and lookahead. 1292-1299 - Alexander R. Borden, Daniel K. Molzahn, Parmeswaran Ramanathan, Bernard C. Lesieutre:
Confidentiality-preserving optimal power flow for cloud computing. 1300-1307 - Efthymios Karangelos, François Bouffard:
Integrating Demand Response into agent-based models of electricity markets. 1308-1315 - Joshua A. Taylor, Johanna L. Mathieu, Duncan S. Callaway, Kameshwar Poolla:
Price and capacity competition in zero-mean storage and demand response markets. 1316-1323 - Gabriela Hug:
Generation cost and system risk trade-off with corrective power flow control. 1324-1331 - Mengran Xue, Ian A. Hiskens:
An enhanced MPC-based strategy for non-disruptive load shedding. 1332-1337 - Jong Min Lim, Christopher L. DeMarco:
Estimating power flow conditioning from phasor measurement data. 1338-1346 - Kangwook Lee, Hao Zhang, Ziyu Shao, Minghua Chen, Abhay Parekh, Kannan Ramchandran:
An optimized distributed video-on-demand streaming system: Theory and design. 1347-1354 - Balaji Prabhakar, Katherine N. Dektar, Deborah M. Gordon:
Anternet: The regulation of harvester ant foraging and Internet congestion control. 1355-1359 - Aakanksha Chowdhery, Ranveer Chandra, Paul Garnett, Paul Mitchell:
Characterizing spectrum goodness for dynamic spectrum access. 1360-1367 - Rajdeep Singh, Kartik B. Ariyur:
Quantifying the security of physical facilities: A game theoretic framework. 1368-1373 - Ashish Khisti:
Interactive secret key generation over reciprocal fading channels. 1374-1381 - Wei Kang, Nan Liu:
Compressing encrypted data: A permutation approach. 1382-1386 - Flávio du Pin Calmon, Muriel Médard, Linda M. Zeger, João Barros, Mark M. Christiansen, Ken R. Duffy:
Lists that are smaller than their parts: A coding approach to tunable secrecy. 1387-1394 - Chouchang Yang, Basel Alomair, Radha Poovendran:
Multipath flow allocation in anonymous wireless networks with dependent sources. 1395-1400 - Flávio du Pin Calmon, Nadia Fawaz:
Privacy against statistical inference. 1401-1408 - Vinod Ramaswamy, Sachin Adlakha, Srinivas Shakkottai, Adam Wierman:
Incentives for P2P-assisted content distribution: If you can't beat 'em, join 'em. 1409-1416 - Xiaohan Kang, Juan José Jaramillo, Lei Ying:
Impacts of peer churn on P2P streaming networks. 1417-1424 - Sadegh Bolouki, Roland P. Malhamé:
Theorems about ergodicity and class-ergodicity of chains with applications in known consensus models. 1425-1431 - Mohammad N. Sefat, Abdul Bais, Nima Sarshar, Christine W. Chan:
A theoretical framework for analysis of communication pathways in random networks. 1432-1437 - Wenxiang Dong, Wenyi Zhang, Guo Wei:
Extracting influential information sources for gossiping. 1438-1444 - Victor L. Minden, Clifford C. Youn, Usman A. Khan:
A distributed self-clustering algorithm for autonomous multi-agent systems. 1445-1448 - Georgios Kotsalis, Jeff S. Shamma:
A fundamental limitation to the reduction of Markov chains via aggregation. 1449-1454 - Peter Davison, Michael Schwemmer, Naomi Ehrich Leonard:
Distributed nonuniform coverage with limited scalar measurements. 1455-1460 - Nitin K. Singh, Mehmet Eren Ahsen, Shiva Mankala, M. Vidyasagar, Michael A. White:
A novel application of mixing coefficients for reverse-engineering gene interaction networks. 1461-1466 - Jean-Camille Birget, Desmond S. Lun, Anthony Wirth, Dawei Hong:
Identification of binary gene networks. 1467-1474 - Wei Zhang, Chao Xu, Chin-Yao Chang:
Demand dynamics aggregation using hybrid systems. 1475-1481 - Thinh Thanh Doan, Choon Yik Tang:
Continuous-time constrained distributed convex optimization. 1482-1489 - Biswadip Dey, P. S. Krishnaprasad:
Trajectory smoothing as a linear optimal control problem. 1490-1497 - Bassam Bamieh:
Structured stochastic uncertainty. 1498-1503 - Danielle C. Tarraf:
Constructing ρ/μ approximations from input/output snapshots for systems over finite alphabets. 1504-1509 - Poorya Haghi, Kartik B. Ariyur:
Adapting first order nonlinear systems using extremum seeking. 1510-1516 - Farooq Khan, Zhouyue Pi, Sridhar Rajagopal:
Millimeter-wave mobile broadband with large scale spatial processing for 5G mobile communication. 1517-1523 - Vignesh Sethuraman, Hairuo Zhuang, Shahab Sanayei:
HARQ over correlated fading. 1524-1528 - Jubin Jose, Sundar Subramanian, Xinzhou Wu, Junyi Li:
Opportunistic interference alignment in cellular downlink. 1529-1534 - Jianshu Chen, Ali H. Sayed:
On the limiting behavior of distributed optimization strategies. 1535-1542 - Konstantinos I. Tsianos, Sean F. Lawlor, Michael G. Rabbat:
Consensus-based distributed optimization: Practical issues and applications in large-scale machine learning. 1543-1550 - Saman Ashkiani, Anna Scaglione:
Pulse Coupled Discrete Oscillators dynamics for network scheduling. 1551-1558 - Dusan Jakovetic, José M. F. Moura, João Manuel Freitas Xavier:
Consensus+innovations detection: Phase transition under communication noise. 1559-1563 - John C. Duchi, Alekh Agarwal, Martin J. Wainwright:
Dual averaging for distributed optimization. 1564-1565 - Nicholas Ruozzi:
Convergent message-passing algorithms in the presence of erasures. 1566-1571 - Xishuo Liu, Stark C. Draper, Benjamin Recht:
The l1 penalized decoder and its reweighted LP. 1572-1579 - Congduan Li, John MacLaren Walsh, Steven Weber:
A computational approach for determining rate regions and codes using entropic vector bounds. 1580-1587 - Nigel Boston, Ting-Ting Nan:
Large violations of the Ingleton inequality. 1588-1593 - Houssam Abbas, Georgios Fainekos:
Convergence proofs for Simulated Annealing falsification of safety properties. 1594-1601 - Pavithra Prabhakar:
Foundations for approximation based analysis of stability properties of hybrid systems. 1602-1609 - Sriram Sankaranarayanan, Christopher Miller, Rangarajan Raghunathan, Hadi Ravanbakhsh, Georgios Fainekos:
A model-based approach to synthesizing insulin infusion pump usage parameters for diabetic patients. 1610-1617 - Jerome Le Ny, George J. Pappas:
Differentially private Kalman filtering. 1618-1625 - Mohammad Naghshvar, Tara Javidi, Kamalika Chaudhuri:
Noisy Bayesian active learning. 1626-1633 - Tien V. Nguyen, François Baccelli, Kai Zhu, Sundar Subramanian, Xinzhou Wu:
When does CSMA become ALOHA? 1634-1636 - Jian Tan, Shicong Meng, Xiaoqiao Meng, Li Zhang:
Delay asymptotics for heavy-tailed MapReduce jobs. 1637-1639 - Deepanshu Vasal, Achilleas Anastasopoulos:
Achieving socially optimal solution through payments in a dynamic game for the relay channel. 1640-1644 - K. Ishaque Ashar, V. Prathyusha, Srikrishna Bhashyam, Andrew Thangaraj:
Outer bounds for the capacity region of a Gaussian two-way relay channel. 1645-1652 - Kanghee Lee, Hyuck M. Kwon, Wenhao Xiong, Hyunggi Kim, Shuang Feng, Hyuncheol Park, Yong Hoon Lee:
Two-level MMSE relay strategy for an AF wireless relay network. 1653-1658 - Ying Liu, K. D. Prathapasinghe Dharmawansa, Matthew R. McKay:
Max-flow min-cut outage characterization of dual-hop relay channels. 1659-1665 - Ali S. Khayrallah:
SLIC equalizer for ISI. 1666-1671 - Ansuman Adhikary, Mari Kobayashi, Pablo Piantanida, Haralabos C. Papadopoulos, Giuseppe Caire:
CSI dissemination for MU-MIMO schemes based on outdated CSI. 1672-1679 - Yufei W. Blankenship:
Achieving high capacity with small cells in LTE-A. 1680-1687 - Varada Potnis, Vinod Sharma:
Modelling and analysis of New Coolstreaming for P2P IPTV. 1688-1696 - Randall Berry, Vijay G. Subramanian:
Spotting trendsetters: Inference for network games. 1697-1704 - Matthew Andrews, Lisa Zhang:
Energy-delay tradeoffs in a load-balanced router. 1705-1712 - Alexander L. Stolyar:
An infinite server system with customer-to-server packing constraints. 1713-1720 - Yousi Zheng, Prasun Sinha, Ness B. Shroff:
Performance analysis of work-conserving schedulers for minimizing total flow-time with phase precedence. 1721-1728 - Usman A. Khan:
Coordinated randomness in sparse graphs. 1729-1733 - Haotian Zhang, Shreyas Sundaram:
A simple median-based resilient consensus algorithm. 1734-1741 - Heath LeBlanc, Xenofon D. Koutsoukos:
Resilient asymptotic consensus in asynchronous robust networks. 1742-1749 - Yash Deshpande, Andrea Montanari:
Linear bandits in high dimension and recommendation systems. 1750-1754 - David Stotz, Helmut Bölcskei:
Degrees of freedom in vector interference channels. 1755-1760 - Henning Maier, Johannes Schmitz, Rudolf Mathar:
Cyclic Interference Alignment by propagation delay. 1761-1768 - Mojtaba Vaezi:
The capacity of less noisy cognitive interference channels. 1769-1774 - Suvarup Saha, Randall A. Berry:
Symmetric K-user Gaussian interference channels: Approximate sum-capacity via deterministic modeling. 1775-1782 - Zhiyu Cheng, Natasha Devroye:
On constant gaps for the two-way Gaussian interference channel. 1783-1789 - Samir Medina Perlaza, Ravi Tandon, H. Vincent Poor, Zhu Han:
The Nash equilibrium region of the linear deterministic interference channel with feedback. 1790-1797 - Lillian J. Ratliff, Samuel Coogan, Daniel J. Calderone, S. Shankar Sastry:
Pricing in linear-quadratic dynamic games. 1798-1805 - André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson:
Revealing stealthy attacks in control systems. 1806-1813 - Andrew Clark, Linda Bushnell, Radha Poovendran:
A passivity-based framework for composing attacks on networked control systems. 1814-1821 - Milind Tambe, Manish Jain, James Adam Pita, Albert Xin Jiang:
Game theory for security: Key algorithmic principles, deployed systems, lessons learned. 1822-1829 - Alvaro A. Cárdenas, Saurabh Amin, Galina Schwartz, Roy Dong, Shankar Sastry:
A game theory model for electricity theft detection and privacy-aware control in AMI systems. 1830-1837 - Christoph Bunte, Amos Lapidoth:
The zero-undetected-error capacity of discrete memoryless channels with feedback. 1838-1842 - Mayur Agrawal, David J. Love, Venkataramanan Balakrishnan:
A lower bound on feedback capacity of colored Gaussian relay channels. 1843-1849 - I-Hsiang Wang, Changho Suh:
Feedback increases the degrees of freedom of two unicast Gaussian networks. 1850-1855 - Chong Li, Nicola Elia:
Noisy feedback communications with side information at the decoder. 1856-1863 - Sy-Quoc Le, Ravi Tandon, Mehul Motani, H. Vincent Poor:
The capacity region of the symmetric linear deterministic interference channel with partial feedback. 1864-1871 - Ehsan Karamad, Raviraj S. Adve:
Performance loss minimization in cooperative networks based on quantized channel feedback. 1872-1878 - Liyan Jia, Lang Tong:
Optimal pricing for residential demand response: A stochastic optimization approach. 1879-1884 - Iman Shames, Themistoklis Charalambous, Christoforos N. Hadjicostis, Mikael Johansson:
Distributed network size estimation and average degree estimation and control in networks isomorphic to directed graphs. 1885-1892 - Subhonmesh Bose, Steven H. Low, K. Mani Chandy:
Equivalence of branch flow and bus injection models. 1893-1899 - Ram Rajagopal, David Tse, Baosen Zhang:
Risk limiting dispatch in congested networks. 1900-1907 - He Hao, Timothy Middelkoop, Prabir Barooah, Sean P. Meyn:
How demand response from commercial buildings will provide the regulation needs of the grid. 1908-1913 - Mark Braverman:
Coding for interactive computation: Progress and challenges. 1914-1921 - Sae-Young Chung:
Decomposition of discrete memoryless sources. 1922-1927 - Ayan Sengupta, I-Hsiang Wang, Christina Fragouli:
Optimizing quantize-map-and-forward in slow fading relay networks. 1928-1934 - Ilan Shomorony, Amir Salman Avestimehr:
Degrees of freedom of two-hop wireless networks: "Everyone gets the entire cake". 1935-1942 - Sameer Pawar, Kannan Ramchandran:
A hybrid DFT-LDPC framework for fast, efficient and robust compressive sensing. 1943-1950 - Jonathan Scarlett, Alfonso Martinez, Albert Guillen i Fabregas:
Ensemble-tight error exponents for mismatched decoders. 1951-1958 - Reza Khosravi-Farsani:
How much rate splitting is required for a random coding scheme?: A new achievable rate region for the Broadcast Channel with Cognitive Relays. 1959-1965 - Ramji Venkataramanan, Sekhar Tatikonda:
Sparse regression codes for multi-terminal source and channel coding. 1966-1974 - Jonathan Scarlett, Albert Guillen i Fabregas:
An achievable error exponent for the mismatched multiple-access channel. 1975-1982 - Mainak Chowdhury, Andrea Goldsmith, Tsachy Weissman:
Uncoded transmission in MAC channels achieves arbitrarily small error probability. 1983-1990 - Saeed Hajizadeh, Mostafa Monemizadeh, Ghosheh Abed Hodtani:
A coding theorem for the discrete memoryless compound multiple access channel with common message and generalized feedback. 1991-1996 - Saeed Hajizadeh, Ghosheh Abed Hodtani:
Asymmetric Broadcast Channels. 1997-2002 - Yuejie Chi, A. Robert Calderbank:
Coherence-based performance guarantees of Orthogonal Matching Pursuit. 2003-2009 - Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard:
Rate of learning in hierarchical social networks. 2010-2017 - Babak Fotouhi, Michael G. Rabbat:
Growing a network on a given substrate. 2018-2023 - Avik Ray, Sujay Sanghavi, Sanjay Shakkottai:
Greedy learning of graphical models with small girth. 2024-2031 - Sahand Negahban, Devavrat Shah:
Learning sparse Boolean polynomials. 2032-2036 - Farrokh Etezadi, Ashish Khisti:
Real-time coding of Gauss-Markov sources over burst erasure channels. 2037-2044 - John Z. Sun, Vivek K. Goyal:
Chatting in distributed quantization networks. 2045-2052 - Ahmad Beirami, Faramarz Fekri:
Network Compression: Memory-assisted universal coding of sources with correlated parameters. 2053-2059 - Mehdi Torbatian, En-Hui Yang:
Causal coding of multiple jointly Gaussian sources. 2060-2067 - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
On distributed source coding using Abelian group codes. 2068-2074 - Arya Mazumdar, Ligong Wang:
Covering arbitrary point patterns. 2075-2080 - Obaid Ur Rehman, Natasa Zivic:
Noise tolerant image authentication with error localization and correction. 2081-2087 - Sanghoon Kim, Wayne E. Stark:
On the energy-throughput tradeoffs for relay networks with transmit power control. 2088-2095 - Jörg Bühler, Slawomir Stanczak:
Energy-efficient decode and forward relaying in diamond networks. 2096-2103 - Matthew S. Nokleby, Bobak Nazer, Behnaam Aazhang:
Relay computation: Managing interference with structure and cooperation. 2104-2111 - Kevin Luo, Ramy H. Gohary, Halim Yanikomeroglu:
A decoding procedure for compress-and-forward and quantize-and-forward relaying. 2112-2119 - V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
An auction-based mechanism for dynamic spectrum allocation in participatory cognitive radio networks. 2120-2126
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.