default search action
55th Allerton Conference 2017: Monticello, IL, USA
- 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017, Monticello, IL, USA, October 3-6, 2017. IEEE 2017, ISBN 978-1-5386-3266-6
- Islam Samy, Onur Ozan Koyluoglu, Ankit Singh Rawat:
Efficient data access in hybrid cloud storage. 1-8 - Serge Kas Hanna, Salim El Rouayheb:
Correcting bursty and localized deletions using guess & check codes. 9-16 - Mehmet S. Aktas, Sarah E. Anderson, Ann Johnston, Gauri Joshi, Swanand Kadhe, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin:
On the service capacity region of accessing erasure coded content. 17-24 - Swanand Kadhe, Alex Sprintson:
Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes. 25-30 - Nematollah Iri, Oliver Kosut:
Fundamental limits of universal variable-to-fixed length coding of parametric sources. 31-37 - Ashish Cherukuri, Jorge Cortés:
Data-driven distributed optimization using Wasserstein ambiguity sets. 38-44 - Payam Delgosha, Venkat Anantharam:
Load balancing in hypergraphs. 45-52 - Mehdi Molkaraie:
The primal versus the dual ising model. 53-60 - Ilya Soloveychik, Vahid Tarokh:
On the spectral norms of pseudo-wigner and related matrices. 61-66 - Islam El Bakoury, Bobak Nazer:
Integer-forcing architectures for uplink cloud radio access networks. 67-75 - Timothy J. O'Shea, Tugba Erpek, T. Charles Clancy:
Physical layer deep learning of encodings for the MIMO fading channel. 76-80 - Manik Singhal, Aly El Gamal:
Joint uplink-downlink cell associations for interference networks with local connectivity. 81-88 - Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti:
Half-duplex routing is NP-hard. 89-96 - Marcos M. Vasconcelos, Urbashi Mitra:
The multiple-access collision channel without feedback: Capacity region and a mutual information game. 97-102 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Two-transmitter two-receiver channel with confidential messages. 103-110 - Nizar Khalfet, Samir Medina Perlaza:
Simultaneous information and energy transmission in Gaussian interference channels with feedback. 111-117 - Jingbo Liu, Paul Cuff, Sergio Verdú:
On α-decodability and α-likelihood decoder. 118-124 - Seiyun Shin, Changho Suh:
Capacity of a two-way function multicast channel. 125-133 - Fei Wei, Michael Langberg:
The effect of removing a network communication edge: Group network codes. 134-141 - Bernard C. Lesieutre, Sandip Roy:
Calculating and calibrating a persistence measure for use in monitoring power system vulnerability. 142-148 - Mengqi Yao, Daniel K. Molzahn, Johanna L. Mathieu:
The impact of load models in an algorithm for improving voltage stability via demand response. 149-156 - Victor Purba, Sairaj V. Dhople, Saber Jafarpour, Francesco Bullo, Brian B. Johnson:
Network-cognizant model reduction of grid-tied three-phase inverters. 157-164 - Apostolos I. Rikos, Christoforos N. Hadjicostis:
Distributed flow balancing over unreliable communication links. 165-172 - Tao Sun, Lang Tong:
Killing death spiral softly with a small connection charge. 173-179 - Greg Ver Steeg, Rob Brekelmans, Hrayr Harutyunyan, Aram Galstyan:
Disentangled representations via synergy minimization. 180-187 - Michael J. Neely:
Optimal convergence and adaptation for utility optimal opportunistic scheduling. 188-195 - Tho Ngoc Le, Vijay G. Subramanian, Randall A. Berry:
Learning from randomly arriving agents. 196-197 - Angelia Nedic, Tatiana Tatarenko:
On stochastic proximal-point method for convex-composite optimization. 198-203 - Tian Tong, Rohit Negi:
Supermajority sentiment detection with external influence in large social networks. 204-211 - Sina Molavipour, Germán Bassi, Mikael Skoglund:
Testing for directed information graphs. 212-219 - John A. W. B. Costanzo, Donatello Materassi, Bruno Sinopoli:
Inferring link changes in dynamic networks through power spectral density variations. 220-227 - Shahin Shahrampour, Vahid Tarokh:
Nonlinear sequential accepts and rejects for identification of top arms in stochastic bandits. 228-235 - Ming Jin, Javad Lavaei, Karl Henrik Johansson:
A semidefinite programming relaxation under false data injection attacks against power grid AC state estimation. 236-243 - Ioannis Tzortzis, Christoforos N. Hadjicostis, Laurent Mombaerts:
Reconstruction of gene regulatory networks using an error filtering learning scheme. 244-251 - Ahmed H. Anwar, George K. Atia, Mina Guirguis:
Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks. 252-258 - Emily Meigs, Francesca Parise, Asuman E. Ozdaglar:
Learning dynamics in stochastic routing games. 259-266 - Mengran Xue, Sandip Roy:
A stochastic flow network model with almost-fractional routing. 267-274 - Brian Swenson, Soummya Kar:
On the exponential rate of convergence of fictitious play in potential games. 275-279 - Parinaz Naghizadeh, Mingyan Liu:
On the uniqueness and stability of equilibria of network games. 280-286 - Mohammad Hajimirsadeghi, Narayan B. Mandayam:
A dynamic colonel blotto game model for spectrum sharing in wireless networks. 287-294 - Yuzhang Lin, Ali Abur:
Identifying security vulnerabilities of weakly detectable network parameter errors. 295-301 - Abdullah Al-Digs, Sairaj V. Dhople, Yu Christine Chen:
Time-varying injection shift factors to predict post-contingency dynamic line flows. 302-306 - Chin-Yao Chang, Sonia Martínez, Jorge Cortés:
Convex relaxation for mixed-integer optimal power flow problems. 307-314 - Byungkwon Park, Christopher L. DeMarco:
Sparse tableau relaxation for the optimal power flow problem. 315-323 - Fernando Paganini, Enrique Mallada:
Global performance metrics for synchronization of heterogeneously rated power systems: The role of machine models and inertia. 324-331 - Mostafa Rahmani, George K. Atia:
Robust PCA with concurrent column and element-wise outliers. 332-337 - Sulaiman A. Alghunaim, Kun Yuan, Ali H. Sayed:
Decentralized exact coupled optimization. 338-345 - Mahyar Fazlyab, Alejandro Ribeiro, Manfred Morari, Victor M. Preciado:
A dynamical systems perspective to convergence rate analysis of proximal algorithms. 354-360 - Kai Wan, Mingyue Ji, Pablo Piantanida, Daniela Tuninetti:
Novel inner bounds with uncoded cache placement for combination networks with end-user-caches. 361-368 - Mahsa Lotfi, Mathukumalli Vidyasagar:
A fast single-pass algorithm for compressive sensing based on binary measurement matrices. 369-373 - Ryan Pilgrim, Junan Zhu, Dror Baron, Waheed U. Bajwa:
Generalized geometric programming for rate allocation in consensus. 374-381 - Liang Wu, Hemanshu Roy Pota, Ian R. Petersen:
Bounded phase synchronization of multirate kuramoto networks through decentralised or distributed control. 382-389 - Ivo Kubjas, Vitaly Skachek:
Two-party function computation on the reconciled data. 390-396 - Virag Shah, Anne Bouillard, François Baccelli:
Delay comparison of delivery and coding policies in data clusters. 397-404 - Elena Grigorescu, Erfan Sadeqi Azer, Samson Zhou:
Longest alignment with edits in data streams. 405-412 - Anastasios Tsiamis, Sérgio Pequito, George J. Pappas:
Distributed leader selection in switching networks of high-order integrators. 413-420 - Su Li, Abhin Shah, Michael Gastpar:
Cooperative data exchange with weighted cost based on d-basis construction. 421-428 - Ning Zheng, Qing Li:
Joint decoding of RAID-ECC solutions for SSDs. 429-436 - Yi-Peng Wei, Sennur Ulukus:
Coded caching with multiple file requests. 437-442 - Furkan Ercan, Carlo Condo, Seyyed Ali Hashemi, Warren J. Gross:
On error-correction performance and implementation of polar code list decoders for 5G. 443-449 - Chih-Chun Wang, David J. Love, Dennis Ogbe:
Transcoding: A new strategy for relay channels. 450-454 - Jing Li, Dongning Guo:
Cloud-based resource allocation and cooperative transmission in large cellular networks. 455-462 - Jing Zhong, Emina Soljanin, Roy D. Yates:
Status updates through multicast networks. 463-469 - Farhad Shirani, Siddharth Garg, Elza Erkip:
An information theoretic framework for active de-anonymization in social networks based on group memberships. 470-477 - Soheil Eshghi, Grace-Rose Williams, Gualtiero B. Colombo, Liam D. Turner, David G. Rand, Roger M. Whitaker, Leandros Tassiulas:
Stability and fracture of social groups. 478-485 - Rajat Talak, Sertac Karaman, Eytan H. Modiano:
Minimizing age-of-information in multi-hop wireless networks. 486-493 - Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded fourier transform. 494-501 - Fabio Cecchi, Sem C. Borst, Johan S. H. van Leeuwaarden, Philip A. Whiting:
Spatial mean-field limits for CSMA networks. 502-509 - Abishek Sankararaman, François Baccelli:
Community detection on euclidean random graphs. 510-517 - Erfan Yazdandoost Hamedani, Necdet Serhat Aybat:
Multi-agent constrained optimization of a strongly convex function over time-varying directed networks. 518-525 - Hoi-To Wai, Wei Shi, Angelia Nedic, Anna Scaglione:
Curvature-aided incremental aggregated gradient method. 526-532 - Shubhanshu Shekhar, Tara Javidi:
Bayesian function optimization with adaptive discretization. 533-540 - Wei Wu, Bing Fan, Paul H. Siegel:
Generalized partial orders for polar code bit-channels. 541-548 - Amirsina Torfi, Sobhan Soleymani, Siamak Aram, Vahid Tabataba Vakili:
On the construction of polar codes for achieving the capacity of marginal channels. 549-556 - Christopher Schnelling, Yassine Amraue, Anke Schmeink:
On iterative decoding of polar codes: Schedule-dependent performance and constructions. 557-564 - Alankrita Bhatt, Nadim Ghaddar, Lele Wang:
Polar coding for multiple descriptions using monotone chain rules. 565-571 - Kuangda Tian, Arman Fazeli, Alexander Vardy, Rongke Liu:
Polar codes for channels with deletions. 572-579 - Sarah A. Obead, Jörg Kliewer, Badri N. Vellambi:
Joint coordination-channel coding for strong coordination over noisy channels based on polar codes. 580-587 - Dong Yin, Ramtin Pedarsani, Yudong Chen, Kannan Ramchandran:
Learning mixtures of sparse linear regressions using sparse graph codes. 588-595 - Fatemeh Sheikholeslami, Georgios B. Giannakis:
Scalable kernel-based learning via low-rank approximation of lifted data. 596-603 - Morteza Ashraphijuo, Xiaodong Wang, Vaneet Aggarwal:
An approximation of the CP-rank of a partially sampled tensor. 604-611 - Anna C. Gilbert, Lalit Jain:
If it ain't broke, don't fix it: Sparse metric repair. 612-619 - S. Amir Hosseini, Shivendra S. Panwar:
Restless streaming bandits: Scheduling scalable video in wireless networks. 620-628 - Jie Chen, Wenyi Zhang, H. Vincent Poor:
An FDR-oriented approach to multiple sequential fault detection and isolation. 629-633 - Andrey Gurevich, Kobi Cohen, Qing Zhao:
Anomaly detection under a nonlinear system cost objective function. 634-638 - Amir Ajorlou, Ali Jadbabaie:
A game theoretic approach to promotion design in two-sided platforms. 639-641 - Meysam Asadi, Natasha Devroye:
On the zero-error capacity of channels with noisy feedback. 642-649 - Xiaoqing Fan, Aaron B. Wagner:
Gaussian variable packet-error coding. 650-657 - Huseyin A. Inan, Peter Kairouz, Ayfer Özgür:
Sparse group testing codes for low-energy massive random access. 658-665 - Damian Straszak, Nisheeth K. Vishnoi:
Belief propagation, bethe approximation and polynomials. 666-671 - Allison Beemer, Salman Habib, Christine A. Kelley, Jörg Kliewer:
A generalized algebraic approach to optimizing SC-LDPC codes. 672-679 - Pulakesh Upadhyaya, Anxiao Andrew Jiang:
On LDPC decoding with natural redundancy. 680-687 - Xin Xiao, Mona Nasseri, Bane Vasic, Shu Lin:
Serial concatenation of reed muller and LDPC codes with low error floor. 688-693 - Homayoon Hatami, David G. M. Mitchell, Daniel J. Costello Jr., Thomas E. Fuja:
Lower bounds for quantized LDPC min-sum decoders based on absorbing sets. 694-699 - Anxiao Andrew Jiang, Pulakesh Upadhyaya, Ying Wang, Krishna R. Narayanan, Hongchao Zhou, Jin Sima, Jehoshua Bruck:
Stopping set elimination for LDPC codes. 700-707 - Praneeth Tota, Sanjiv Kapoor, Benjamin Grimmer:
Economic inefficiency in resource allocation games. 708-715 - Susana Iglesias Rey, Patricio Reyes, Alonso Silva:
Evolution of social power for opinion dynamics networks. 716-723 - Soham R. Phade, Venkat Anantharam:
On the geometry of nash and correlated equilibria with cumulative prospect theoretic preferences. 724-731 - Yuke Li, Fengjiao Liu, A. Stephen Morse:
A distributed, dynamical system view of finite, static games. 732-738 - Ali Makhdoumi, Azarakhsh Malekian, Asuman E. Ozdaglar:
Optimal pricing policy of network goods. 739-743 - Ali Mousavi, Gautam Dasarathy, Richard G. Baraniuk:
DeepCodec: Adaptive sensing and recovery via deep convolutional neural networks. 744 - Yilong Geng, Shiyu Liu, Feiran Wang, Zi Yin, Balaji Prabhakar, Mendel Rosenblum:
Self-programming networks: Architecture and algorithms. 745-752 - Virag Shah, Lennart Gulikers, Laurent Massoulié, Milan Vojnovic:
Adaptive matching for expert systems with uncertain task types. 753-760 - Weixuan Lin, John Z. F. Pang, Eilyan Bitar, Adam Wierman:
Networked cournot competition in platform markets. 761 - Philip Wong, Mahnoosh Alizadeh:
Congestion control and pricing in a network of electric vehicle public charging stations. 762-769 - Rabih Salhab, Jerome Le Ny, Roland P. Malhamé:
A dynamic ride-sourcing game with many drivers. 770-775 - Pooyan Ehsani, Jia Yuan Yu:
The merits of sharing a ride. 776-782 - Namrata Vaswani, Praneeth Narayanamurthy:
Finite sample guarantees for PCA in non-isotropic and data-dependent noise. 783-789 - Daniel L. Pimentel-Alarcón, Gregory Ongie, Laura Balzano, Rebecca Willett, Robert D. Nowak:
Low algebraic dimension matrix completion. 790-797 - Jun Zhao:
Relations among different privacy notions. 798-805 - Jeff Cooper, Lev Reyzin:
Improved algorithms for distributed boosting. 806-813 - Shuang Song, Kamalika Chaudhuri:
Composition properties of inferential privacy for time-series data. 814-821 - Hussein Saad, Ahmed Attia Abotabl, Aria Nosratinia:
Exact recovery in the binary stochastic block model with binary side information. 822-829 - Jean Honorio:
On the sample complexity of learning graphical games. 830-836 - Eric Graves:
Communications over a state dependent channel, when the channel state and message are dependent. 837-843 - Leighton Pate Barnes, Xiugang Wu, Ayfer Özgür:
A solution to cover's problem for the binary symmetric relay channel: Geometry of sets on the hamming sphere. 844-851 - Nirmal V. Shende, Aaron B. Wagner:
On very noisy channels with feedback. 852-859 - Mustafa Sungkar, Toby Berger, William B. Levy:
Capacity achieving input distribution to the generalized inverse Gaussian neuron model. 860-869 - Assaf Ben-Yishai, Ofer Shayevitz, Young-Han Kim:
Interactive coding for Markovian protocols. 870-877 - Mohsen Bahrami, Mohamed Adel Attia, Ravi Tandon, Bane Vasic:
Towards the exact rate-memory trade-off for uncoded caching with secure delivery. 878-885 - Hao Wang, Flávio P. Calmon:
An estimation-theoretic view of privacy. 886-893 - Ahmed Attia Abotabl, Aria Nosratinia:
Achieving the secrecy capacity of the AWGN wiretap channel via multilevel coding. 894-901 - Ruoxi Jia, Roy Dong, Prashanth Ganesh, Shankar Sastry, Costas J. Spanos:
Towards a theory of free-lunch privacy in cyber-physical systems. 902-910 - Bharadwaj Satchidanandan, P. R. Kumar:
The securable subspace of a linear stochastic system with malicious sensors and actuators. 911-917 - Linqi Guo, Chen Liang, Steven H. Low:
Monotonicity properties and spectral characterization of power redistribution in cascading failures. 918-925 - Mohammad Mahdi Khalili, Parinaz Naghizadeh, Mingyan Liu:
Embracing risk dependency in designing cyber-insurance contracts. 926-933 - Mehran Elyasi, Soheil Mohajer:
Exact-repair trade-off for (n, k = d - 1, d) regenerating codes. 934-941 - Weiqi Li, Zhiying Wang, Hamid Jafarkhani:
A tradeoff between the sub-packetization size and the repair bandwidth for reed-solomon code. 942-949 - Ameera Chowdhury, Alexander Vardy:
Improved schemes for asymptotically optimal repair of MDS codes. 950-957 - Dario Paccagnan, Jason R. Marden:
The risks and rewards of conditioning noncooperative designs to additional information. 958-965 - Sean Weerakkody, Omur Ozel, Bruno Sinopoli:
A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems. 966-973 - Shuai Ma, Jia Yuan Yu:
Transition-based versus state-based reward functions for MDPs with Value-at-Risk. 974-981 - James Anderson, Nikolai Matni:
Structured state space realizations for SLS distributed controllers. 982-987 - David Fridovich-Keil, Nathan Hanford, Margaret P. Chapman, Claire J. Tomlin, Matthew K. Farrens, Dipak Ghosal:
A model predictive control approach to flow pacing for TCP. 988-994 - Guangliang Zhao, Zhixin Yang, Quan Yuan, Le Yi Wang:
Controllability of stochastic differential equations with Markovian switching. 995-999 - Alon Kipnis, John C. Duchi:
Mean estimation from adaptive one-bit measurements. 1000-1007 - Arman Rezaee, Ahmad Beirami, Ali Makhdoumi, Muriel Médard, Ken Duffy:
Guesswork subject to a total entropy budget. 1008-1015 - Aditya Gangrade, Bobak Nazer, Venkatesh Saligrama:
Lower bounds for two-sample structural change detection in ising and Gaussian models. 1016-1025 - Michael Bell, Yuval Kochman:
On composite binary hypothesis testing with training data. 1026-1033 - Alex Dytso, Ronit Bustin, H. Vincent Poor, Shlomo Shamai Shitz:
On the equality condition for the I-MMSE proof of the entropy power inequality. 1034-1039 - Ali Moharrer, Shuangqing Wei:
Algebraic properties of solutions to common information of Gaussian vectors under sparse graphical constraints. 1040-1047 - Andre Manoel, Florent Krzakala, Eric W. Tramel, Lenka Zdeborová:
Streaming Bayesian inference: Theoretical limits and mini-batch approximate message-passing. 1048-1055 - Jean Barbier, Nicolas Macris, Léo Miolane:
The layered structure of tensor estimation and its mutual information. 1056-1063 - Galen Reeves:
Additivity of information in multilayer networks via additive Gaussian noise transforms. 1064-1070 - Oussama Dhifallah, Christos Thrampoulidis, Yue M. Lu:
Phase retrieval via linear programming: Fundamental limits and algorithmic improvements. 1071-1077 - Ravi Tandon:
The capacity of cache aided private information retrieval. 1078-1082 - Qiwen Wang, Mikael Skoglund:
Secure symmetric private information retrieval from colluding databases with adversaries. 1083-1090 - Karim A. Banawan, Sennur Ulukus:
Private information retrieval from Byzantine and colluding databases. 1091-1098 - Swanand Kadhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim Y. El Rouayheb, Alex Sprintson:
Private information retrieval with side information: The single server case. 1099-1106 - Alisha Zachariah, Zachary Charles:
Efficiently finding all power flow solutions to tree networks. 1107-1114 - Venkata Gandikota, Elena Grigorescu, Clayton Thomas, Minshen Zhu:
Maximally recoverable codes: The bounded case. 1115-1122 - Pengfei Huang, Eitan Yaakobi, Paul H. Siegel:
Multi-erasure locally recoverable codes over small fields. 1123-1130 - Reyna Hulett, Mary Wootters:
Limitations of piggybacking codes with low substriping. 1131-1138 - Ryan Gabrys, Farzad Farnoud Hassanzadeh:
Reconciling similar sets. 1139-1144 - Burak Bartan, Mary Wootters:
Repairing multiple failures for scalar MDS codes. 1145-1152 - Roman Pogodin, Mikhail Krechetov, Yury Maximov:
Efficient rank minimization to tighten semidefinite programming for unconstrained binary quadratic optimization. 1153-1159 - Wenjie Li, Mohamad Assaad, Pierre Duhamel:
Distributed stochastic optimization in networks with low informational exchange. 1160-1167 - Andreea B. Alexandru, Konstantinos Gatsis, George J. Pappas:
Privacy preserving cloud-based quadratic optimization. 1168-1175 - Le Thi Khanh Hien, William B. Haskell:
Sequential smoothing framework for convex-concave saddle point problems with application to large-scale constrained optimization. 1176-1183 - William B. Haskell, Rahul Jain:
Inexact iteration of averaged operators for non-strongly convex stochastic optimization. 1184-1191 - Víctor Valls, Douglas J. Leith:
Asynchronous primal updates in dual subgradient methods via approximate lagrange multipliers. 1192-1197 - Yi Ouyang, Mukul Gagrani, Rahul Jain:
Control of unknown linear systems with Thompson sampling. 1198-1205 - Akhil Sundararajan, Bin Hu, Laurent Lessard:
Robust convergence analysis of distributed optimization algorithms. 1206-1212 - Libin Liu, Arpan Chattopadhyay, Urbashi Mitra:
On exploiting spectral properties for solving MDP with large state space. 1213-1219 - Yuansi Chen, Raaz Dwivedi, Martin J. Wainwright, Bin Yu:
Vaidya walk: A sampling algorithm based on the volumetric barrier. 1220-1227 - Arman Rahimzamani, Sreeram Kannan:
Potential conditional mutual information: Estimators and properties. 1228-1235 - Soyeon Ahn, Ziqi Ke, Haris Vikalo:
Viral quasispecies reconstruction via tensor factorization. 1236-1239 - Jingge Zhu, Ye Pu, Vipul Gupta, Claire J. Tomlin, Kannan Ramchandran:
A sequential approximation framework for coded distributed optimization. 1240-1247 - Shahroze Kabir, Frederic Sala, Guy Van den Broeck, Lara Dolecek:
Coded machine learning: Joint informed replication and learning for linear regression. 1248-1255 - Amirhossein Reisizadeh, Ramtin Pedarsani:
Latency analysis of coded computation schemes over wireless networks. 1256-1263 - Mohammad Fahim, Haewon Jeong, Farzin Haddadpour, Sanghamitra Dutta, Viveck R. Cadambe, Pulkit Grover:
On the optimal recovery threshold of coded matrix multiplication. 1264-1270 - Geewon Suh, Kangwook Lee, Changho Suh:
Matrix sparsification for coded matrix multiplication. 1271-1278 - Sanmay Das, Emir Kamenica, Renee Mirka:
Reducing congestion through information design. 1279-1284 - Hamidreza Tavafoghi, Demosthenis Teneketzis:
Informational incentives for congestion games. 1285-1292 - Jonathan Epperlein, Jakub Marecek:
Resource allocation with population dynamics. 1293-1300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.