


Остановите войну!
for scientists:


default search action
49th Allerton Conference 2011: Monticello, IL, USA
- 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011. IEEE 2011, ISBN 978-1-4577-1817-5
Coding Theory I
- Lorne Applebaum, Waheed U. Bajwa, A. Robert Calderbank, Stephen D. Howard:
Choir codes: Coding for full duplex interference management. 1-8 - Arya Mazumdar, Alexander Barg:
Sparse recovery properties of statistical RIP matrices. 9-12 - Arya Mazumdar, Alexander Barg, Gilles Zémor
:
Parameters of rank modulation codes: Examples. 13-17 - Silvija Kokalj-Filipovic, Emina Soljanin
, Predrag Spasojevic
:
Is rateless paradigm fitted for lossless compression of erasure-impaired sources? 18-25 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky:
Expected query complexity of symmetric boolean functions. 26-29
Wireless Communication I
- Yücel Altug, Aaron B. Wagner:
Refinement of the sphere packing bound for symmetric channels. 30-37 - Bernd Bandemer, Abbas El Gamal:
An achievable rate region for the 3-user-pair deterministic interference channel. 38-44 - Yu Xiang, Lele Wang, Young-Han Kim:
Information flooding. 45-51 - Yury Polyanskiy, Sergio Verdú:
Relative entropy at the channel output of a capacity-achieving code. 52-59 - Himanshu Asnani, Tsachy Weissman:
On real time coding with limited lookahead. 60-67
Capacity with Feedback and Side Information
- Maël Le Treust, Abdellatif Zaidi, Samson Lasaulce:
An achievable rate region for the broadcast wiretap channel with asymmetric side information. 68-75 - Chinmay S. Vaze, Mahesh K. Varanasi:
Can feedback increase the degrees of freedom of a wireless network with delayed CSIT? 76-83 - Chong Li, Nicola Elia:
Upper bound on the capacity of Gaussian channels with noisy feedback. 84-89 - Chong Li, Nicola Elia:
Capacity of finite alphabet channels with noisy feedback. 90-95 - Rui Ma, Todd P. Coleman:
Generalizing the Posterior Matching Scheme to higher dimensions via optimal transportation. 96-102
Pricing and Congestion Control
- Patrick Loiseau, Galina Schwartz, John Musacchio, Saurabh Amin:
Incentive schemes for Internet congestion management: Raffles versus time-of-day pricing. 103-110 - Shiyao Chen, Lang Tong, Ting He:
Optimal deadline scheduling with commitment. 111-118 - Shreeshankar Bodas, Devavrat Shah, Damon Wischik:
Interference is not noise. 119-126 - Chao Yang, Scott Jordan:
Power and rate allocation for video conferencing in cellular networks. 127-134 - Shaolei Ren
, Jaeok Park, Mihaela van der Schaar:
Profit maximization on user-generated content platforms. 135-142
Network Algorithms and Analysis I
- Zheng Lu, Gustavo de Veciana:
Opportunistic transport for stored video delivery over wireless networks: Optimal anticipative and causal approximations. 143-150 - Dragana Bajovic, Dusan Jakovetic, José M. F. Moura, João Manuel Freitas Xavier, Bruno Sinopoli:
Large deviations analysis of consensus+innovations detection in random networks. 151-155 - Tian Lan, Mung Chiang:
Measuring fairness: Axioms and applications. 156-163
Source Coding and Compression
- Lei Zhao, Yeow-Khiang Chia, Tsachy Weissman:
Compression with actions. 164-171 - Yonatan Kaspi, Neri Merhav:
Structure theorems for real-time variable rate coding with side information. 172-179 - Da Wang, Amir Ingber, Yuval Kochman:
The dispersion of joint source-channel coding. 180-187 - Chung Chan
:
Multiterminal secure source coding for a common secret source. 188-195 - Amine Laourine, Aaron B. Wagner:
Compressing neighbors in a Gauss-Markov tree. 196-203
Coding Theory II
- Brian K. Butler, Paul H. Siegel:
Error floor approximation for LDPC codes in the AWGN channel. 204-211 - Hulya Seferoglu, Lorenzo Keller, Blerim Cici, Anh Le, Athina Markopoulou
:
Cooperative video streaming on smartphones. 220-227 - Woomyoung Park, Alexander Barg:
Multilevel polarization for nonbinary codes and parallel channels. 228-234
Wireless Communication II
- Paul Cuff, Curt Schieler:
Hybrid codes needed for coordination over the point-to-point channel. 235-239 - Kumar Appaiah, Onur Ozan Koyluoglu, Sriram Vishwanath:
Polar alignment for interference networks. 240-246 - Ihn-Jung Baik, Sae-Young Chung:
Causal relay networks and new cut-set bounds. 247-252 - Siddharth Barman, Xishuo Liu, Stark C. Draper
, Benjamin Recht:
Decomposition methods for large scale LP decoding. 253-260
Statistical Signal Processing
- Badri Narayan Bhaskar, Benjamin Recht:
Atomic norm denoising with applications to line spectral estimation. 261-268 - Nima Noorshams, Martin J. Wainwright
:
Stochastic belief propagation: Low-complexity message-passing with guarantees. 269-276 - Ahmed Abdul Quadeer
, Syed Faraz Ahmed
, Tareq Y. Al-Naffouri:
Structure based Bayesian sparse reconstruction using non-Gaussian prior. 277-283 - David R. Karger
, Sewoong Oh, Devavrat Shah:
Budget-optimal crowdsourcing using low-rank matrix approximations. 284-291 - Syamantak Datta Gupta, Ravi R. Mazumdar
, Peter W. Glynn:
On the asymptotic behavior of the spectral density of autoregressive estimates. 292-298 - Arian Maleki, Manjari Narayan
, Richard G. Baraniuk:
Suboptimality of nonlocal means on images with sharp edges. 299-305
Dynamic Games and Decision Theory
- Yu Zhang, Mihaela van der Schaar:
Influencing the long-term evolution of online communities using social norms. 306-313 - M. H. R. Khouzani, Santosh S. Venkatesh, Saswati Sarkar:
Market-based control of epidemics. 314-320 - Sérgio Daniel Pequito, A. Pedro Aguiar
, Bruno Sinopoli, Diogo A. Gomes
:
Unsupervised learning of finite mixture models using mean field games. 321-328 - Nikhil Karamchandani, Paolo Minero, Massimo Franceschetti:
Cooperation in multi-access networks via coalitional game theory. 329-336 - Hamza Fawzi, Paulo Tabuada
, Suhas N. Diggavi:
Secure state-estimation for dynamical systems under active adversaries. 337-344 - Wenyuan Tang, Rahul Jain
:
Stochastic resource auctions for renewable energy integration. 345-352
Network Algorithms and Analysis II
- Michael J. Neely:
Online fractional programming for Markov decision systems. 353-360 - Alexander L. Stolyar, Elena Yudovina:
Instability of natural load balancing in large-scale flexible-server systems. 361-368 - Naumaan Nayyar, Yi Gai, Bhaskar Krishnamachari:
On a restless multi-armed bandit problem with non-identical arms. 369-376 - Urtzi Ayesta, Martin Erausquin, Peter Jacko
:
Resource-sharing in a single server with time-varying capacity. 377-383 - Niek Bouman, Sem C. Borst, Johan van Leeuwaarden:
Achievable delay performance in CSMA networks. 384-391 - Ana Busic
, Emilie Coupechoux:
Perfect sampling with aggregated envelopes. 392-399
Relay, Two-Way, and Broadcast Channels
- Yu-Chih Huang
, Krishna R. Narayanan, Tie Liu:
Coding for parallel Gaussian bi-directional relay channels: A deterministic approach. 400-407 - Ming Fai Wong, Michelle Effros:
On capacity bounds for networks containing two-way channels. 408-417 - Soheil Mohajer, Suhas N. Diggavi, H. Vincent Poor, Shlomo Shamai
:
On the parallel relay wire-tap network. 418-425 - Peng Zhong, Mai Vu:
Compress-forward without Wyner-Ziv binning for the one-way and two-way relay channels. 426-433 - Zhiyu Cheng, Natasha Devroye:
Multi-user two-way deterministic modulo 2 adder channels - When adaptation is useless. 434-438 - Masahito Hayashi, Ryutaroh Matsumoto
:
Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages. 439-444
Underwater Acoustic Communications I
- Parastoo Qarabaqi, Milica Stojanovic:
Modeling the large scale transmission loss in underwater acoustic channels. 445-452 - Kexin Zhao, Jun Ling, Jian Li:
On estimating sparse and frequency modulated channels for MIMO underwater acoustic communications. 453-460 - Atulya Yellepeddi, James C. Preisig
:
Direct-form adaptive equalization using soft information. 461-468 - Uri Erez, Gregory W. Wornell:
A super-nyquist architecture for reliable underwater acoustic communication. 469-476 - Nicolò Michelusi
, Urbashi Mitra, Andreas F. Molisch, Michele Zorzi:
Hybrid sparse/diffuse channels: A new model and estimators for wideband channels. 477-484
Detection and Estimation I
- Keqin Liu, Qing Zhao:
Multi-armed bandit problems with heavy-tailed reward distributions. 485-492 - Yanina Y. Shkel
, Stark C. Draper
, Bobak Nazer:
On the cooperative red alert exponent for the AWGN-MAC with feedback. 493-500 - Guangjie Huang, Jitendra K. Tugnait
:
On cyclic autocorrelation based spectrum sensing for cognitive radio systems in Gaussian noise. 501-507 - Y. Ming Tsang, Ada S. Y. Poon:
Successive AoA estimation: Revealing the second path for 60 GHz communication system. 508-515 - Milutin Pajovic, James C. Preisig
:
Performance analysis of the least squares based LTI channel identification algorithm using random matrix methods. 516-523
MIMO Systems
- Boon Sim Thian, Andrea Goldsmith:
Decoding for MIMO systems with correlated channel estimation errors. 524-530 - Arun Kumar Singh
, Petros Elia
, Joakim Jaldén
:
Vanishing the gap to exact lattice search at a subexponential complexity: LR-aided regularized decoding. 531-538 - Nadya Markin, Frédérique E. Oggier:
Iterated MIDO space-time code constructions. 539-544 - Jakob Hoydis, Stephan ten Brink, Mérouane Debbah:
Massive MIMO: How many antennas do we need? 545-550 - Fanggang Wang, Soung Chang Liew, Dongning Guo:
Wireless MIMO switching with zero-forcing relaying. 551-558
Multi-Agent Systems and Robot Control
- Vishwesh V. Kulkarni, Marc D. Riedel, Guy-Bart Stan
:
Networks of passive oscillators. 559-565 - Qing Hui, Zhenyi Liu:
A semistabilizability/semidetectability approach to semistable H2 and H∞ control problems. 566-571 - Lichun Li, Michael D. Lemmon:
Weakly coupled event triggered output feedback control in wireless networked control systems. 572-579 - Aseem Wadhwa, Upamanyu Madhow, João Pedro Hespanha, Brian M. Sadler:
Following an RF trail to its source. 580-587
Network Algorithms and Analysis III
- R. Gummadi, Peter B. Key, Alexandre Proutière:
Optimal bidding strategies in dynamic auctions with budget constraints. 588 - Richard T. B. Ma
, Vishal Misra:
Congestion equilibrium for differentiated service classes. 589-594
Interference Channels I
- Lei Zhou, Wei Yu:
Incremental relaying for the Gaussian interference channel with a degraded broadcasting relay. 595-602 - Ruchen Duan, Yingbin Liang:
Capacity bounds for a class of cognitive interference channels with state. 603-608 - Omar Fawzi
, Patrick M. Hayden, Ivan Savov, Pranab Sen, Mark M. Wilde
:
Quantum interference channels. 609-616 - Minqi Shen, Anders Høst-Madsen:
Wideband slope of interference channel: Finite bandwidth case. 617-624 - Mohammad Javad Abdoli, Akbar Ghasemi, Amir Keyvan Khandani:
On the degrees of freedom of SISO interference and X channels with delayed CSIT. 625-632
Underwater Acoustic Communications II
- Kai Tu, Tolga M. Duman, Milica Stojanovic, John G. Proakis:
OFDMA for underwater acoustic communications. 633-638 - Pooyan Amini, Rong-Rong Chen, Behrouz Farhang-Boroujeny:
Filterbank multicarrier for underwater communications. 639-646 - Andreja Radosevic, Tolga M. Duman, John G. Proakis, Milica Stojanovic:
Selective decision directed channel estimation for UWA OFDM systems. 647-653 - Zijian Tang, Rob Remis, Tao Xu, Geert Leus
, Magnus Lundberg Nordenvaad:
Equalization for multi-scale multi-lag OFDM channels. 654-661
Information and Game Theoretic Security I
- Lifeng Lai, Yingbin Liang, Wenliang Du:
PHY-based cooperative key generation in wireless networks. 662-669 - Murat Kantarcioglu, Alain Bensoussan
, SingRu Celine Hoe:
Impact of security risks on cloud computing adoption. 670-674 - Galina A. Schwartz, Saurabh Amin, Assane Gueye
, Jean C. Walrand:
Network design game with both reliability and security failures. 675-681 - Mathias Humbert, Mohammad Hossein Manshaei, Jean-Pierre Hubaux:
One-to-n scrip systems for cooperative privacy-enhancing technologies. 682-692 - Abhishek Mishra, Parv Venkitasubramaniam
:
The anonymity of an almost fair chaum mix. 693-700
Stochastic Systems and Control
- John C. Duchi, Alekh Agarwal, Mikael Johansson, Michael I. Jordan
:
Ergodic mirror descent. 701-706 - Vivek S. Borkar, Aditya Karnik:
Controlled gossip. 707-711 - Mohamed Kashef
, Anthony Ephremides:
Optimal scheduling for energy harvesting sources on time varying wireless channels. 712-718 - Han-I Su, Abbas El Gamal:
Modeling and analysis of the role of fast-response energy storage in the smart grid. 719-726 - Nicolò Michelusi
, Petar Popovski
, Marco Levorato, Osvaldo Simeone
, Michele Zorzi:
Cognitive transmissions under a primary ARQ process via backward interference cancellation. 727-735
Detection and Estimation II
- Christoph Studer, Richard G. Baraniuk:
Recovery guarantees for restoration and separation of approximately sparse signals. 736-743 - Joseph Wang, Venkatesh Saligrama
, David A. Castañón:
Structural similarity and distance in learning. 744-751 - Chenlu Qiu, Namrata Vaswani:
Recursive sparse recovery in large but correlated noise. 752-759 - Parikshit Shah, Venkat Chandrasekaran:
Iterative projections for signal identification on manifolds: Global recovery guarantees. 760-767 - Dror Baron
, Marco F. Duarte:
Universal MAP estimation in compressed sensing. 768-775 - Ammar Ammar, Devavrat Shah:
Ranking: Compare, don't score. 776-783
Network Algorithms and Analysis IV
- Xiaohang Li, Chih-Chun Wang, Xiaojun Lin:
Optimal immediately-decodable inter-session network coding (IDNC) schemes for two unicast sessions with hard deadline constraints. 784-791 - Michael T. Goodrich
, Michael Mitzenmacher:
Invertible bloom lookup tables. 792-799 - Yichuan Hu, Alejandro Ribeiro
:
Optimal random access for wireless networks in the presence of fading. 800-807 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:
Towards achieving full secrecy rate and low delays in wireless networks. 808-815
Interference Channels II
- Kanes Sutuntivorakoon, Vaneet Aggarwal
, Amir Salman Avestimehr, Ashutosh Sabharwal:
Maximal k-Clique Scheduling: A simple algorithm to bound maximal independent graph scheduling. 816-823 - Chinmay S. Vaze, Mahesh K. Varanasi:
The degrees of freedom of the 2×2×2 interference network with delayed CSIT and with limited Shannon feedback. 824-831 - Lili Zhang, Tie Liu, Shuguang Cui:
Symmetric Gaussian interference channel with state information. 832-838 - Hieu T. Do, Tobias J. Oechtering
, Mikael Skoglund:
Noisy network coding approach to the interference channel with receiver cooperation. 839-846 - Suvarup Saha, Randall A. Berry
:
Sum-capacity of a class of K-user Gaussian interference channels within O(K) bits. 847-854 - Ravi Tandon, H. Vincent Poor:
On the symmetric feedback capacity of the K-user cyclic interference channel. 855-862
Wireless Communication III
- Jiaming Xu, Jeffrey G. Andrews, Syed Ali Jafar
:
The net benefit of delayed finite-rate feedback in the MISO broadcast channel. 863-870 - Mingguang Xu, Dongning Guo, Michael L. Honig:
Uplink-downlink bidirectional training of multiuser MIMO filters and precoders. 871-878 - Hye Won Chung
, Saikat Guha, Lizhong Zheng:
On capacity of optical channels with coherent detection. 879-885 - Ansuman Adhikary, Haralabos C. Papadopoulos, Sean A. Ramprashad, Giuseppe Caire:
Multi-user MIMO with outdated CSI: Training, feedback and scheduling. 886-893 - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interference channel with binary fading: Effect of delayed network state information. 894-901
Statistics and Information Theory in Signal Processing I
- Mike E. Davies, Chunli Guo:
Sample-distortion functions for compressed sensing. 902-908 - Mahdi Cheraghchi
:
Coding-theoretic methods for sparse recovery. 909-916 - Behtash Babadi, Vahid Tarokh:
Spectral distribution of the product of two random matrices based on binary block codes. 917-919 - Wei Dai, Tao Xu, Wenwu Wang:
Simultaneous codeword optimization (SimCO) for dictionary learning. 920-927