


Остановите войну!
for scientists:


default search action
53rd Allerton Conference 2015: Monticello, IL, USA
- 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015, Allerton Park & Retreat Center, Monticello, IL, USA, September 29 - October 2, 2015. IEEE 2015, ISBN 978-1-5090-1824-6
- Angelia Nedich
, Minh N. Do
:
Foreword. - Anusha Lalitha, Tara Javidi
:
On the rate of learning in distributed hypothesis testing. 1-8 - Julien M. Hendrickx, John N. Tsitsiklis:
Fundamental limitations for anonymous distributed systems with broadcast communications. 9-16 - Mohsen Ghassemi, Anand D. Sarwate
:
Distributed proportional stochastic coordinate descent with social sampling. 17-24 - Sean Warnick:
Shared hidden state and network representations of interconnected dynamical systems. 25-32 - Ehsan Kazemi
, Lyudmila Yartseva, Matthias Grossglauser:
When can two unlabeled networks be aligned under partial overlap? 33-42 - Chenguang Zhu, Hossein Karkeh Abadi, Balaji Prabhakar:
Polling one's friends: A graph theoretic view. 43-50 - Keith Paarporn, Ceyhun Eksin, Joshua S. Weitz, Jeff S. Shamma
:
Epidemic spread over networks with agent awareness and social distancing. 51-57 - Parinaz Naghizadeh
, Mingyan Liu:
Provision of non-excludable public goods on networks: From equilibrium to centrality measures. 58-65 - Maria Chiara Angelini
, Francesco Caltagirone, Florent Krzakala
, Lenka Zdeborová:
Spectral detection on sparse hypergraphs. 66-73 - Abhishek Sinha, Pradeepkumar Mani, Jie Liu, Ashley Flavel, David A. Maltz:
Distributed load management in anycast-based CDNs. 74-82 - Shanyu Zhou, Hulya Seferoglu:
Blocking avoidance in transportation systems. 83-90 - Andrés Ferragut, Fernando Paganini:
Queueing analysis of service deferrals for load management in power systems. 91-98 - Kangwook Lee, Ramtin Pedarsani, Kannan Ramchandran:
On scheduling redundant requests with cancellation overheads. 99-106 - Gauri Joshi, Emina Soljanin
, Gregory W. Wornell:
Efficient replication of queued tasks for latency reduction in cloud systems. 107-114 - Marc Vuffray
, Theodor Misiakiewicz:
Concentration to zero bit-error probability for regular LDPC codes on the binary symmetric channel: Proof by loop calculus. 115-124 - Santhosh Kumar, Avinash Vem, Krishna R. Narayanan, Henry D. Pfister
:
Spatially-coupled codes for write-once memories. 125-131 - Haewon Jeong, Pulkit Grover:
Energy-adaptive codes. 132-139 - Francisco Lázaro Blasco, Gianluigi Liva, Gerhard Bauch:
Inactivation decoding analysis for LT codes. 140-146 - Lele Wang, Young-Han Kim:
Linear code duality between channel coding and Slepian-Wolf coding. 147-152 - Harsha Honnappa:
Rare events of marked finite point processes. 153-159 - Oron Sabag, Haim H. Permuter
, Navin Kashyap:
The feedback capacity of the binary symmetric channel with a no-consecutive-ones input constraint. 160-164 - Chung-Han Hsieh
, B. Ross Barmish:
On Kelly betting: Some limitations. 165-172 - Xinyang Zhou
, Masoud Farivar
, Lijun Chen
:
Pseudo-gradient based local voltage control in distribution networks. 173-180 - Saeed Manaffam
, Alireza Seyedi, Azadeh Vosoughi, Tara Javidi
:
Bounded stability in networked systems with parameter mismatch and adaptive decentralized estimation. 181-186 - Gregory S. Ledva, Laura Balzano, Johanna L. Mathieu
:
Inferring the behavior of distributed energy resources with online learning. 187-194 - Maria Gabriela Martinez, Jialin Liu, Bowen Li, Johanna L. Mathieu
, C. Lindsay Anderson
:
Enabling renewable resource integration: The balance between robustness and flexibility. 195-202 - Subhonmesh Bose:
On the design of wholesale electricity markets under uncertainty. 203-210 - Sairaj V. Dhople, Swaroop S. Guggilam, Yu Christine Chen:
Linear approximations to AC power flow in rectangular coordinates. 211-217 - Dileep M. Kalathil, Ram Rajagopal:
Online learning for demand response. 218-222 - Jiale Hu, Lalitha Sankar, Darakhshan J. Mir:
Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs. 223-230 - Thomas Westerbäck, Ragnar Freij-Hollanti
, Camilla Hollanti:
Applications of polymatroid theory to distributed storage systems. 231-237 - Raphaël M. Jungers, Atreyee Kundu, W. P. M. H. Heemels
:
On observability in networked control systems with packet losses. 238-243 - Shreyas Sundaram, Bahman Gharesifard:
Consensus-based distributed optimization with malicious nodes. 244-249 - Wei Wang, Choon Yik Tang:
Distributed estimation of betweenness centrality. 250-257 - Bryan Van Scoy, Randy A. Freeman, Kevin M. Lynch:
Exploiting memory in dynamic average consensus. 258-265 - Kianoush Hosseini, Wei Yu, Raviraj S. Adve:
Optimizing large-scale MIMO cellular downlink: Multiplexing, diversity, or interference nulling? 266-270 - Peruru Subrahmanya Swamy
, Radha Krishna Ganti
, Krishna P. Jagannathan
:
Adaptive CSMA under the SINR model: Fast convergence through local gibbs optimization. 271-278 - Toshiyuki Tanaka, K. Shashi Prabh:
Mean-field hard-core model of interference in ad-hoc wireless networks. 279-285 - Tanumay Datta, Sheng Yang:
Improving MIMO detection performance in presence of phase noise using norm difference criterion. 286-292 - Jeffrey Wildman, Yusuf Osmanlioglu
, Steven Weber, Ali Shokoufandeh:
A primal-dual approach to delay minimizing user association in cellular networks. 293-300 - Mehdi Ashraphijuo, Vaneet Aggarwal
, Xiaodong Wang:
Energy harvesting communication using limited battery with efficiency. 301-306 - Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel. 307-314 - Joyson Sebastian, Can Karakus, Suhas N. Diggavi, I-Hsiang Wang:
Rate splitting is approximately optimal for fading Gaussian interference channels. 315-321 - Sunghyun Kim, Changho Suh
:
Degrees of freedom of bursty multiple access channels with a relay. 322-328 - Qianrui Li, Paul de Kerret, David Gesbert
, Nicolas Gresset:
Robust regularized ZF in decentralized Broadcast Channel with correlated CSI noise. 329-336 - Weina Wang, Matthew Barnard, Lei Ying:
Decentralized scheduling with data locality for data-parallel computation on peer-to-peer networks. 337-344 - Javad Ghaderi:
Simple high-performance algorithms for scheduling jobs in the cloud. 345-352 - Mathieu Dahan
, Saurabh Amin:
Network flow routing under strategic link disruptions. 353-360 - Braden Soper, John Musacchio:
A non-zero-sum, sequential detection game. 361-371 - Mikael Touati, Rachid El Azouzi
, Marceau Coupechoux, Eitan Altman, Jean Marc Kelif:
Controlled matching game for user association and resource allocation in multi-rate WLANs? 372-380 - Bernard C. Lesieutre, Dan Wu:
An efficient method to locate all the load flow solutions - revisited. 381-388 - Zhe Yu, Yunjian Xu, Lang Tong:
Large scale charging of electric vehicles: A multi-armed bandit approach. 389-395 - Dariush Fooladivanda, Joshua A. Taylor:
Dispatching thermal power plants under water constraints. 396-401 - Saverio Bolognani, Florian Dörfler
:
Fast power system analysis via implicit linearization of the power flow manifold. 402-409 - Christos Thrampoulidis, Ehsan Abbasi, Babak Hassibi:
Precise high-dimensional error analysis of regularized M-estimators. 410-417 - Jie Ding, Mohammad Noshad, Vahid Tarokh:
Data-driven learning of the number of states in multi-state autoregressive models. 418-425 - Georg Pichler
, Pablo Piantanida, Gerald Matz:
Distributed information-theoretic biclustering of two memoryless sources. 426-433 - Ganesh Ajjanagadde, Yury Polyanskiy:
Adder MAC and estimates for Rényi entropy. 434-441 - Sivaramakrishnan Natarajan Ramamoorthy, Makrand Sinha:
On the communication complexity of greater-than. 442-444 - Yaoqing Yang, Pulkit Grover, Soummya Kar
:
Information dissipation in noiseless lossy in-network function computation. 445-452 - Steffen Limmer, Jafar Mohammadi, Slawomir Stanczak:
A simple algorithm for approximation by nomographic functions. 453-458 - Siddharth Pal, Richard J. La:
Simple learning in weakly acyclic games and convergence to Nash equilibria. 459-466 - Abhinav Sinha, Achilleas Anastasopoulos:
Mechanism design for fair allocation. 467-473 - Weina Wang, Lei Ying, Junshan Zhang:
A game-theoretic approach to quality control for collecting privacy-preserving data. 474-479 - Syrine Krichene, Walid Krichene, Roy Dong, Alexandre M. Bayen:
Convergence of heterogeneous distributed learning in stochastic routing games. 480-487 - Francisco F. C. Rego
, Ye Pu, Andrea Alessandretti
, A. Pedro Aguiar
, Colin N. Jones:
A consensus algorithm for networks with process noise and quantization error. 488-495 - Anoosheh Heidarzadeh, Alex Sprintson:
Cooperative data exchange with unreliable clients. 496-503 - Amir Salimi, Muriel Médard, Shuguang Cui:
On the representability of integer polymatroids: Applications in linear code construction. 504-508 - Liyasi Wu:
Revisiting the multiplicity codes: A new class of high-rate locally correctable codes. 509-513 - Youlong Wu:
Coding schemes for discrete memoryless multicast networks with and without feedback. 514-521 - Jing Guo, Jossy Sayir, Minghai Qin, Albert Guillen i Fabregas:
An alternative proof of channel polarization for channels with arbitrary input alphabets. 522-529 - Xiaohu Wu, Patrick Loiseau:
Algorithms for scheduling deadline-sensitive malleable tasks. 530-537 - Gopal Krishna Kamath, Krishna P. Jagannathan
, Gaurav Raina
:
Car-following models with delayed feedback: Local stability and Hopf bifurcation. 538-545 - Aftab Ahmed, Erik I. Verriest:
Design of linear & nonlinear observers for a turning process with implicit State-Dependent Delay. 546-551 - Rahul Singh, Panganamala Ramana Kumar, Le Xie
:
The ISO problem: Decentralized stochastic control via bidding schemes. 552-559 - Milos Cvetkovic, Marija D. Ilic:
Interaction variables for distributed numerical integration of nonlinear power system dynamics. 560-566 - Naci Saldi
, Serdar Yüksel, Tamás Linder:
Finite-state approximations to constrained Markov decision processes with Borel spaces. 567-572 - Andrey Gushchin, Anwar Walid, Ao Tang:
Enabling service function chaining through routing optimization in software defined networks. 573-581 - Bahar Partov, Douglas J. Leith
:
Utility fair RAT selection in multi-homed LTE/802.11 networks. 582-589 - Radoslav Ivanov, Nikolay Atanasov, Miroslav Pajic
, George J. Pappas
, Insup Lee:
Robust estimation using context-aware filtering. 590-597 - Shahin Shahrampour, Alexander Rakhlin, Ali Jadbabaie:
Finite-time analysis of the distributed detection problem. 598-603 - Pavankumar Tallapragada, Massimo Franceschetti, Jorge Cortés
:
Event-triggered stabilization of linear systems under channel blackouts. 604-611 - Ramtin Pedarsani, Kangwook Lee, Kannan Ramchandran:
Sparse covariance estimation based on sparse-graph codes. 612-619 - Yanina Y. Shkel
, Vincent Y. F. Tan, Stark C. Draper
:
Second-order coding rate for m-class source-channel codes. 620-626 - Sudeep Kamath:
Reverse hypercontractivity using information measures. 627-633 - Yunshu Liu, John MacLaren Walsh:
Non-isomorphic distribution supports for calculating entropic vectors. 634-641 - Yucel Altug, H. Vincent Poor, Sergio Verdú:
Variable-length channel codes with probabilistic delay guarantees. 642-649 - Ali Mousavi, Richard G. Baraniuk:
An information-theoretic measure of dependency among variables in large datasets. 650-657 - Fanny Yang, Sivaraman Balakrishnan, Martin J. Wainwright
:
Statistical and computational guarantees for the Baum-Welch algorithm. 658-665 - Shuchin Aeron, Eric Kernfeld:
Group-invariant Subspace Clustering. 666-671 - Praveen Venkatesh
, Pulkit Grover:
Is the direction of greater Granger causal influence the same as the direction of information flow? 672-679 - Thibault Lesieur, Florent Krzakala
, Lenka Zdeborová:
MMSE of probabilistic low-rank matrix estimation: Universality with respect to the output channel. 680-687 - Weiran Wang, Raman Arora, Karen Livescu, Nathan Srebro:
Stochastic optimization for deep CCA via nonlinear orthogonal iterations. 688-695 - Antonia Wachter-Zeh, Eitan Yaakobi:
Masking trapped charge in flash memories. 696-703 - Minghai Qin, Robert Mateescu, Cyril Guyot, Zvonimir Bandic:
Balanced codes for data retention of multi-level flash memories with fast page read. 704-711 - Qing Li, Huan Chang, Anxiao Jiang, Erich F. Haratsch:
Joint decoding of content-replication codes for flash memories. 712-719 - Qing Li, Anxiao Jiang:
Polar codes for Secure Write-Efficient Memories. 720-727 - Majid Khabbazian:
Near-optimal multi-version codes. 728-732 - Yuanzhang Xiao, Chaithanya Bandi
, Ermin Wei:
Efficiency of supply function equilibrium in networked markets. 733-735 - Desmond W. H. Cai, Enrique Mallada
, Adam Wierman:
Distributed optimization decomposition for joint economic dispatch and frequency regulation. 736 - Sanmay Das, Emir Kamenica:
Representations of information structures. 737-743 - Chang Liu, Yuanzhang Xiao, Ermin Wei, Randall A. Berry
:
Investment and competition with positive externalities in open networks. 744-746 - Hoi-To Wai, Anna Scaglione
, Amir Leshem
:
Identifying trust in social networks with stubborn agents, with application to market decisions. 747-754 - Giacomo Como
, Enrico Lovisari, Ketan Savla:
Convex formulations of dynamic network traffic assignment for control of freeway networks. 755-762 - Yu Wu, Matthew Barnard, Lei Ying:
Architecture and implementation of an information-centric device-to-device network. 763-771 - Sadra Sadraddini
, Calin Belta:
Robust temporal logic model predictive control. 772-779 - Huanyu Ding, David A. Castañón:
Optimal multi-vehicle adaptive search with entropy objectives. 780-785 - Jayakrishnan Unnikrishnan
, Saeid Haghighatshoar, Martin Vetterli:
Unlabeled sensing: Solving a linear system with unordered measurements. 786-793 - V. Sriram Siddhardh Nadendla
, Sijia Liu, Pramod K. Varshney:
Design of transmit-diversity schemes in detection networks under secrecy constraints. 794-801 - Mostafa Rahmani, George K. Atia:
A decentralized approach to robust subspace recovery. 802-807 - Javad Heydari, Ali Tajer, H. Vincent Poor:
Quickest detection of Gauss-Markov random fields. 808-814 - Bingwen Zhang, Jun Geng, Lifeng Lai:
Change-point estimation in high dimensional linear regression models via sparse group Lasso. 815-821 - George V. Moustakides:
Optimum Shewhart tests for Markovian data. 822-826 - Yang Cao, Yao Xie:
Multi-sensor gradual change detection. 827-834 - V. Lalitha, Satyanarayana V. Lokam:
Weight enumerators and higher support weights of maximally recoverable codes. 835-842 - Fatemeh Arbabjolfaei, Young-Han Kim:
Three stories on a two-sided coin: Index coding, locally recoverable distributed storage, and guessing games on graphs. 843-850 - Vitaly Abdrashitov, Muriel Médard:
Durable network coded distributed storage. 851-856 - Ebrahim MolavianJazi, Aylin Yener:
Subset source coding. 857-864 - Mehran Elyasi, Soheil Mohajer:
A probabilistic approach towards exact-repair regeneration codes. 865-872 - Minh Tuan Nguyen, Hung M. La, Keith A. Teague:
Compressive and collaborative mobile sensing for scalar field mapping in robotic networks. 873-880 - Jun Zhao
:
The absence of isolated node in geometric random graphs. 881-886 - Jun Zhao
:
On the resilience to node capture attacks of secure wireless sensor networks. 887-893 - Ron Yadgar, Asaf Cohen, Omer Gurewitz:
Scaling laws for reliable data dissemination in shared loss multicast trees. 894-900 - Pulkit Grover, Jeffrey A. Weldon, Shawn K. Kelly, Praveen Venkatesh
, Haewon Jeong:
An information theoretic technique for harnessing attenuation of high spatial frequencies to design ultra-high-density EEG. 901-908 - Reza Shokri, Vitaly Shmatikov:
Privacy-preserving deep learning. 909-910 - Bahman Moraffah, Lalitha Sankar:
Information-theoretic private interactive mechanism. 911-918