default search action
58th Allerton Conference 2022: Monticello, IL, USA
- 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022, Monticello, IL, USA, September 27-30, 2022. IEEE 2022, ISBN 979-8-3503-9998-1
- Yigit E. Bayiz, Ufuk Topcu:
Decentralized Online Influence Maximization. 1-8 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:
Uncertainty in Biometric Identification and Authentication Systems with Strong Secrecy. 1-6 - Jean-Baptiste Seby, Charles Harvey, Saurabh Amin:
Equilibrium analysis of game on heterogeneous networks with coupled activities. 1-8 - Alejandro Lancho, Alexander Fengler, Yury Polyanskiy:
Finite-Blocklength Results for the A-channel: Applications to Unsourced Random Access and Group Testing. 1-8 - Diego R. Benalcázar, Chinwendu Enyioha:
Distributed Consensus-based Kalman Filter under Limited Communication. 1-7 - Purbesh Mitra, Sennur Ulukus:
ASUMAN: Age Sense Updating Multiple Access in Networks. 1-7 - Tong Wu, Anna Scaglione, Daniel B. Arnold:
Reinforcement Learning using Physics Inspired Graph Convolutional Neural Networks. 1-8 - Teng Guo, Si Wei Feng, Mario Szegedy, Jingjin Yu:
Rubik Tables, Stack Rearrangement, and Multi-Robot Path Planning. 1-4 - Francisco Pernice:
On the Symmetries of the Deletion Channel. 1-6 - Sajjad Bahrami, Ertem Tuncel:
Trimmed Minimum Error Entropy for Robust Online Regression. 1-8 - Ivan Perez Avellaneda, Luis A. Duffaut Espinosa:
Reachability of Chen-Fliess series: A Gradient Descent Approach*. 1-7 - Diyu Yang, Craig A. J. Kemp, Gregery T. Buzzard, Charles A. Bouman:
Multi-Pose Fusion for Sparse-View CT Reconstruction Using Consensus Equilibrium. 1-5 - Bai Liu, Eytan H. Modiano:
Universal Policy Tracking: Scheduling for Wireless Networks with Delayed State Observation. 1-8 - Mustafa O. Karabag, David Fridovich-Keil, Ufuk Topcu:
Alternating Direction Method of Multipliers for Decomposable Saddle-Point Problems. 1-8 - Yulan Zhang, Anna C. Gilbert, Stefan Steinerberger:
May the force be with you. 1-8 - Sunho Jang, Necmiye Ozay, Johanna L. Mathieu:
Data-driven estimation of probabilistic constraints for network-safe distributed energy resource control. 1-8 - Amaury Gouverneur, Borja Rodríguez Gálvez, Tobias J. Oechtering, Mikael Skoglund:
An Information-Theoretic Analysis of Bayesian Reinforcement Learning. 1-7 - Abhinanda Dutta, Steven Weber:
Throughput Optimized Random Access Channel Assignment. 1-8 - Anand Kalvit, Assaf Zeevi:
Bandits with Dynamic Arm-acquisition Costs*. 1-7 - Zhanhong Jiang, Aditya Balu, Xian Yeow Lee, Young M. Lee, Chinmay Hegde, Soumik Sarkar:
Distributed Online Non-convex Optimization with Composite Regret. 1-8 - Shachar Shayovitz, Meir Feder:
Active Learning for Individual Data via Minimal Stochastic Complexity. 1-5 - Xing Gao, Lev Reyzin:
An Interactive Search Game with Two Agents. 1-8 - Adel Aghajan, Keith Paarporn, Jason R. Marden:
Managing Resources in Multi-resource General Lotto Games. 1-2 - Huanran Li, Daniel L. Pimentel-Alarcón:
Minimum-Length Trace Reconstruction via Integer Programming. 1-8 - Xinyi Tong, Xiangxiang Xu, Shao-Lun Huang:
On Sample Complexity of Learning Shared Representations: The Asymptotic Regime. 1-8 - Adam Case, Jack H. Lutz:
Finite-State Mutual Dimension. 1-8 - Pradeep Kr. Banerjee, Kedar Karhadkar, Yuguang Wang, Uri Alon, Guido Montúfar:
Oversquashing in GNNs through the lens of information contraction and graph expansion. 1-8 - Meng-Che Chang, Shi-Yuan Wang, Matthieu R. Bloch:
Controlled Sensing with Corrupted Commands. 1-7 - Tushar Shankar Walunj, Shiksha Singhal, Veeraruna Kavitha, Jayakrishnan Nair:
Pricing, competition and market segmentation in ride hailing. 1-8 - Lihui Yi, Ermin Wei:
The Effects of Varying Charging Rates on Optimal Charging Station Choices for Electric Vehicles. 1-5 - Randy A. Freeman:
Proximal Methods for Self-Healing and Exact Distributed Convex Optimization Extended abstract. 1-7 - Xinyi Ni, Lifeng Lai:
Policy Gradient Based Entropic-VaR Optimization in Risk-Sensitive Reinforcement Learning. 1-6 - Caio Kalil Lauand, Sean P. Meyn:
Bias in Stochastic Approximation Cannot Be Eliminated With Averaging. 1-4 - Dominic Groß:
Compensating Network Dynamics in Grid-Forming Control. 1-8 - Pouria Tooranjipour, Bahare Kiumarsi, Hamidreza Modares:
Risk-Aware Safe Optimal Control of Uncertain Linear Systems. 1-5 - Ningze Wang, Anoosheh Heidarzadeh, Alex Sprintson:
Multi-Message Private Information Retrieval: A Scalar Linear Solution. 1-8 - Peizhong Ju, Xiaojun Lin, Ness B. Shroff:
Understanding the Generalization Power of Overfitted NTK Models: 3-layer vs. 2-layer (Extended Abstract). 1-2 - Abdulkadir Canatar, Cengiz Pehlevan:
A Kernel Analysis of Feature Learning in Deep Neural Networks. 1-8 - Xinyu Wu, Dan Wu, Eytan H. Modiano:
Queueing Delay Minimization in Overloaded Networks via Rate Control. 1-8 - Carmel Fiscko, Soummya Kar, Bruno Sinopoli:
Identifying Impactful Agents Via Faux Adversarial Games. 1-7 - Bernard C. Lesieutre, Yasmine Abdennadher, Sandip Roy:
Model-Enhanced Localization of Forced Oscillation Using PMU Data. 1-8 - Itamar Katz, Yuval Kochman:
Optimal Discrimination Between Two Pure States and Dolinar-Type Coherent-State Detection. 1 - Yuyang Shi, Yajun Mei:
Efficient Sequential UCB-based Hungarian Algorithm for Assignment Problems. 1-8 - Rui Zhang, Yao Xie, Rui Yao, Feng Qiu:
Online Detection of Cascading Change-Points Using Diffusion Networks. 1-6 - Cong Chen, Lang Tong:
Wholesale Market Participation of Storage with State-of-Charge Dependent Bids. 1-8 - Kenneth Palacio-Baus, Natasha Devroye:
An Error Exponent for the AWGN Channel with Decision Feedback and Lattice Coding. 1-6 - Philip N. Brown, Brandon C. Collins, Colton Hill, Gia Barboza, Lisa Hines:
Individual Altruism Cannot Overcome Congestion Effects in a Global Pandemic Game. 1-6 - Jayanth Regatti, Hao Chen, Abhishek Gupta:
Byzantine Resilience With Reputation Scores. 1-8 - Neophytos Charalambides, Mert Pilanci, Alfred O. Hero III:
Secure Linear MDS Coded Matrix Inversion. 1-8 - Harsh Dolhare, Vivek S. Borkar:
A Concentration Bound for Distributed Stochastic Approximation. 1-6 - Rohan Deb, Meet Gandhi, Shalabh Bhatnagar:
Schedule Based Temporal Difference Algorithms. 1-6 - Xiaochun Niu, Ermin Wei:
GRAND: A Gradient-Related Ascent and Descent Algorithmic Framework for Minimax Problems. 1-2 - Zixian Yang, Xin Liu, Lei Ying:
Exploration. Exploitation, and Engagement in Multi-Armed Bandits with Abandonment. 1-2 - Sijia Geng, Ian A. Hiskens:
Dynamic Performance of Unified Grid-Forming/Following Inverter Control. 1-8 - W. Steven Gray:
System Identification Entropy for Chen-Fliess Series and Their Interconnections. 1-6 - Josiah Park, Carlos Saltijeral, Ming Zhong:
Grassmannian packings: Trust-region stochastic tuning for matrix incoherence. 1-6 - Nicolaos E. Manitara, Christoforos N. Hadjicostis, Themistoklis Charalambous:
Synchronized Stop and Re-Start in Distributed Average Consensus for Control and Coordination Applications. 1-7 - Shuche Wang, Yuanyuan Tang, Ryan Gabrys, Farzad Farnoud:
Permutation Codes for Correcting a Burst of at Most $t$ Deletions. 1-6 - Adrian Redder, Arunselvan Ramaswamy, Holger Karl:
Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong Law. 1-8 - Paul Sheldon, Besma Smida, Natasha Devroye, Daniela Tuninetti:
Achievable Rate Regions for the Gaussian Broadcast Channel with Fixed Blocklength and Per User Reliability. 1-6 - Dror Chawin, Ishay Haviv:
Hardness of Linear Index Coding on Perturbed Instances. 1-7 - Nathan Dahlin, Kevin Chang, Krishna Chaitanya Kalagarla, Rahul Jain, Pierluigi Nuzzo:
Practical Control Design for the Deep Learning Age: Distillation of Deep RL-Based Controllers. 1-8 - Krishna Gopal Benerjee, Adrish Banerjee:
Bounds on Reversible, Complement, Reversible-Complement, Constant Weight Sum Codes. 1-8 - Xiangxiang Xu, Lizhong Zheng:
Multivariate Feature Extraction. 1-8 - Jonathan Ponniah:
On the Limits of Distributed Agreement between Correlated Sources. 1-7 - Yang Hu, Adam Wierman, Guannan Qu:
On the Sample Complexity of Stabilizing LTI Systems on a Single Trajectory (Extended Abstract). 1-2 - Gokcan Tatli, Robert D. Nowak, Ramya Korlakai Vinayak:
Learning Preference Distributions From Distance Measurements. 1-8 - Rémi A. Chou, Matthieu R. Bloch:
Commitment over Multiple-Access Channels. 1-6 - Yili Zhang, Asaf Cohen, Vijay G. Subramanian:
Learning-based Optimal Admission Control in a Single Server Queuing System. 1-2 - Tim Brucks, Taposh Banerjee, Rahul Mishra:
Quickest Detection of a Threat to an Impending Disaster. 1-7 - Yunhan Huang, Tao Zhang, Quanyan Zhu:
The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash? 1-7 - Mohammad Taha Toghani, César A. Uribe:
Unbounded Gradients in Federated Learning with Buffered Asynchronous Aggregation. 1-8 - Fatemeh Kazemi, Ningze Wang, Rafael G. L. D'Oliveira, Alex Sprintson:
Degree Tables for Private Information Retrieval. 1-8 - Keerthana Gurushankar, Praveen Venkatesh, Pulkit Grover:
Extracting Unique Information Through Markov Relations. 1-6 - Simina Brânzei, Erel Segal-Halevi, Aviv Zohar:
How to Charge Lightning: The Economics of Bitcoin Transaction Channels. 1-8 - Jialing Liao, Zheng Chen, Erik G. Larsson:
Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations. 1-8 - Mano Vikash Janardhanan, Lev Reyzin:
On Learning a Hidden Directed Graph with Path Queries. 1-5 - Manish Kumar Singh, D. Venkatramanan, Sairaj V. Dhople:
Towards Optimal Primary- and Secondary-control Design for Networks with Generators and Inverters. 1-6 - Junghoon Kim, Seyyedali Hosseinalipour, Taejoon Kim, David J. Love, Christopher G. Brinton:
Linear Coding for Gaussian Two-Way Channels. 1-8 - Abhijeet Mulgund, Raj Shekhar, Natasha Devroye, György Turán, Milos Zefran:
Evaluating interpretations of deep-learned error-correcting codes. 1-8 - Po-han Li, Ufuk Topcu, Sandeep P. Chinchali:
Adversarial Examples for Model-Based Control: A Sensitivity Analysis. 1-7 - Michael J. Neely:
Repeated Games, Optimal Channel Capture, and Open Problems for Slotted Multiple Access. 1-8 - Cornelia Ott, Hedongliang Liu, Antonia Wachter-Zeh:
Covering Properties of Sum-Rank Metric Codes. 1-7 - Bryce L. Ferguson, Daigo Shishika, Jason R. Marden:
Ensuring the Defense of Paths and Perimeters in Dynamic Defender-Attacker Blotto Games (dDAB) on Graphs. 1-7 - Hadar Szostak, Kobi Cohen:
Decentralized Anomaly Detection via Deep Multi-Agent Reinforcement Learning. 1-4 - Iyanuoluwa Emiola, Chinwendu Enyioha:
Q-linear Convergence of Distributed Optimization with Barzilai-Borwein Step Sizes. 1-8 - Ben A. Kizaric, Daniel L. Pimentel-Alarcón:
Classifying Incomplete Data with a Mixture of Subspace Experts. 1-8 - Tomer Gafni, Kobi Cohen, Yonina C. Eldar:
CoBAAF: Controlled Bayesian Air Aggregation Federated Learning from Heterogeneous Data. 1-4 - Vikram Krishnamurthy, Luke Snow:
Quickest Change Detection using Time Inconsistent Anticipatory and Quantum Decision Modeling. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.