default search action
56th Allerton Conference 2018: Monticello, IL, USA
- 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018, Monticello, IL, USA, October 2-5, 2018. IEEE 2018, ISBN 978-1-5386-6596-1
- Muni Sreenivas Pydi, Varun S. Jog, Po-Ling Loh:
Graph-Based Ascent Algorithms for Function Maximization. 1-8 - James Melbourne:
Rearrangements and information theoretic inequalities. 9-15 - Leighton Pate Barnes, Yanjun Han, Ayfer Özgür:
A Geometric Characterization of Fisher Information from Quantized Samples with Applications to Distributed Statistical Estimation. 16-23 - Parinaz Farajiparvar, Ahmad Beirami, Matthew S. Nokleby:
Information Bottleneck Methods for Distributed Learning. 24-31 - Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost, Johannes Rauh:
Unique Informations and Deficiencies. 32-38 - Islam El Bakoury, Bobak Nazer:
Uplink-Downlink Duality For Integer-Forcing in Cloud Radio Access Networks. 39-47 - Abhishek K. Gupta, Balsam Dakhil, Rahul Jain:
Dynamic Economic Dispatch and Price Evolution under Ramping Constraints and Uncertain Demand. 48-55 - Shuvomoy Das Gupta:
On Convergence of Heuristics Based on Douglas-Rachford Splitting and ADMM to Minimize Convex Functions over Nonconvex Sets†. 56-63 - Ehsan Kazemi, Liqiang Wang:
A Proximal Zeroth-Order Algorithm for Nonconvex Nonsmooth Problems. 64-71 - Shelby Heinecke, Will Perkins, Lev Reyzin:
On the Resilience of Bipartite Networks. 72-77 - Ahmed H. Anwar, George K. Atia, Mina Guirguis:
Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework. 78-83 - Syed Eqbal Alam, Robert Shorten, Fabian Wirth, Jia Yuan Yu:
Derandomized Distributed Multi-resource Allocation with Little Communication Overhead. 84-91 - Yixian Zhu, Ketan Savla:
On the Stability of Optimal Bayesian Persuasion Strategy under a Mistrust Dynamics in Routing Games. 92-99 - Eric Jacopin:
Statistical Planning: Building Models of Entropy of Centralized Planning for Multi-Agent Systems. 100-109 - Curtis McDonald, Serdar Yüksel:
Stability of Non-Linear Filters, Observability and Relative Entropy. 110-114 - Mohamadreza Ahmadi, Murat Cubuktepe, Nils Jansen, Ufuk Topcu:
Verification of Uncertain POMDPs Using Barrier Certificates. 115-122 - Hao Li, Hua Chen, Wei Zhang:
On Model-free Reinforcement Learning for Switched Linear Systems: A Subspace Clustering Approach. 123-130 - Mangal Prakash, Saurav Talukdar, Sandeep Attree, Sourav Patel, Murti V. Salapaka:
Distributed Stopping Criterion for Ratio Consensus. 131-135 - Sandeep Menta, Adrian Hauswirth, Saverio Bolognani, Gabriela Hug, Florian Dörfler:
Stability of Dynamic Feedback optimization with Applications to Power Systems. 136-143 - Ziv Scully, Mor Harchol-Balter:
SOAP Bubbles: Robust Scheduling Under Adversarial Noise. 144-154 - Richard Combes, Stefan Magureanu, Alexandre Proutière:
Generic Asymptotically Optimal Algorithms for Multi-Armed Bandits. 152 - Subhashini Krishnasamy, Ari Arapostathis, Ramesh Johari, Sanjay Shakkottai:
On Learning the cμ Rule in Single and Parallel Server Networks. 153-154 - Il Yong Chun, Hongki Lim, Zhengyu Huang, Jeffrey A. Fessler:
Fast and convergent iterative image recovery using trained convolutional neural networks. 155-159 - Saiprasad Ravishankar, Brendt Wohlberg:
Learning Multi-Layer Transform Models. 160-165 - Chinmay Hegde:
Algorithmic Aspects of Inverse Problems Using Generative Models. 166-172 - Su Li, Michael Gastpar:
Single-server Multi-message Private Information Retrieval with Side Information. 173-179 - Anoosheh Heidarzadeh, Brenden Garcia, Swanand Kadhe, Salim Y. El Rouayheb, Alex Sprintson:
On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information. 180-187 - Huseyin A. Inan, Peter Kairouz, Mary Wootters, Ayfer Özgür:
On the Optimality of the Kautz-Singleton Construction in Probabilistic Group Testing. 188-195 - Farzin Haddadpour, Yaoqing Yang, Viveck R. Cadambe, Pulkit Grover:
Cross-Iteration Coded Computing. 196-203 - Alankrita Bhatt, Jiun-Ting Huang, Young-Han Kim, J. Jon Ryu, Pinar Sen:
Monte Carlo Methods for Randomized Likelihood Decoding. 204-211 - Mira Gonen, Michael Langberg, Alex Sprintson:
Latency and Alphabet Size in the Context of Multicast Network Coding. 212-218 - Ruochi Zhang, Parv Venkitasubramaniam:
Optimal Multi-Source Inference Privacy - A Generalized Lloyd-Max Algorithm. 219-226 - Yanbing Mao, Emrah Akyol:
Detectability of Cooperative Zero-Dynamics Attack. 227-234 - Jezdimir Milosevic, Henrik Sandberg, Karl Henrik Johansson:
A Security Index for Actuators Based on Perfect Undetectability: Properties and Approximation. 235-241 - Nirupam Gupta, Nikhil Chopra:
Model-Based Encryption: Privacy of States in Networked Control Systems. 242-248 - Anna C. Gilbert, Audra McMillan:
Property Testing For Differential Privacy. 249-258 - Cheuk Ting Li, Venkat Anantharam:
One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information. 259-266 - Omid Javidbakht, Parv Venkitasubramaniam, Alberto J. Lamadrid:
Coupon Targeting Competition in Privacy Sensitive Market. 267-274 - Mohamadreza Ahmadi, Suda Bharadwaj, Takashi Tanaka, Ufuk Topcu:
Stochastic Games with Sensing Costs. 275-282 - Takashi Tanaka, Ehsan Nekouei, Karl Henrik Johansson:
Linearly Solvable Mean-Field Road Traffic Games. 283-289 - Jiacheng Tang, Abhishek Gupta:
Communication Link Elimination in Static LQG Teams. 290-296 - Matija Bucic, Melkior Ornik, Ufuk Topcu:
Graph-Based Controller Synthesis for Safety-Constrained, Resilient Systems. 297-304 - Urvashi Oswal, Robert D. Nowak:
Scalable Sparse Subspace Clustering via Ordered Weighted l1 Regression. 305-312 - Anna C. Gilbert, Rishi Sonthalia:
Unsupervised Metric Learning in Presence of Missing Data. 313-321 - Puning Zhao, Lifeng Lai:
Analysis of KNN Information Estimators for Smooth Distributions. 322-327 - Prashant Khanduri, Dominique Pastor, Vinod Sharma, Pramod K. Varshney:
On Random Distortion Testing Based Sequential Non-Parametric Hypothesis Testing*. 328-334 - Mohit Sinha, Florian Dörfler, Brian B. Johnson, Sairaj V. Dhople:
Stabilizing Phase-balanced or Phase-synchronized Trajectories of Van der Pol Oscillators in Uniform Electrical Networks. 335-340 - Ye Guo, Lang Tong:
Pricing Multi-period Dispatch Under Uncertainty. 341-345 - Josh A. Taylor, Richard Perryman, Aimy Bazylak, Bryan Karney:
Safely landing water networks during power outages with energy storage. 346-350 - Nathaniel Tucker, Mahnoosh Alizadeh:
Online Pricing Mechanisms for Electric Vehicle Management at Workplace Charging Facilities. 351-358 - Amir Daneshmand, Gesualdo Scutari, Vyacheslav Kungurtsev:
Second-order Guarantees of Gradient Algorithms over Networks. 359-365 - Willie K. Harrison, Matthieu R. Bloch:
On Dual Relationships of Secrecy Codes. 366-372 - Ian T. Cummings, Timothy J. Schulz, Jonathan P. Doane, Seyed A. (Reza) Zekavat, Timothy C. Havens:
Information-Theoretic Optimization of Full-Duplex Communication between Digital Phased Arrays. 373-377 - Melih Bastopcu, Sennur Ulukus:
Age of Information with Soft Updates. 378-385 - Igbafe Orikumhi, Jeongwan Kang, Chansik Park, Jinmo Yang, Sunwoo Kim:
Location-Aware Coordinated Beam Alignment in mmWave Communication. 386-390 - Shahram Shahsavari, Farhad Shirani, Elza Erkip:
Opportunistic Temporal Fair Scheduling for Non-Orthogonal Multiple Access. 391-398 - Matthew Andrews, Lisa Zhang:
Structure of Utility Optimization in Regular and Irregular Wireless Scenarios. 399-406 - Muddassar Hussain, Nicolò Michelusi:
Coded Energy-Efficient Beam-Alignment for Millimeter-Wave Networks. 407-412 - Vignesh Subramanian, Laura Brink, Nikunj Jain, Kailas Vodrahalli, Akhil Jalan, Nikhil Shinde, Anant Sahai:
Some new numeric results concerning the Witsenhausen Counterexample. 413-420 - Victoria Kostina, Babak Hassibi:
Rate-cost tradeoffs in scalar LQG control and tracking with side information. 421-428 - Guosong Yang, João Pedro Hespanha:
On topological entropy of switched linear systems with pairwise commuting matrices. 429-436 - Amirata Ghorbani, James Y. Zou:
Embedding for Informative Missingness: Deep Learning With Incomplete Data. 437-445 - Jing Xu, Jakub Marecek:
Parameter Estimation in Gaussian Mixture Models with Malicious Noise, without Balanced Mixing Coefficients. 446-453 - Avishek Ghosh, Kannan Ramchandran:
Online Scoring with Delayed Information: A Convex Optimization Viewpoint. 454-461 - Salar Fattahi, Somayeh Sojoudi:
Data-Driven Sparse System Identification. 462-469 - Abubakar Abid, James Y. Zou:
A Stochastic Expectation-Maximization Approach to Shuffled Linear Regression. 470-477 - Ruishan Liu, James Zou:
The Effects of Memory Replay in Reinforcement Learning. 478-485 - Reza Rezaie, X. Rong Li:
Trajectory Modeling and Prediction with Waypoint Information Using a Conditionally Markov Sequence. 486-493 - Thomas Bonald, Alexandre Hollocou, Marc Lelarge:
Weighted Spectral Embedding of Graphs. 494-501 - Mehrdad Moharrami, Vijay G. Subramanian, Mingyan Liu, R. Sundaresan:
Local Weak Convergence Based Analysis of a New Graph Model. 502-503 - Vivek S. Borkar, Sarath Pattathil:
Concentration bounds for two time scale stochastic approximation. 504-511 - Pierre Escamilla, Abdellatif Zaidi, Michèle A. Wigger:
Distributed Hypothesis Testing with Collaborative Detection. 512-518 - Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong Coordination over Noisy Channels with Strictly Causal Encoding. 519-526 - Oron Sabag, Haim H. Permuter:
An Achievable Rate Region for the Two-Way Channel with Common Output. 527-531 - Maël Le Treust, Tobias J. Oechtering:
Optimal Control Designs for Vector-valued Witsenhausen Counterexample Setups. 532-537 - Albrecht Wolf, Diana Cristina González, Meik Dorpinghaus, José Cândido Silveira Santos Filho, Gerhard P. Fettweis:
On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers. 538-542 - Ye Tian, Ying Sun, Gesualdo Scutari:
ASY-SONATA: Achieving Linear Convergence in Distributed Asynchronous Multiagent Optimization. 543-551 - Nuwan S. Ferdinand, Stark C. Draper:
Anytime Stochastic Gradient Descent: A Time to Hear from all the Workers. 552-559 - Amir Behrouzi-Far, Emina Soljanin:
On the Effect of Task-to-Worker Assignment in Distributed Computing Systems with Stragglers. 560-566 - Thinh T. Doan, Siva Theja Maguluri, Justin Romberg:
On the Convergence of Distributed Subgradient Methods under Quantization. 567-574 - Juntao Chen, Quanyan Zhu:
A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information. 575-582 - Brendan Badia, Randall Berry, Ermin Wei:
Price and Capacity Competition for EV parking with Government Mandates. 583-589 - Hao Ge, Randall A. Berry:
Quantized Dominant Strategy Mechanisms with Constrained Marginal Valuations. 590-595 - Julia Lindberg, Alisha Zachariah, Nigel Boston, Bernard C. Lesieutre:
The Geometry of Real Solutions to the Power Flow Equations. 596-603 - Damon Wischik:
The price of choice: models, paradoxes, and inference for 'mobility as a service'. 604-610 - Devavrat Shah, Sai Burle, Vishal Doshi, Ying-zong Huang, Balaji Rengarajan:
Prediction Query Language. 611-616 - Rakshith Sharma Srinivasa, Mark A. Davenport, Justin Romberg:
Localized random projections with applications to coherent array imaging. 617-623 - Christos Thrampoulidis, Ankit Singh Rawat:
The Generalized Lasso for Sub-gaussian Observations with Dithered Quantization. 624-631 - Ingo Roth, Axel Flinth, Richard Kueng, Jens Eisert, Gerhard Wunder:
Hierarchical restricted isometry property for Kronecker product measurements. 632-638 - Hye Won Chung, Ji Oon Lee, Doyeon Kim, Alfred O. Hero III:
Trade-offs Between Query Difficulty and Sample Complexity in Crowdsourced Data Acquisition. 639-646 - Guangyang Zeng, Junfeng Wu, Xiufang Shi, Zhiguo Shi:
A Novel Decision Fusion Scheme with Feedback in Neyman-Pearson Detection Systems. 647-653 - Claudia R. Solís-Lemus, Daniel L. Pimentel-Alarcón:
Breaking the Limits of Subspace Inference. 654-661 - Kai Wan, Daniela Tuninetti, Mingyue Ji, Pablo Piantanida:
Fundamental Limits of Distributed Data Shuffling. 662-669 - Binglin Li, Shuangqing Wei, Yue Wang, Jian Yuan:
Topological and Algebraic Properties of Chernoff Information between Gaussian Graphs. 670-675 - Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero III:
Multi-class Bayes error estimation with a global minimal spanning tree. 676-681 - Mahsa Lotfi, Mathukumalli Vidyasagar:
Array LDPC Code-based Compressive Sensing. 682-685 - Jisang Yoon, Kangwook Lee, Changho Suh:
On the Joint Recovery of Community Structure and Community Features. 686-694 - Homa Esfahanizadeh, Ahmed H. Hareedy, Lara Dolecek:
Multi-Dimensional Spatially-Coupled Code Design Through Informed Relocation of Circulants. 695-701 - Umberto Martínez-Peñas, Frank R. Kschischang:
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes. 702-709 - Zitan Chen, Alexander Barg:
The repair problem under connectivity constraints: Explicit MSR codes for the rack-aware model of distributed storage. 710-714 - Haewon Jeong, Fangwei Ye, Pulkit Grover:
Locally Recoverable Coded Matrix Multiplication. 715-722 - Barak Farbman, Yuval Cassuto, Alex Sprintson:
Coded Caching with Low Per-Request Complexity. 723-732 - Michael Rudow, K. V. Rashmi:
Streaming Codes For Variable-Size Arrivals. 733-740 - Dhruva Kartik, Ekraam Sabir, Urbashi Mitra, Prem Natarajan:
Policy Design for Active Sequential Hypothesis Testing using Deep Learning. 741-748 - Diego Goldsztajn, Andrés Ferragut, Fernando Paganini:
Feedback control of server instances for right sizing in the cloud. 749-756 - Avishek Ghosh, Kannan Ramchandran:
Faster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time Distributions. 757-764 - Dengwang Tang, Vijay G. Subramanian:
Balanced Allocation on Graphs with Random Walk Based Sampling. 765-766 - Ali Tajer, Maha Zohdy:
Resource Allocation under Sequential Resource Access: Theory and Application. 767-773 - Ning Wu, Shih-Hao Tseng, Ao Tang:
Accurate Rate-Aware Flow-level Traffic Splitting. 774-783 - Pei Peng, Emina Soljanin:
On Distributed Storage Allocations of Large Files for Maximum Service Rate. 784-791 - Umberto Martínez-Peñas, Frank R. Kschischang:
Universal and Dynamic Locally Repairable Codes with Maximal Recoverability via Sum-Rank Codes. 792-799 - Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. Lopez, Fernando Piñero:
Explicit optimal-length locally repairable codes of distance 5. 800-804 - Imad Ahmad, Chih-Chun Wang:
Flexible Fractional Repetition Codes for Distributed Storage Networks. 805-812 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Capacity of Private Linear Computation for Coded Databases. 813-820 - Melkior Ornik, Ufuk Topcu:
Deception in Optimal Control. 821-828 - Shih-Hao Tseng, Ao Tang:
Coflow Deadline Scheduling via Network-Aware Optimization. 829-833 - Xi Liu, Ping-Chun Hsieh, P. R. Kumar:
Safe Intersection Management for Mixed Transportation Systems with Human-Driven and Autonomous Vehicles. 834-841 - Kwassi Holali Degue, Jerome Le Ny:
On Differentially Private Gaussian Hypothesis Testing. 842-847 - Ratan Lal, Pavithra Prabhakar:
Hierarchical Abstractions for Reachability Analysis of Probabilistic Hybrid Systems. 848-855 - Susmit Jha, Patrick Lincoln:
Data Efficient Learning of Robust Control Policies. 856-861 - Charles A. Kamhoua:
Game theoretic modeling of cyber deception in the Internet of Battlefield Things. 862 - Deepesh Data, Linqi Song, Suhas N. Diggavi:
Data Encoding for Byzantine-Resilient Distributed Gradient Descent. 863-870 - Mukul Gagrani, Marcos M. Vasconcelos, Ashutosh Nayyar:
Scheduling and Estimation Strategies in a Sequential Networked Estimation Problem. 871-878 - Abram Magner, Arun Padakandla:
Network Archaeology via Epidemic Processes: The Case of Growing Trees. 879-886 - Haewon Jeong, Tze Meng Low, Pulkit Grover:
Masterless Coded Computing: A Fully-Distributed Coded FFT Algorithm. 887-894 - John Tadrous, Atilla Eryilmaz:
On Optimal Proactive Caching with Improving Predictions over Time. 895-902 - Jaewook Kwak, Ness B. Shroff:
Simulated Annealing for Optimal Resource Allocation in Wireless Networks with Imperfect Communications. 903-910 - Yagiz Savas, Melkior Ornik, Murat Cubuktepe, Ufuk Topcu:
Entropy Maximization for Constrained Markov Decision Processes. 911-918 - Ali Reza Pedram, Takashi Tanaka:
Some Results on the Computation of Feedback Capacity of Gaussian Channels with Memory. 919-926 - Nicolas Loizou, Peter Richtárik:
Accelerated Gossip via Stochastic Heavy Ball Method. 927-934 - Truong X. Nghiem, Giorgos Stathopoulos, Colin N. Jones:
Learning Proximal Operators with Gaussian Processes. 935-942 - Giuliano Costantini, Ramin Rostami, Daniel Görges:
Decomposition Methods for Distributed Quadratic Programming with Application to Distributed Model Predictive Control. 943-950 - Elie Atallah, Nazanin Rahnavard:
A Code-Based Distributed Gradient Descent Method. 951-958 - Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu:
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms. 959-965 - Ahmed Arafa, Jing Yang, Sennur Ulukus, H. Vincent Poor:
Online Timely Status Updates with Erasures for Energy Harvesting Sensors. 966-972 - Aquib Mustafa, Hamidreza Modares:
Analysis and Detection of Cyber-physical Attacks in Distributed Sensor Networks. 973-980 - Chaitanya Kumar Matcha, Shayan Srinivasa Garani:
2D Linear Detector Based on Generalized Belief Propagation Algorithm. 981-988 - Mohamed S. Nafea, Aylin Yener:
The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library Files. 989-996 - Songyang Zhang, Han Zhang, Hang Li, Shuguang Cui:
Tensor-based Spectral Analysis of Cascading Failures over Multilayer Complex Systems. 997-1004 - Meimei Liu, Jean Honorio, Guang Cheng:
Statistically and Computationally Efficient Variance Estimator for Kernel Ridge Regression. 1005-1011 - Samarth Gupta, Gauri Joshi, Osman Yagan:
Active Distribution Learning from Indirect Samples. 1012-1019 - David Qiu, Anuran Makur, Lizhong Zheng:
Probabilistic Clustering using Maximal Matrix Norm Couplings. 1020-1027 - Farhad Shirani, Siddharth Garg, Elza Erkip:
Matching Graphs with Community Structure: A Concentration of Measure Approach. 1028-1035 - Brunella Spinelli, L. Elisa Celis, Patrick Thiran:
How Many Sensors to Localize the Source? The Double Metric Dimension of Random Networks. 1036-1043 - Michael Fauss, Abdelhak M. Zoubir, H. Vincent Poor:
Minimax Optimal Sequential Tests for Multiple Hypotheses. 1044-1046 - Anton Puzanov, Kobi Cohen:
Deep Reinforcement One-Shot Learning for Change Point Detection. 1047-1051 - Qing Li, Yang Chen:
Rate Distortion Via Restricted Boltzmann Machines. 1052-1059 - Jun Zhao:
Analyzing the Robustness of Deep Learning Against Adversarial Examples. 1060-1064 - Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. 1065-1072 - Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo:
Improving Computational Efficiency of Communication for Omniscience and Successive Omniscience. 1073-1080 - Eli Shemuel, Oron Sabag, Haim H. Permuter:
Finite-State Channel with Feedback and Causal State Information Available at the Encoder. 1081-1088 - Krzysztof Turowski, Abram Magner, Wojciech Szpankowski:
Compression of Dynamic Graphs Generated by a Duplication Model. 1089-1096 - Uzi Pereg, Yossef Steinberg:
The Arbitrarily Varying Gaussian Relay Channel with Sender Frequency Division. 1097-1103 - Mahdi Cheraghchi, João Ribeiro:
Sharp Analytical Capacity Upper Bounds for Sticky and Related Channels. 1104-1111 - Anuran Makur:
Information Capacity of BSC and BEC Permutation Channels. 1112-1119 - Jinyuan Chen:
Secure Communication over Interference Channel: To Jam or Not to Jam? 1120-1127 - Abhishek Rawat, Nicola Elia, Chong Li:
Computation of Feedback Capacity of Single User Multi-Antenna Stationary Gaussian Channel. 1128-1135 - Rafael G. L. D'Oliveira, Salim El Rouayheb, Muriel Médard:
The Computational Wiretap Channel. 1136-1140 - Meysam Asadi, Natasha Devroye:
On the zero-error capacity of channels with rate limited noiseless feedback. 1141-1146 - Sainyam Galhotra, Soumyabrata Pal, Arya Mazumdar, Barna Saha:
The Geometric Block Model and Applications. 1147-1150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.