


default search action
47th Allerton Conference 2009: Monticello, IL, USA
- 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009, Monticello, IL, USA, September 30 - October 2, 2009. IEEE 2009, ISBN 978-1-4244-5870-7

- Bane Vasic, Shashi Kiran Chilappagari, Dung Viet Nguyen, Shiva Kumar Planjery:

Trapping set ontology. 1-7 - Alexandros G. Dimakis, Pascal O. Vontobel

:
LP decoding meets LP decoding: A connection between channel coding and compressed sensing. 8-15 - S. Hamed Hassani, Satish Babu Korada, Rüdiger L. Urbanke:

The compound capacity of polar codes. 16-21 - Hessam Mahdavifar, Alexander Vardy

:
Optimal interleaving algorithms for generalized concatenated codes. 22-29 - Mahdi Cheraghchi

, Ali Hormati, Amin Karbasi, Martin Vetterli
:
Compressed sensing with probabilistic measurements: A group testing solution. 30-35 - Radu Berinde, Piotr Indyk:

Sequential Sparse Matching Pursuit. 36-43 - Chinmay Hegde

, Richard G. Baraniuk:
Compressive sensing of streams of pulses. 44-51 - Dongning Guo, Dror Baron

, Shlomo Shamai
:
A single-letter characterization of optimal noisy compressed sensing. 52-59 - Irina Rish, Genady Grabarnik:

Sparse signal recovery with exponential-family noise. 60-66 - Viveck R. Cadambe

, Syed Ali Jafar
:
Interference alignment via random codes and he capacity of a class of deterministic interference channels. 67-74 - Hieu T. Do, Tobias J. Oechtering

, Mikael Skoglund:
An achievable rate region for the Gaussian Z-interference channel with conferencing. 75-81 - Lalitha Sankar, Jan Vondrák, H. Vincent Poor:

K-user fading interference channels: The ergodic very strong case. 82-87 - Amin Jafarian, Jubin Jose, Sriram Vishwanath:

Algebraic lattice alignment for K-user interference channels. 88-93 - Marco Levorato, Urbashi Mitra, Michele Zorzi:

Cognitive interference management in retransmission-based wireless networks. 94-101 - Jinsung Lee, Junhee Lee, Yung Yi, Song Chong, Alexandre Proutière, Mung Chiang:

Implementing utility-optimal CSMA. 102-111 - Mihalis G. Markakis

, Eytan H. Modiano, John N. Tsitsiklis:
Scheduling policies for single-hop networks with heavy-tailed traffic. 112-120 - Mor Harchol-Balter

, Alan Scheller-Wolf, Andrew R. Young:
Why segregating short jobs from long jobs under high variability is not always a win. 121-127 - David Plonka, Paul Barford:

Network anomaly confirmation, diagnosis and remediation. 128-135 - Fernando Paganini, Ao Tang, Andrés Ferragut

, Lachlan L. H. Andrew:
Stability of networks under general file size distribution with alpha fair rate allocation. 136-142 - Di Niu, Baochun Li:

Asymptotic rate limits for randomized broadcasting with network coding. 143-150 - Sachin Adlakha, Seyed Reza Mirghaderi, Sanjay Lall, Andrea Goldsmith:

Decentralized team decision via coding. 151 - Nevroz Sen, Fady Alajaji, Serdar Yüksel:

Feedback capacity of a class of symmetric finite-state Markov channels. 152-159 - Gabriel M. Lipsa, Nuno C. Martins:

Optimal state estimation in the presence of communication costs and packet drops. 160-169 - Matthew Malloy, Akbar M. Sayeed:

Signal detection in sparse multipath channels. 170-177 - Karumbu Premkumar

, Anurag Kumar
, Joy Kuri:
Distributed detection and localization of events in large ad hoc wireless sensor networks. 178-185 - Yilin Mo

, Roberto Ambrosino
, Bruno Sinopoli:
A convex optimization approach of multi-step sensor selection under correlated noise. 186-193 - Elizabeth Bodine-Baron, Babak Hassibi, Adam Wierman:

Generalizing Kronecker graphs in order to model searchable networks. 194-201 - Usman A. Khan, Soummya Kar

, José M. F. Moura:
Distributed localization and tracking with coordinated and uncoordinated motion models. 202-208 - Hongyi Yao, Elad Verbin:

Network coding is highly non-approximable. 209-213 - Wei Zhang, Xiaoli Ma, Giwan Choi:

Enhancing data persistence for energy constrained networks by network modulation. 214-221 - Michael Langberg, Muriel Médard:

On the multiple unicast network coding, conjecture. 222-227 - Joseph C. Koo, John T. Gill III:

Low-complexity non-uniform demand multicast network coding problems. 228-235 - Arian Maleki:

Coherence analysis of iterative thresholding algorithms. 236-243 - Marco F. Duarte

, Volkan Cevher
, Richard G. Baraniuk:
Model-based compressive sensing for signal ensembles. 244-250 - Garvesh Raskutti, Martin J. Wainwright

, Bin Yu:
Minimax rates of convergence for high-dimensional regression under ℓq-ball sparsity. 251-257 - Gongguo Tang, Arye Nehorai:

Performance analysis of support recovery with joint sparsity constraints. 258-264 - Guy Bresler, David N. C. Tse:

3 User interference channel: Degrees of freedom as a function of channel diversity. 265-271 - Yi Cao, Biao Chen:

Capacity bounds for two-hop interference networks. 272-279 - Cheng Chang:

Interference channel capacity region for randomized fixed-composition codes. 280-287 - Sung Ho Chae, Sang Won Choi, Sae-Young Chung:

Optimal multiplexing gain of K-user line-of-sight interference channels with polarization. 288-293 - Michel X. Goemans, Satoru Iwata, Rico Zenklusen:

An algorithmic framework for wireless information flow. 294-300 - Meng Wang, Ao Tang:

Conditions for a unique non-negative solution to an underdetermined system. 301-307 - Jun Luo, Dongning Guo:

Compressed neighbor discovery for wireless ad hoc networks: The Rayleigh fading case. 308-313 - Joseph Knuth, Prabir Barooah

:
Distributed collaborative localization of multiple vehicles from relative pose measurements. 314-321 - Minyi Huang, Peter E. Caines, Roland P. Malhamé

:
Social optima in mean field LQG control: Centralized and decentralized strategies. 322-329 - Aditya Mahajan

, Sekhar Tatikonda:
Sequential team form and its simplification using graphical models. 330-339 - Fu Lin, Makan Fardad, Mihailo R. Jovanovic

:
Synthesis of H2 optimal static structured controllers: Primal and dual formulations. 340-346 - Boris N. Oreshkin, Mark J. Coates, Michael G. Rabbat:

Optimization and analysis of distributed averaging with memory. 347-354 - George K. Atia, Venkatesh Saligrama

:
Noisy group testing: An information theoretic perspective. 355-362 - Dragana Bajovic, Bruno Sinopoli, João Xavier:

Robust linear dimensionality reduction for hypothesis testing with application to sensor selection. 363-370 - Ruoheng Liu, Yingbin Liang, H. Vincent Poor:

Fading cognitive multiple-access channels with confidential messages. 371-377 - Minghua Chen

, Mung Chiang, Phil Chou, Jin Li, Shao Liu, Sudipta Sengupta:
P2P streaming capacity: Survey and recent results. 378-387 - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar

:
Degrees of freedom of multi-source relay networks. 388-393 - Yingbin Liang, Lifeng Lai, John Halloran:

Distributed algorithm for collaborative detection in cognitive radio networks. 394-399 - Hamid Saeedi

, Hossein Pishro-Nik, Amir H. Banihashemi:
On systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels. 400-407 - Arvind Yedla, Henry D. Pfister

, Krishna R. Narayanan:
Can iterative decoding for erasure correlated sources be universal? 408-415 - Elchanan Mossel

, Omer Tamuz
:
Iterative maximum likelihood on networks. 416-423 - Chao-Yu Chen

, Qin Huang, Jingyu Kang, Li Zhang, Shu Lin:
A binary message-passing decoding algorithm for LDPC codes. 424-430 - O. Patrick Kreidl, Alan S. Willsky:

Message quantization in belief propagation: Structural results in the low-rate regime. 431-438 - Danny Bickson, Alexander T. Ihler

, Harel Avissar, Danny Dolev:
A low density lattice decoder via non-parametric belief propagation. 439-446 - Soheil Feizi, Muriel Médard:

When do only sources need to compute? On functional compression in tree networks. 447-454 - Ming Ouyang, Lei Ying

:
On scheduling in multi-channel wireless downlink networks with limited feedback. 455-461 - Randy Cogill, Brooke Shrader:

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding. 462-468 - Mahdi Lotfinezhad, Peter Marbach:

On channel access delay of CSMA policies in wireless networks with primary interference constraints. 469-476 - Murat Alanyali, Maxim Dashouk:

On fair sharing of spectrum via CSMA. 477-482 - Gagan Raj Gupta

, Sujay Sanghavi, Ness B. Shroff:
Is it enough to drain the heaviest bottlenecks? 483-490 - Sung Hyun Chun, Richard J. La:

Auction-based dynamic spectrum trading market - Spectrum allocation and profit sharing. 491-498 - Hang Zhou, Randall A. Berry

, Michael L. Honig, Rakesh Vohra:
Complementarities in spectrum markets. 499-506 - Yufang Xi, Edmund M. Yeh:

Pricing, competition, and routing in relay networks. 507-514 - Holger Boche, Siddharth Naik:

Mechanism design and implementation theoretic perspective of interference coupled wireless systems. 515-522 - Patrick L. Harrington, Alfred O. Hero III:

Information theoretic adaptive tracking of epidemics in complex networks. 523-530 - Alejandro Lage-Castellanos, Andrea Pagnani

, Martin Weigt
:
The importance of dilution in the inference of biological networks. 531-538 - Yaniv Erlich, Noam Shental, Amnon Amir, Or Zuk:

Compressed sensing approach for high throughput carrier screen. 539-544 - John MacLaren Walsh, Steven Weber:

A recursive construction of the set of binary entropy vectors. 545-552 - Kaveh Mahdaviani, Shervin Shahidi, Shima Haddadi, Masoud Ardakani, Chintha Tellambura:

Improving the Sphere-Packing Bound for binary codes over memoryless symmetric channels. 553-557 - Yücel Altug, Aaron B. Wagner:

Source and channel simulation using arbitrary randomness. 558-565 - Lav R. Varshney, Sanjoy K. Mitter, Vivek K. Goyal

:
Channels that die. 566-573 - Shraga I. Bross, Amos Lapidoth, Ligong Wang:

The Poisson channel with side information. 574-578 - Vaneet Aggarwal

, Salman Avestimehr, Ashutosh Sabharwal:
Distributed universally optimal strategies for interference channels with partial message passing. 579-584 - Wei Liu, Biao Chen:

Interference channels with arbitrarily correlated sources. 585-592 - Oliver Kosut, Lang Tong, David Tse:

Nonlinear network coding is necessary to combat general Byzantine attacks. 593-599 - Xiaoheng Chen, Qin Huang, Shu Lin, Venkatesh Akella:

FPGA-based low-complexity high-throughput tri-mode decoder for quasi-cyclic LDPC codes. 600-606 - Samuel Cheng, Shuang Wang, Lijuan Cui:

Adaptive Slepian-Wolf decoding using particle filtering based belief propagation. 607-612 - Venkat Chandar, Devavrat Shah, Gregory W. Wornell

:
A locally encodable and decodable compressed data structure. 613-619 - Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf:

LDPC codes for the cascaded BSC-BAWGN channel. 620-627 - Serdar Yüksel:

A random time stochastic drift result and application to stochastic stabilization over noisy channels. 628-635 - Vincent Conitzer:

Approximation guarantees for fictitious play. 636-643 - Ning Bao, John Musacchio:

Optimizing the decision to expel attackers from an information system. 644-651 - Sarah-Jane Whittaker, Karen Rudie

, P. James McLellan, Stefan Haar:
Choice-point nets: A discrete-event modelling technique for analyzing health care protocols. 652-659 - Creag Winacott, Karen Rudie

:
Limited lookahead supervisory control of probabilistic discrete-event systems. 660-667 - Wen-Chiao Lin, Humberto E. Garcia, David Thorsley, Tae-Sic Yoo

:
Sequential window diagnoser for discrete-event systems under unreliable observations. 668-675 - Ya Meng, Navin Kashyap:

Controlling errors in the process of molecular self-assembly. 676-677 - Haris Vikalo

, Babak Hassibi:
Limits of performance of real-time DNA microarrays. 678-683 - Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:

How do the structure and the parameters of Gaussian tree models affect structure learning? 684-691 - Osvaldo Simeone

, Deniz Gündüz
, Shlomo Shamai
:
Compound relay channel with informed relay and destination. 692-699 - Mukul Agarwal, Swastik Kopparty, Sanjoy K. Mitter:

Universal capacity of channels with given rate-distortion in absence of common randomness, and failure of universal source-channel separation. 700-707 - Cheng Chang:

Joint source-channel with side information coding error exponents. 708-715 - Aaron B. Wagner, Benjamin G. Kelly, Yücel Altug:

The lossy one-helper conjecture is false. 716-723 - Samar Agnihotri, Rajesh Venkatachalapathy, H. S. Jamadagni:

Distributed function computation in asymmetric communication scenarios. 724-731 - Tuncer C. Aysal, Anand D. Sarwate

, Alexandros G. Dimakis:
Reaching consensus in wireless networks with probabilistic broadcast. 732-739 - Aman Jain, Sanjeev R. Kulkarni, Sergio Verdú:

Minimum energy per bit for Gaussian broadcast channels with common message and cooperating receivers. 740-747 - Chandrasekharan Raman, Gerard J. Foschini, Reinaldo A. Valenzuela, Roy D. Yates, Narayan B. Mandayam:

Power savings from half-duplex relaying in downlink cellular systems. 748-753 - Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:

A note on information-theoretic secret key exchange over wireless channels. 754-761 - Yuanyuan He, Subhrakanti Dey

:
Efficient algorithms for outage minimization in parallel fading channels with limited feedback. 762-770 - Bahman Gharesifard, Jorge Cortés

:
Distributed strategies for making a digraph weight-balanced. 771-777 - Victor M. Preciado, Alireza Tahbaz-Salehi

, Ali Jadbabaie
:
Asymptotic analysis of quadratic error of consensus in large-scale random directed networks. 778-782 - Takao Inoue, Robert W. Heath Jr.

:
Grassmannian predictive coding for delayed limited feedback MIMO systems. 783-788 - Achilleas Anastasopoulos:

A sequential transmission scheme for the multiple access channel with noiseless feedback. 789-794 - An Liu, Ashutosh Sabharwal, Youjian Liu, Haige Xiang, Wu Luo:

Distributed MIMO network optimization based on duality and local message passing. 795-802 - Maxim Raginsky, Alexander Rakhlin:

Information complexity of black-box convex optimization: A new look via feedback information theory. 803-510 - Xiang He, Aylin Yener:

Interference channels with strong secrecy. 811-818 - Raef Bassily, Sennur Ulukus:

A new achievable ergodic secrecy rate region for the fading multiple access wiretap channel. 819-826 - Shantanu Rane, Wei Sun, Anthony Vetro:

Secure function evaluation based on secret sharing and homomorphic encryption. 827-834 - João Almeida, João Barros

:
Joint compression and data protection. 835-842 - Bobak Nazer, Michael Gastpar, Syed Ali Jafar

, Sriram Vishwanath:
Interference alignment at finite SNR: General message sets. 843-848 - Jeffrey G. Andrews, Steven Weber, Marios Kountouris

, Martin Haenggi
:
A simple upper bound on random access transport capacity. 849-856 - Iñaki Esnaola

, Javier Garcia-Frías
:
Distributed analog coding of correlated Gaussian sources. 857-864 - Baris Nakiboglu

, Lizhong Zheng:
Upper bounds to error probability with feedback. 865-871 - Ehsan Ardetsanizadeh, Tara Javidi, Young-Han Kim, Michèle A. Wigger:

On the sum capacity of the Gaussian multiple access channel with feedback. 872-878 - Fatemeh Fazel, D. Richard Brown:

On the endogenous formation of energy efficient cooperative wireless networks. 879-886 - Alireza Keshavarz-Haddad, Mohammad Ali Khojastepour:

On capacity of deterministic wireless networks under node half-duplexity constraint. 887-891 - Chuan Huang, Jinhua Jiang, Shuguang Cui

:
Asymptotic capacity of randomly-failing relay networks with DF strategy. 892-898 - Chun-Hung Liu

, Jeffrey G. Andrews:
Diversity-multiplexing tradeoff of network coding with bidirectional random relaying. 899-905 - Dimos V. Dimarogonas, Emilio Frazzoli:

Distributed event-triggered control strategies for multi-agent systems. 906-910 - Yilin Mo

, Bruno Sinopoli:
Secure control against replay attacks. 911-918 - Xiaojun Lin, V. J. Venkataramanan:

On the large-deviations optimality of scheduling policies minimizing the drift of a Lyapunov function. 919-926 - Anthony Auer, Juergen Dingel, Karen Rudie

:
Concurrency control generation for dynamic threads using Discrete-Event Systems. 927-934 - Ofer Shayevitz:

Posterior matching variants and fixed-point elimination. 935-939 - Vishwesh V. Kulkarni, Vincent Fromion, Tansu Alpcan

, Michael G. Safonov:
Loss of continuity in cellular networks under stabilizing transmit power control. 940-946 - Harish Ganapathy, Siddhartha Banerjee, Nedialko B. Dimitrov, Constantine Caramanis

:
Optimal feedback allocation algorithms for multi-user uplink. 947-954 - Himanshu Tyagi:

Capacity region of a state dependent degraded broadcast channel with noncausal transmitter CSI. 955-961 - Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Parrilo

, Alan S. Willsky:
Sparse and low-rank matrix decompositions. 962-967 - John S. Baras, Pedram Hovareshti

, Senni Perumal:
Dynamic self-organization and clustering in distributed networked systems for performance improvement. 968-975 - Puneet Sharma:

An entropy-based framework for dynamic clustering and coverage problems. 976-983 - Ketan Savla, Emilio Frazzoli:

Game-theoretic learning algorithm for a spatial coverage problem. 984-990 - Syed Ali Jafar

, Viveck R. Cadambe
, Chenwei Wang:
Interference alignment with asymmetric complex signaling. 991-996 - Ralf Koetter, Michelle Effros, Muriel Médard:

Beyond network equivalence. 997-1004 - Waheed U. Bajwa, Akbar M. Sayeed, Robert Nowak:

A restricted isometry property for structurally-subsampled unitary matrices. 1005-1012 - Donald Goldfarb, Shiqian Ma, Zaiwen Wen:

Solving low-rank matrix completion problems efficiently. 1013-1020 - M. Salman Asif

, William Mantzel, Justin Romberg:
Random channel coding and blind deconvolution. 1021-1025 - Weiyu Xu, M. Amin Khajehnejad, Amir Salman Avestimehr, Babak Hassibi:

Breaking the ℓ1 recovery thresholds with reweighted ℓ1 optimization. 1026-1030 - Anxiao Jiang, Michael Langberg, Robert Mateescu, Jehoshua Bruck

:
Data movement in flash memories. 1031-1038 - Fan Zhang, Henry D. Pfister

:
Modulation codes for flash memory based on load-balancing theory. 1039-1046 - Yingquan Wu:

Novel burst error correcting algorithms for Reed-Solomon codes. 1047-1052 - Wei Mao, Babak Hassibi:

Violating the Ingleton inequality with finite groups. 1053-1060 - Ravi Tandon, Sennur Ulukus, Kannan Ramchandran:

Secure source coding with a helper. 1061-1068 - Ebrahim MolavianJazi, Matthieu R. Bloch, J. Nicholas Laneman:

Arbitrary jamming can preclude secure communication. 1069-1075 - Tùng T. Kim, H. Vincent Poor:

Secure relaying: Can publicly transferred keys increase degrees of freedom? 1076-1081 - Ting He, Lang Tong, Ananthram Swami:

Maximum throughput of clandestine relay. 1082-1089 - Yunus Sarikaya, Özgür Erçetin:

On physically secure and stable slotted ALOHA system. 1090-1096 - Bilal Sadiq, Gustavo de Veciana:

Throughput optimality of delay-driven MaxWeight scheduler for a wireless system with flow dynamics. 1097-1102 - Krishna Jagannathan

, Eytan H. Modiano:
The impact of queue length information on buffer overflow in parallel queues. 1103-1110 - Libin Jiang, Jean C. Walrand:

Stable and utility-maximizing scheduling for stochastic processing networks. 1111-1119 - Anil Kumar Chorppath, Srikrishna Bhashyam

, Rajesh Sundaresan:
Almost budget-balanced mechanisms for allocation of divisible resources. 1120-1125 - Gareth Middleton, Behnaam Aazhang, Jorma Lilleberg:

A flexible framework for polynomial-time resource allocation in multiflow wireless networks. 1126-1133 - Amitav Mukherjee, A. Lee Swindlehurst

:
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels. 1134-1141 - Mahmoud Taherzadeh, H. Vincent Poor:

Limits on the robustness of MIMO joint source-channel codes. 1142-1144 - Sungho Yun, Constantine Caramanis

:
Multiclass support vector machines for adaptation in MIMO-OFDM wireless systems. 1145-1152 - Mustafa Cenk Gursoy:

MIMO wireless communications under statistical queueing constraints. 1153-1160 - Omar Bakr, Mark Johnson, Raghuraman Mudumbai, Upamanyu Madhow:

Interference suppression in the presence of quantization errors. 1161-1168 - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:

Codes against online adversaries. 1169-1176 - Christian G. Claudel

, Matthieu Nahoum, Alexandre M. Bayen:
Minimal error certificates for detection of faulty sensors using convex optimization. 1177-1186 - Omur Ozel, Elif Uysal-Biyikoglu

:
A power control game with smooth reduction of SINR objectives. 1187-1194 - Jun Xiao, Vaneet Aggarwal

, Ashutosh Sabharwal, Youjian Liu
:
Interference networks with local view: A distributed optimization approach. 1195-1202 - Vojislav Gajic, Jianwei Huang, Bixio Rimoldi:

Competition of wireless providers for atomic users: Equilibrium and social optimality. 1203-1210 - Vaneet Aggarwal

, Lorne Applebaum, Amir Bennatan, A. Robert Calderbank, Stephen D. Howard, Stephen J. Searle
:
Enhanced CDMA communications using compressed-sensing reconstruction methods. 1211-1215 - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:

Low-rank matrix completion with noisy observations: A quantitative comparison. 1216-1222 - Emmanuel J. Candès, Yaniv Plan:

Accurate low-rank matrix recovery from a small number of linear measurements. 1223-1230 - Venkatesan Guruswami, James R. Lee, Avi Wigderson:

Expander codes over reals, Euclidean sections, and compressed sensing. 1231-1234 - Phong S. Nguyen, Henry D. Pfister

, Krishna R. Narayanan:
A rate-distortion perspective on multiple decoding attempts for Reed-Solomon codes. 1235-1242 - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar

, Kannan Ramchandran:
Explicit construction of optimal exact regenerating codes for distributed storage. 1243-1249 - Songqing Zhao, Daniela Tuninetti

, Rashid Ansari, Dan Schonfeld:
Distortion exponent for multiple description coding. 1250-1255 - Shirin Jalali, Tsachy Weissman:

Multiple description coding of discrete ergodic sources. 1256-1261 - Kalyana C. Bollapalli, Yiyue Wu, Kanupriya Gulati, Sunil P. Khatri, A. Robert Calderbank:

Highly parallel decoding of space-time codes on graphics processing units. 1262-1269 - Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, M. Kivanç Mihçak:

A detection theoretic approach to digital fingerprinting with focused receivers under uniform linear averaging Gaussian attacks. 1270-1277 - Ersen Ekrem, Sennur Ulukus:

Secrecy capacity region of the degraded compound multi-receiver wiretap channel. 1278-1285 - Lan Zhang, Rui Zhang

, Ying-Chang Liang
, Yan Xin, Shuguang Cui
:
On the relationship between the multi-antenna secrecy communications and cognitive radio communications. 1286-1292 - Victor M. Preciado, Ali Jadbabaie

:
Spectral analysis of dynamically evolving networks with linear preferential attachment. 1293-1299 - Daniel Genin, Vladimir Marbukh:

Bursty fluid approximation of TCP for modeling internet congestion at the flow level. 1300-1306 - Jung Ryu, Sandeep Bhadra, Sanjay Shakkottai:

TCP with feed-forward source coding for wireless downlink networks. 1307-1314 - Ka-Hung Hui, Dongning Guo, Randall Berry

, Martin Haenggi
:
Performance analysis of MAC protocols in wireless line networks using statistical mechanics. 1315-1322 - Chris T. K. Ng, Howard C. Huang:

Efficient linear precoding in downlink cooperative cellular networks with soft interference nulling. 1323-1329 - Mohammad Ali Khojastepour, Alireza Keshavarz-Haddad

:
Rotational coding achieves multicast capacity of deterministic wireless networks. 1330-1337 - Yan Zhu, Dongning Guo:

Isotropic MIMO interference channels without CSIT: The loss of degrees of freedom. 1338-1344 - An Liu, Ashutosh Sabharwal, Youjian Liu, Haige Xiang, Wu Luo:

Distributed MIMO network optimization based on duality and local message passing. 1345-1352 - Marc Lelarge:

Economics of malware: Epidemic risks model, network externalities and incentives. 1353-1360 - Sahand Haji Ali Ahmad, Mingyan Liu:

Multi-channel opportunistic access: A case of restless bandits with multiple plays. 1361-1368 - Vahideh H. Manshadi, Ramesh Johari:

Supermodular network games. 1369-1376 - Ali Kakhbod, Demosthenis Teneketzis:

An individually rational, budget-balanced mechanism that implements in Nash equilibria the solution of the unicast service provisioning problem. 1377-1386 - Sukwon Kim, Tracey Ho, Michelle Effros, Salman Avestimehr:

Network error correction with unequal link capacities. 1387-1394 - Mohammad Naghshvar, Hairuo Zhuang, Tara Javidi:

A general class of throughput optimal routing policies in multi-hop wireless networks. 1395-1402 - Daniel E. Lucani

, Muriel Médard, Milica Stojanovic, David R. Karger
:
Sharing information in time-division duplexing channels: A network coding approach. 1403-1410 - Chiranjib Choudhuri, Urbashi Mitra:

On the capacity of the symbol-asynchronous relay channel. 1411-1418 - Yao Li, Emina Soljanin

:
Rateless codes for single-server streaming to diverse users. 1419-1426 - N. P. Santhanam:

Connections between probability estimation and graph theory. 1427-1429 - Arunabha Sen, Sujogya Banerjee, Pavel Ghosh, Shahrzad Shirazipourazad:

Impact of region-based faults on the connectivity of wireless networks. 1430-1437 - Shlomi Dolev, Juan A. Garay, Niv Gilboa

, Vladimir Kolesnikov:
Swarming secrets. 1438-1445 - Joshua Reich, Augustin Chaintreau

:
Replication schemes for opportunistic networks with impatient users. 1446-1451 - Ravi Prakash

, Ehsan Nourbakhsh, Kunal Sahu:
Data aggregation in sensor networks: No more a slave to routing. 1452-1459 - Alejandro Cornejo, Nancy A. Lynch, Saira Viqar, Jennifer L. Welch:

Neighbor discovery in mobile ad hoc networks using an abstract MAC layer. 1460-1467 - Balakrishnan Narayanaswamy, Rohit Negi, Pradeep K. Khosla:

Robust detection of random variables using sparse measurements. 1468-1475 - Jia Ye, Qing Zhao:

Quickest change detection in multiple on-off processes: Switching with memory. 1476-1481 - Manqi Zhao, Venkatesh Saligrama

:
Outlier detection via localized p-value estimation. 1482-1489 - Tariq R. Qureshi, Michael D. Zoltowski, A. Robert Calderbank:

Target detection in MIMO radar using Golay complementary sequences in the presence of Doppler. 1490-1493 - Onur Özyesil, M. Kivanç Mihçak, Yücel Altug:

On detection with partial information in the Gaussian setup. 1494-1501 - Jin Meng, En-Hui Yang:

Interactive encoding and decoding based on syndrome accumulation over binary LDPC ensembles: Universality and rate-adaptivity. 1502-1509 - Nan Ma, Prakash Ishwar

:
Infinite-message distributed source coding for two-terminal interactive computing. 1510-1517 - Ying Zhang, Sorina Dumitrescu, Jun Chen, Zhibin Sun:

LDGM-based codes for successive refinement. 1518-1524 - Ramachandran Rajesh

, Vinod Sharma:
Distributed transmission of functions of correlated sources over a fading multiple access channel. 1225-1232 - Juyul Lee

, Nihar Jindal:
Asymptotically optimal policies for hard-deadline scheduling over fading channels. 1533-1540 - Jing Huang, Sundeep Venkatraman, Krishnan Padmanabhan, Oliver M. Collins:

Information rates of the noncoherent frequency selective fading channel. 1541-1548 - Aditya Mahajan

, Sekhar Tatikonda:
A training based scheme for communicating over unknown channels with feedback. 1549-1553 - Yang Yang, Zixiang Xiong:

The sum-rate bound for a new class of quadratic Gaussian multiterminal source coding problems. 1554-1561 - Giacomo Como

, Fabio Fagnani:
Scaling limits for continuous opinion dynamics systems. 1562-1566 - Osman Yagan, Armand M. Makowski:

On the existence of triangles in random key graphs. 1567-1574 - Jing Wang, Nicola Elia:

Distributed agreement in the presence of noise. 1575-1581 - Julien M. Hendrickx, Alex Olshevsky, John N. Tsitsiklis:

Distributed anonymous function computation in information fusion and multiagent systems. 1582-1589 - Nicholas Ruozzi, Justin Thaler, Sekhar Tatikonda:

Graph covers and quadratic minimization. 1590-1596 - Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, Randall Berry

, Aylin Yener:
Cost sharing with network coding in two-way relay networks. 1597-1604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














