Abstract is missing.
- Optimal rate and maximum erasure probability LDPC codes in binary erasure channelH. Tavakoli, Mahmoud Ahmadian-Attari, M. Reza Peyghami. [doi]
- Interference networks with general message sets: a random coding schemeReza Khosravi-Farsani, Farokh Marvasti. [doi]
- Choir codes: Coding for full duplex interference managementLorne Applebaum, Waheed U. Bajwa, A. Robert Calderbank, Stephen D. Howard. 1-8 [doi]
- Sparse recovery properties of statistical RIP matricesArya Mazumdar, Alexander Barg. 9-12 [doi]
- Parameters of rank modulation codes: ExamplesArya Mazumdar, Alexander Barg, Gilles Zémor. 13-17 [doi]
- Is rateless paradigm fitted for lossless compression of erasure-impaired sources?Silvija Kokalj-Filipovic, Emina Soljanin, Predrag Spasojevic. 18-25 [doi]
- Expected query complexity of symmetric boolean functionsJayadev Acharya, Ashkan Jafarpour, Alon Orlitsky. 26-29 [doi]
- Refinement of the sphere packing bound for symmetric channelsYücel Altug, Aaron B. Wagner. 30-37 [doi]
- An achievable rate region for the 3-user-pair deterministic interference channelBernd Bandemer, Abbas El Gamal. 38-44 [doi]
- Information floodingYu Xiang, Lele Wang, Young Han Kim. 45-51 [doi]
- Relative entropy at the channel output of a capacity-achieving codeYury Polyanskiy, Sergio Verdú. 52-59 [doi]
- On real time coding with limited lookaheadHimanshu Asnani, Tsachy Weissman. 60-67 [doi]
- An achievable rate region for the broadcast wiretap channel with asymmetric side informationMaël Le Treust, Abdellatif Zaidi, Samson Lasaulce. 68-75 [doi]
- Can feedback increase the degrees of freedom of a wireless network with delayed CSIT?Chinmay S. Vaze, Mahesh K. Varanasi. 76-83 [doi]
- Upper bound on the capacity of Gaussian channels with noisy feedbackChong Li, Nicola Elia. 84-89 [doi]
- Capacity of finite alphabet channels with noisy feedbackChong Li, Nicola Elia. 90-95 [doi]
- Generalizing the Posterior Matching Scheme to higher dimensions via optimal transportationRui Ma, Todd P. Coleman. 96-102 [doi]
- Incentive schemes for Internet congestion management: Raffles versus time-of-day pricingPatrick Loiseau, Galina Schwartz, John Musacchio, Saurabh Amin. 103-110 [doi]
- Optimal deadline scheduling with commitmentShiyao Chen, Lang Tong, Ting He. 111-118 [doi]
- Interference is not noiseShreeshankar Bodas, Devavrat Shah, Damon Wischik. 119-126 [doi]
- Power and rate allocation for video conferencing in cellular networksChao Yang, Scott Jordan. 127-134 [doi]
- Profit maximization on user-generated content platformsShaolei Ren, Jaeok Park, Mihaela van der Schaar. 135-142 [doi]
- Opportunistic transport for stored video delivery over wireless networks: Optimal anticipative and causal approximationsZheng Lu, Gustavo de Veciana. 143-150 [doi]
- Large deviations analysis of consensus+innovations detection in random networksDragana Bajovic, Dusan Jakovetic, José M. F. Moura, João Xavier, Bruno Sinopoli. 151-155 [doi]
- Measuring fairness: Axioms and applicationsTian Lan, Mung Chiang. 156-163 [doi]
- Compression with actionsLei Zhao, Yeow-Khiang Chia, Tsachy Weissman. 164-171 [doi]
- Structure theorems for real-time variable rate coding with side informationYonatan Kaspi, Neri Merhav. 172-179 [doi]
- The dispersion of joint source-channel codingDa Wang, Amir Ingber, Yuval Kochman. 180-187 [doi]
- Multiterminal secure source coding for a common secret sourceChung Chan. 188-195 [doi]
- Compressing neighbors in a Gauss-Markov treeAmine Laourine, Aaron B. Wagner. 196-203 [doi]
- Error floor approximation for LDPC codes in the AWGN channelBrian K. Butler, Paul H. Siegel. 204-211 [doi]
- Non-uniform compressive sensingNazanin Rahnavard, Ali Talari, Behzad Shahrasbi. 212-219 [doi]
- Cooperative video streaming on smartphonesHulya Seferoglu, Lorenzo Keller, Blerim Cici, Anh Le, Athina Markopoulou. 220-227 [doi]
- Multilevel polarization for nonbinary codes and parallel channelsWoomyoung Park, Alexander Barg. 228-234 [doi]
- Hybrid codes needed for coordination over the point-to-point channelPaul Cuff, Curt Schieler. 235-239 [doi]
- Polar alignment for interference networksKumar Appaiah, Onur Ozan Koyluoglu, Sriram Vishwanath. 240-246 [doi]
- Causal relay networks and new cut-set boundsIhn-Jung Baik, Sae-Young Chung. 247-252 [doi]
- Decomposition methods for large scale LP decodingSiddharth Barman, Xishuo Liu, Stark C. Draper, Benjamin Recht. 253-260 [doi]
- Atomic norm denoising with applications to line spectral estimationBadri Narayan Bhaskar, Benjamin Recht. 261-268 [doi]
- Stochastic belief propagation: Low-complexity message-passing with guaranteesNima Noorshams, Martin J. Wainwright. 269-276 [doi]
- Structure based Bayesian sparse reconstruction using non-Gaussian priorAhmed Abdul Quadeer, Syed Faraz Ahmed, Tareq Y. Al-Naffouri. 277-283 [doi]
- Budget-optimal crowdsourcing using low-rank matrix approximationsDavid R. Karger, Sewoong Oh, Devavrat Shah. 284-291 [doi]
- On the asymptotic behavior of the spectral density of autoregressive estimatesSyamantak Datta Gupta, Ravi R. Mazumdar, Peter W. Glynn. 292-298 [doi]
- Suboptimality of nonlocal means on images with sharp edgesArian Maleki, Manjari Narayan, Richard G. Baraniuk. 299-305 [doi]
- Influencing the long-term evolution of online communities using social normsYu Zhang, Mihaela van der Schaar. 306-313 [doi]
- Market-based control of epidemicsM. H. R. Khouzani, Santosh S. Venkatesh, Saswati Sarkar. 314-320 [doi]
- Unsupervised learning of finite mixture models using mean field gamesSergio Daniel Pequito, A. Pedro Aguiar, Bruno Sinopoli, Diogo A. Gomes. 321-328 [doi]
- Cooperation in multi-access networks via coalitional game theoryNikhil Karamchandani, Paolo Minero, Massimo Franceschetti. 329-336 [doi]
- Secure state-estimation for dynamical systems under active adversariesHamza Fawzi, Paulo Tabuada, Suhas N. Diggavi. 337-344 [doi]
- Stochastic resource auctions for renewable energy integrationWenyuan Tang, Rahul Jain. 345-352 [doi]
- Online fractional programming for Markov decision systemsMichael J. Neely. 353-360 [doi]
- Instability of natural load balancing in large-scale flexible-server systemsAlexander L. Stolyar, Elena Yudovina. 361-368 [doi]
- On a restless multi-armed bandit problem with non-identical armsNaumaan Nayyar, Yi Gai, Bhaskar Krishnamachari. 369-376 [doi]
- Resource-sharing in a single server with time-varying capacityUrtzi Ayesta, Martin Erausquin, Peter Jacko. 377-383 [doi]
- Achievable delay performance in CSMA networksNiek Bouman, Sem C. Borst, Johan van Leeuwaarden. 384-391 [doi]
- Perfect sampling with aggregated envelopesAna Busic, Emilie Coupechoux. 392-399 [doi]
- Coding for parallel Gaussian bi-directional relay channels: A deterministic approachYu-Chih Huang, Krishna R. Narayanan, Tie Liu. 400-407 [doi]
- On capacity bounds for networks containing two-way channelsMing Fai Wong, Michelle Effros. 408-417 [doi]
- On the parallel relay wire-tap networkSoheil Mohajer, Suhas N. Diggavi, H. Vincent Poor, Shlomo Shamai. 418-425 [doi]
- Compress-forward without Wyner-Ziv binning for the one-way and two-way relay channelsPeng Zhong, Mai Vu. 426-433 [doi]
- Multi-user two-way deterministic modulo 2 adder channels - When adaptation is uselessZhiyu Cheng, Natasha Devroye. 434-438 [doi]
- Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messagesMasahito Hayashi, Ryutaroh Matsumoto. 439-444 [doi]
- Modeling the large scale transmission loss in underwater acoustic channelsParastoo Qarabaqi, Milica Stojanovic. 445-452 [doi]
- On estimating sparse and frequency modulated channels for MIMO underwater acoustic communicationsKexin Zhao, Jun Ling, Jian Li. 453-460 [doi]
- Direct-form adaptive equalization using soft informationAtulya Yellepeddi, James C. Preisig. 461-468 [doi]
- A super-nyquist architecture for reliable underwater acoustic communicationUri Erez, Gregory W. Wornell. 469-476 [doi]
- Hybrid sparse/diffuse channels: A new model and estimators for wideband channelsNicolò Michelusi, Urbashi Mitra, Andreas F. Molisch, Michele Zorzi. 477-484 [doi]
- Multi-armed bandit problems with heavy-tailed reward distributionsKeqin Liu, Qing Zhao. 485-492 [doi]
- On the cooperative red alert exponent for the AWGN-MAC with feedbackYan Y. Shkel, Stark C. Draper, Bobak Nazer. 493-500 [doi]
- On cyclic autocorrelation based spectrum sensing for cognitive radio systems in Gaussian noiseGuangjie Huang, Jitendra K. Tugnait. 501-507 [doi]
- Successive AoA estimation: Revealing the second path for 60 GHz communication systemY. Ming Tsang, Ada S. Y. Poon. 508-515 [doi]
- Performance analysis of the least squares based LTI channel identification algorithm using random matrix methodsMilutin Pajovic, James C. Preisig. 516-523 [doi]
- Decoding for MIMO systems with correlated channel estimation errorsBoon Sim Thian, Andrea Goldsmith. 524-530 [doi]
- Vanishing the gap to exact lattice search at a subexponential complexity: LR-aided regularized decodingArun Kumar Singh, Petros Elia, Joakim Jalden. 531-538 [doi]
- Iterated MIDO space-time code constructionsNadya Markin, Frédérique E. Oggier. 539-544 [doi]
- Massive MIMO: How many antennas do we need?Jakob Hoydis, Stephan ten Brink, Mérouane Debbah. 545-550 [doi]
- Wireless MIMO switching with zero-forcing relayingFanggang Wang, Soung Chang Liew, Dongning Guo. 551-558 [doi]
- Networks of passive oscillatorsVishwesh V. Kulkarni, Marc Riedel, Guy-Bart Stan. 559-565 [doi]
- A semistabilizability/semidetectability approach to semistable H2 and H∞ control problemsQing Hui, Zhenyi Liu. 566-571 [doi]
- Weakly coupled event triggered output feedback control in wireless networked control systemsLichun Li, Michael D. Lemmon. 572-579 [doi]
- Following an RF trail to its sourceAseem Wadhwa, Upamanyu Madhow, João Pedro Hespanha, Brian M. Sadler. 580-587 [doi]
- Optimal bidding strategies in dynamic auctions with budget constraintsR. Gummadi, Peter B. Key, Alexandre Proutiere. 588 [doi]
- Congestion equilibrium for differentiated service classesRichard T. B. Ma, Vishal Misra. 589-594 [doi]
- Incremental relaying for the Gaussian interference channel with a degraded broadcasting relayLei Zhou, Wei Yu. 595-602 [doi]
- Capacity bounds for a class of cognitive interference channels with stateRuchen Duan, Yingbin Liang. 603-608 [doi]
- Quantum interference channelsOmar Fawzi, Patrick Hayden, Ivan Savov, Pranab Sen, Mark M. Wilde. 609-616 [doi]
- Wideband slope of interference channel: Finite bandwidth caseMinqi Shen, Anders Høst-Madsen. 617-624 [doi]
- On the degrees of freedom of SISO interference and X channels with delayed CSITMohammad Javad Abdoli, Akbar Ghasemi, Amir Keyvan Khandani. 625-632 [doi]
- OFDMA for underwater acoustic communicationsKai Tu, Tolga M. Duman, Milica Stojanovic, John G. Proakis. 633-638 [doi]
- Filterbank multicarrier for underwater communicationsPooyan Amini, Rong-Rong Chen, Behrouz Farhang-Boroujeny. 639-646 [doi]
- Selective decision directed channel estimation for UWA OFDM systemsAndreja Radosevic, Tolga M. Duman, John G. Proakis, Milica Stojanovic. 647-653 [doi]
- Equalization for multi-scale multi-lag OFDM channelsZijian Tang, Rob Remis, Tao Xu, Geert Leus, Magnus Lundberg Nordenvaad. 654-661 [doi]
- PHY-based cooperative key generation in wireless networksLifeng Lai, Yingbin Liang, Wenliang Du. 662-669 [doi]
- Impact of security risks on cloud computing adoptionMurat Kantarcioglu, Alain Bensoussan, SingRu Celine Hoe. 670-674 [doi]
- Network design game with both reliability and security failuresGalina A. Schwartz, Saurabh Amin, Assane Gueye, Jean C. Walrand. 675-681 [doi]
- One-to-n scrip systems for cooperative privacy-enhancing technologiesMathias Humbert, Mohammad Hossein Manshaei, Jean-Pierre Hubaux. 682-692 [doi]
- The anonymity of an almost fair chaum mixAbhishek Mishra, Parv Venkitasubramaniam. 693-700 [doi]
- Ergodic mirror descentJohn C. Duchi, Alekh Agarwal, Mikael Johansson, Michael I. Jordan. 701-706 [doi]
- Controlled gossipVivek S. Borkar, Aditya Karnik. 707-711 [doi]
- Optimal scheduling for energy harvesting sources on time varying wireless channelsMohamed Kashef, Anthony Ephremides. 712-718 [doi]
- Modeling and analysis of the role of fast-response energy storage in the smart gridHan-I Su, Abbas El Gamal. 719-726 [doi]
- Cognitive transmissions under a primary ARQ process via backward interference cancellationNicolò Michelusi, Petar Popovski, Marco Levorato, Osvaldo Simeone, Michele Zorzi. 727-735 [doi]
- Recovery guarantees for restoration and separation of approximately sparse signalsChristoph Studer, Richard G. Baraniuk. 736-743 [doi]
- Structural similarity and distance in learningJoseph Wang, Venkatesh Saligrama, David A. Castañon. 744-751 [doi]
- Recursive sparse recovery in large but correlated noiseChenlu Qiu, Namrata Vaswani. 752-759 [doi]
- Iterative projections for signal identification on manifolds: Global recovery guaranteesParikshit Shah, Venkat Chandrasekaran. 760-767 [doi]
- Universal MAP estimation in compressed sensingDror Baron, Marco F. Duarte. 768-775 [doi]
- Ranking: Compare, don't scoreAmmar Ammar, Devavrat Shah. 776-783 [doi]
- Optimal immediately-decodable inter-session network coding (IDNC) schemes for two unicast sessions with hard deadline constraintsXiaohang Li, Chih-Chun Wang, Xiaojun Lin. 784-791 [doi]
- Invertible bloom lookup tablesMichael T. Goodrich, Michael Mitzenmacher. 792-799 [doi]
- Optimal random access for wireless networks in the presence of fadingYichuan Hu, Alejandro Ribeiro. 800-807 [doi]
- Towards achieving full secrecy rate and low delays in wireless networksZhoujia Mao, Can Emre Koksal, Ness B. Shroff. 808-815 [doi]
- Maximal k-Clique Scheduling: A simple algorithm to bound maximal independent graph schedulingKanes Sutuntivorakoon, Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal. 816-823 [doi]
- The degrees of freedom of the 2×2×2 interference network with delayed CSIT and with limited Shannon feedbackChinmay S. Vaze, Mahesh K. Varanasi. 824-831 [doi]
- Symmetric Gaussian interference channel with state informationLili Zhang, Tie Liu, Shuguang Cui. 832-838 [doi]
- Noisy network coding approach to the interference channel with receiver cooperationHieu T. Do, Tobias J. Oechtering, Mikael Skoglund. 839-846 [doi]
- Sum-capacity of a class of K-user Gaussian interference channels within O(K) bitsSuvarup Saha, Randall A. Berry. 847-854 [doi]
- On the symmetric feedback capacity of the K-user cyclic interference channelRavi Tandon, H. Vincent Poor. 855-862 [doi]
- The net benefit of delayed finite-rate feedback in the MISO broadcast channelJiaming Xu, Jeffrey G. Andrews, Syed Ali Jafar. 863-870 [doi]
- Uplink-downlink bidirectional training of multiuser MIMO filters and precodersMingguang Xu, Dongning Guo, Michael L. Honig. 871-878 [doi]
- On capacity of optical channels with coherent detectionHye Won Chung, Saikat Guha, Lizhong Zheng. 879-885 [doi]
- Multi-user MIMO with outdated CSI: Training, feedback and schedulingAnsuman Adhikary, Haralabos C. Papadopoulos, Sean A. Ramprashad, Giuseppe Caire. 886-893 [doi]
- Interference channel with binary fading: Effect of delayed network state informationAlireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. 894-901 [doi]
- Sample-distortion functions for compressed sensingMike E. Davies, Chunli Guo. 902-908 [doi]
- Coding-theoretic methods for sparse recoveryMahdi Cheraghchi. 909-916 [doi]
- Spectral distribution of the product of two random matrices based on binary block codesBehtash Babadi, Vahid Tarokh. 917-919 [doi]
- Simultaneous codeword optimization (SimCO) for dictionary learningWei Dai, Tao Xu, Wenwu Wang. 920-927 [doi]
- The sender-excited secret key agreement model: Capacity theoremsTzu-Han Chou, Vincent Y. F. Tan, Stark C. Draper. 928-935 [doi]
- State amplification under masking constraintsOzan Ozan Koyluoglu, Rajiv Soundararajan, Sriram Vishwanath. 936-943 [doi]
- The efficiency of common randomness generationLei Zhao, Yeow-Khiang Chia. 944-950 [doi]
- Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weightJun Kurihara, Tomohiko Uyematsu. 951-957 [doi]
- Directed information and pearl's causal calculusMaxim Raginsky. 958-965 [doi]
- Factorized decision forecasting via combining value-based and reward-based estimationBrian D. Ziebart. 966-973 [doi]
- Distributed consensus and optimization under communication delaysKonstantinos I. Tsianos, Michael G. Rabbat. 974-982 [doi]
- Adaptive learning of uncontrolled restless bandits with logarithmic regretCem Tekin, Mingyan Liu. 983-990 [doi]
- Mean field interaction in biochemical reaction networksHamidou Tembine, Raúl Tempone, Pedro Vilanova. 991-997 [doi]
- Continuous time finite state space mean field games - A variational approachDiogo A. Gomes. 998-1001 [doi]
- Mean field equilibria of dynamic auctions with learning: A dynamic revenue equivalence theoremKrishnamurthy Iyer, Ramesh Johari, Mukund Sundararajan. 1002-1003 [doi]
- The performance of low-density random linear fountain codes over higher order galois fields under maximum likelihood decodingBirgit Schotsch, Radu Lupoaie, Peter Vary. 1004-1011 [doi]
- An iteratively optimized linear coding scheme for correlated Gaussian channels with noisy feedbackMayur Agrawal, David J. Love, Venkataramanan Balakrishnan. 1012-1018 [doi]
- Design of complexity-optimized bilayer lengthened LDPC codes for relay channelsOsso Vahabzadeh, Masoud Salehi. 1019-1024 [doi]
- Causes and dynamics of LDPC error floors on AWGN channelsShuai Zhang, Christian Schlegel. 1025-1032 [doi]
- Analysis of precoding-based intersession network coding and the corresponding 3-unicast interference alignment schemeJaemin Han, Chih-Chun Wang, Ness B. Shroff. 1033-1040 [doi]
- Aligned interference neutralization and the degrees of freedom of the 2×2×2 interference channel with interfering relaysTiangao Gou, Chenwei Wang, Syed Ali Jafar. 1041-1047 [doi]
- A power efficient sensing/communication scheme: Joint source-channel-network coding by using compressive sensingSoheil Feizi, Muriel Médard. 1048-1054 [doi]
- Distributed power allocation and user assignment in OFDMA cellular networksSem C. Borst, Mihalis Markakis, Iraj Saniee. 1055-1063 [doi]
- On the complexity of wireless uplink scheduling with successive interference cancellationMohsen Mollanoori, Majid Ghaderi. 1064-1071 [doi]
- Localization of diffusive sources using spatiotemporal measurementsYue M. Lu, Pier Luigi Dragotti, Martin Vetterli. 1072-1076 [doi]
- Low-dimensional embedding using adaptively selected ordinal dataKevin G. Jamieson, Robert D. Nowak. 1077-1084 [doi]
- Sparsity in unions of subspaces for classification and clustering of high-dimensional dataEhsan Elhamifar, René Vidal. 1085-1089 [doi]
- Shannon meets Nyquist: The interplay between capacity and samplingYuxin Chen, Andrea J. Goldsmith, Yonina C. Eldar. 1090-1097 [doi]
- Secure lossy source coding with side informationErsen Ekrem, Sennur Ulukus. 1098-1105 [doi]
- Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approachIgor Stanojev, Aylin Yener. 1106-1112 [doi]
- Supervisory control for opacity of discrete event systemsMajed Ben-Kalefa, Feng Lin. 1113-1119 [doi]
- Rate-equivocation region of cyclic shift symmetric wiretap channelsOmur Ozel, Sennur Ulukus. 1120-1127 [doi]
- Delay of linear perfect secret key agreementChung Chan. 1128-1135 [doi]
- Distributed collaborative filtering over social networksSibren Isaacman, Stratis Ioannidis, Augustin Chaintreau, Margaret Martonosi. 1136-1142 [doi]
- User rankings from comparisons: Learning permutations in high dimensionsIoannis Mitliagkas, Aditya Gopalan, Constantine Caramanis, Sriram Vishwanath. 1143-1150 [doi]
- Opinion dynamics and distributed learning of distributionsAnand D. Sarwate, Tara Javidi. 1151-1158 [doi]
- Online dynamic capacity provisioning in data centersMinghong Lin, Adam Wierman, Lachlan L. H. Andrew, Eno Thereska. 1159-1163 [doi]
- How data center size impacts the effectiveness of dynamic power managementAnshul Gandhi, Mor Harchol-Balter. 1164-1169 [doi]
- Scheduling for data center interactive servicesYuxiong He, Sameh Elnikety. 1170-1181 [doi]
- MIMO multiple access channel with an arbitrarily varying eavesdropperXiang He, Ashish Khisti, Aylin Yener. 1182-1189 [doi]
- On sources and networks: Can computational tools derive information theoretic limits?Michelle Effros. 1190-1194 [doi]
- On the block error probability of finite-length codes in decentralized wireless networksCecilia G. Galarza, Pablo Piantanida, Marios Kountouris. 1195-1201 [doi]
- A nested linear codes approach to distributed function computation over subspacesV. Lalitha, N. Prakash, K. Vinodh, P. Vijay Kumar, S. Sandeep Pradhan. 1202-1209 [doi]
- On the capacity of memoryless finite-state multiple access channels with asymmetric noisy state information at the encodersNevroz Sen, Giacomo Como, Serdar Yüksel, Fady Alajaji. 1210-1215 [doi]
- Energy efficient hybrid transmission of correlated sources over the MACNan Jiang, Yang Yang, Anders Høst-Madsen, Zixiang Xiong. 1216-1221 [doi]
- On noise-enhanced distributed inference in the presence of ByzantinesMukul Gagrani, Pranay Sharma, Satish G. Iyengar, V. Sriram Siddhardh Nadendla, Aditya Vempaty, Hao Chen, Pramod K. Varshney. 1222-1229 [doi]
- Sampling trajectories for mobile sensingJayakrishnan Unnikrishnan, Martin Vetterli. 1230-1237 [doi]
- Maximum likelihood combining of stochastic mapsBrandon Jones, Mark Campbell, Lang Tong. 1238-1241 [doi]
- Gossiping in groups: Distributed averaging over the wireless mediumMatthew S. Nokleby, Waheed U. Bajwa, A. Robert Calderbank, Behnaam Aazhang. 1242-1249 [doi]
- DAWN: A density adaptive routing algorithm for vehicular delay tolerant sensor networksQiao Fu, Lin Zhang, Wei Feng, Yixin Zheng. 1250-1257 [doi]
- Asymptotics of the invariant measure in mean field models with jumpsVivek Shripad Borkar, Rajesh Sundaresan. 1258-1263 [doi]
- Geometry of the 3-user MIMO interference channelGuy Bresler, Dustin Cartwright, David Tse. 1264-1271 [doi]
- Uplink power efficiency of multiuser MIMO with very large antenna arraysHien Quoc Ngo, Erik G. Larsson, Thomas L. Marzetta. 1272-1279 [doi]
- A game-theoretical model predictive control framework for electricity marketsAswin Kannan, Victor M. Zavala. 1280-1285 [doi]
- Minimum uplift assignment of transmission charges to beneficiariesRoss Baldick. 1286-1293 [doi]
- The economics of the smart gridLuciano De Castro, Joisa Dutra. 1294-1301 [doi]
- Economic and corrective applications of tractable transmission topology controlJustin M. Foster, Pablo A. Ruiz, Aleksandr Rudkevich, Michael C. Caramanis. 1302-1309 [doi]
- Distributed storage for intermittent energy sources: Control design and performance limitsYashodhan Kanoria, Andrea Montanari, David Tse, Baosen Zhang. 1310-1317 [doi]
- Early stopping for non-parametric regression: An optimal data-dependent stopping ruleGarvesh Raskutti, Martin J. Wainwright, Bin Yu. 1318-1325 [doi]
- Energy/delay tradeoffs in data transmission over a time varying wireless linkNof Abuzainab, Anthony Ephremides. 1326-1333 [doi]
- Real-time demand response with uncertain renewable energy in smart gridLibin Jiang, Steven H. Low. 1334-1341 [doi]
- Optimal power flow over tree networksSubhonmesh Bose, Dennice F. Gayme, Steven H. Low, K. Mani Chandy. 1342-1348 [doi]
- Weighted universal recovery, practical secrecy, and an efficient algorithm for solving bothThomas A. Courtade, Richard D. Wesel. 1349-1357 [doi]
- Distributed storage with communication costsCraig Armstrong, Alexander Vardy. 1358-1365 [doi]
- Scalable constructions of fractional repetition codes in distributed storage systemsJoseph C. Koo, John T. Gill III. 1366-1373 [doi]
- On codes for optimal rebuilding accessZhiying Wang, Itzhak Tamo, Jehoshua Bruck. 1374-1381 [doi]
- Repair optimal erasure codes through hadamard designsDimitris S. Papailiopoulos, Alexandros G. Dimakis, Viveck R. Cadambe. 1382-1389 [doi]
- A preliminary look at error avoidance in digital logic via feedback equalizationZafar Takhirov, Bobak Nazer, Ajay Joshi. 1390-1391 [doi]
- Information theory meets circuit design: Why capacity-approaching codes require more chip area and powerPulkit Grover, Andrea Goldsmith, Anant Sahai, Jan M. Rabaey. 1392-1399 [doi]
- Cooling of 3D-IC using non-uniform micro-channels and sensor based dynamic thermal managementBing Shi, Ankur Srivastava. 1400-1407 [doi]
- On capacity and coding for segmented deletion channelsFeng Wang, Defne Aktas, Tolga M. Duman. 1408-1413 [doi]
- Gröbner bases for lattices and an algebraic decoding algorithmMalihe Aliasgari, Mohammad-Reza Sadeghi, Daniel Panario. 1414-1415 [doi]
- WOM codes against inter-cell interference in NAND memoriesQing Li. 1416-1423 [doi]
- Code design for type-I wiretap channel thanksMyounghae Hyun, Won Taek Song, Jinho Choi 0001, Seungjae Yoo, Jeongseok Ha. 1424-1429 [doi]
- Algebraic list-decoding of subspace codes with multiplicitiesHessam Mahdavifar, Alexander Vardy. 1430-1437 [doi]
- Matrix representations of trellises and enumerating trellis pseudocodewordsDavid Conti, Nigel Boston. 1438-1445 [doi]
- Robust scalable physical layer network codingKwang Taik Kim, Wonjong Noh, Vahid Tarokh. 1446-1453 [doi]
- Erasure correction for nested receiversÖmer Faruk Tekin, Svitlana Vyetrenko, Tracey Ho, Hongyi Yao. 1454-1461 [doi]
- Bounds and exact values in network encoding complexity with two sinksEaston Li Xu, Guangyue Han. 1462-1469 [doi]
- Function computation in networks: Duality and constant gap resultsJiening Zhan, Se-Yong Park, Michael Gastpar, Anant Sahai. 1470-1477 [doi]
- Network coding: Is zero error always possible?Michael Langberg, Michelle Effros. 1478-1485 [doi]
- Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approachFlorian Dörfler, Fabio Pasqualetti, Francesco Bullo. 1486-1491 [doi]
- Examining the limits of the application of semidefinite programming to power flow problemsBernard C. Lesieutre, Daniel K. Molzahn, Alexander R. Borden, Christopher L. DeMarco. 1492-1499 [doi]
- Asynchronous coordination of distributed energy resources for the provisioning of ancillary servicesChristoforos N. Hadjicostis, Themistoklis Charalambous. 1500-1507 [doi]
- Geometry of feasible injection region of power networksBaosen Zhang, David Tse. 1508-1515 [doi]
- Information for inferenceGe Xu, Biao Chen. 1516-1520 [doi]
- Sensing structure in learning-based binary classification of high-dimensional dataBurkay Orten, Prakash Ishwar, William Clement Karl, Venkatesh Saligrama. 1521-1528 [doi]
- Novel algorithms for distributed sequential hypothesis testingK. S. Jithin, V. Sharma. 1529-1536 [doi]
- Optimal sensor placement for intruder detection: New design principlesWaseem A. Malik, Nuno C. Martins, Ananthram Swami. 1537-1543 [doi]
- Space-time localization using times of arrivalSriram Venkateswaran, Upamanyu Madhow. 1544-1551 [doi]
- Sensor networks for diffusion fields: Detection of sources in space and timeIvan Dokmanic, Juri Ranieri, Amina Chebira, Martin Vetterli. 1552-1558 [doi]
- A state-space solution to the two-player decentralized optimal control problemLaurent Lessard, Sanjay Lall. 1559-1564 [doi]
- Exploration of misperceptions in hypergamesBahman Gharesifard, Jorge Cortes. 1565-1570 [doi]
- Risk-sensitive methods in deception gamesSrinivas Sridharan, William M. McEneaney. 1571-1575 [doi]
- Dynamic control design based on limited model informationFarhad Farokhi, Karl Henrik Johansson. 1576-1583 [doi]
- Harbor attack: A pursuit-evasion gameJean C. Walrand, Elijah Polak, Hoam Chung. 1584-1591 [doi]
- Utility optimal coding for packet transmission over wireless networks - Part I: Networks of binary symmetric channelsPremkumar Karumbu, Xiaomin Chen, Douglas J. Leith. 1592-1599 [doi]
- Utility optimal coding for packet transmission over wireless networks - Part II: Networks of packet erasure channelsPremkumar Karumbu, Xiaomin Chen, Douglas J. Leith. 1600-1606 [doi]
- Computation alignment: Capacity approximation without noise accumulationUrs Niesen, Bobak Nazer, Phil Whiting. 1607-1612 [doi]
- Low-complexity incremental use of multiple transmitters in wireless communication systemsPeyman Hesami, J. Nicholas Laneman. 1613-1618 [doi]
- Self-interference cancellation in multi-hop full-duplex networks via structured signalingEvan Everett, Debashis Dash, Chris Dick, Ashutosh Sabharwal. 1619-1626 [doi]
- Coverage and ergodic rate in K-tier downlink heterogeneous cellular networksHarpreet S. Dhillon, Radha Krishna Ganti, François Baccelli, Jeffrey G. Andrews. 1627-1632 [doi]
- A reinforcement learning optimization framework for cognitive interference networksMarco Levorato, Sina Firouzabadi, Andrea Goldsmith. 1633-1640 [doi]
- Large deviations on empirical service for erasure channels with memorySanthosh Kumar, Jean-François Chamberland, Henry D. Pfister. 1641-1648 [doi]
- Downlink SINR distribution in a heterogeneous cellular wireless network with max-SINR connectivitySayandev Mukherjee. 1649-1656 [doi]
- On the interference due to cooperative cognitive radios in the presence of multiple low-power primary usersPrasanna Madhusudhanan, Timothy X. Brown, Youjian Eugene Liu. 1657-1664 [doi]
- Robust joint optimization of MIMO two-way relay channels with imperfect CSIEbrahim A. Gharavol, Erik G. Larsson. 1657-1664 [doi]
- Continuum modeling and control of large nonuniform networksYang Zhang, Edwin K. P. Chong, Jan Hannig, Donald J. Estep. 1670-1677 [doi]
- Protocol coding with reordering of user resources: Capacity results for the Z-channelZoran Utkovski, Petar Popovski. 1678-1685 [doi]
- Nearest neighbour decoding with pilot-assisted channel estimation for fading multiple-access channelsA. Taufiq Asyhari, Tobias Koch, Albert Guillen i Fabregas. 1686-1693 [doi]
- Completion time in broadcast channel and interference channelYuanpeng Liu, Elza Erkip. 1694-1701 [doi]
- Investigations of noncoherent OOK based schemes with soft and hard decisions for WSNsPeng Zhang, Frans M. J. Willems, Li Huang. 1702-1709 [doi]
- Rate region of the vector Gaussian one-helper source-coding problemMd Saifur Rahman, Aaron B. Wagner. 1710-1717 [doi]
- Multilevel polarization of polar codes over arbitrary discrete memoryless channelsAria Ghasemian Sahebi, S. Sandeep Pradhan. 1718-1725 [doi]
- Secrecy transmission capacity of decentralized wireless networksXiangyun Zhou, Radha Krishna Ganti, Jeffrey G. Andrews, Are Hjørungnes. 1726-1732 [doi]
- Base-calling for Illumina's next-generation DNA sequencing systems via Viterbi algorithmShreepriya Das, Haris Vikalo. 1733-1736 [doi]
- Energy efficient neurons with generalized inverse Gaussian interspike interval durationsToby Berger, William B. Levy, Jie Xing. 1737-1742 [doi]
- RNA structure characterization from chemical mapping experimentsSharon Aviran, Julius B. Lucks, Lior Pachter. 1743-1750 [doi]
- Lossy Lempel-Ziv like compression algorithms for memoryless sourcesNarayana Prasad Santhanam, Dharmendra S. Modha. 1751-1756 [doi]
- Informational limits of neural circuitsLav R. Varshney, Devavrat Shah. 1757-1763 [doi]
- Minimum complexity pursuitShirin Jalali, Arian Maleki. 1764-1770 [doi]
- Minimizing weighted sum finish time for one-to-many file transfer in peer-to-peer networksBike Xie, Mihaela van der Schaar, Thomas A. Courtade, Richard D. Wesel. 1771-1778 [doi]
- Properties of the MMSE of "bad" codesRonit Bustin, Shlomo Shamai. 1779-1784 [doi]
- A study on relaying soft information with error prone relaysMehdi Mortazawi Molu, Norbert Goertz. 1785-1792 [doi]
- Exploiting route diversity in multi-packet transmission using mutual information accumulationYanpei Liu, Jing Yang 0002, Stark C. Draper. 1793-1800 [doi]
- Universal codes for the Gaussian MAC via spatial couplingArvind Yedla, Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan. 1801-1808 [doi]
- Privacy preserving data aggregating with multiple access channelHongyi Yao, Tracey Ho. 1809-1815 [doi]
- Asymptotic results on generalized Vandermonde matrices and their extreme eigenvaluesGabriel H. Tucci, Philip A. Whiting. 1816-1823 [doi]
- Go with the flow: Optical flow-based transport operators for image manifoldsAswin C. Sankaranarayanan, Chinmay Hegde, Sriram Nagaraj, Richard G. Baraniuk. 1824-1831 [doi]
- Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithmsChun Lam Chan, Pak Hou Che, Sidharth Jaggi, Venkatesh Saligrama. 1832-1839 [doi]
- Canonical estimation in a rare-events regimeMesrob I. Ohannessian, Vincent Y. F. Tan, Munther A. Dahleh. 1840-1847 [doi]
- Optimal combined detection and estimationGuido H. Jajamovich, Ali Tajer, Xiaodong Wang. 1848-1852 [doi]
- Nonparametric decision making based on tree-structured information aggregationJiayao Hu, Yingbin Liang, Eric P. Xing. 1853-1860 [doi]