Abstract is missing.
- Secret key capacity for multipleaccess channel with public feedbackHimanshu Tyagi, Shun Watanabe. 1-7 [doi]
- ForewordTamer Basar, Olgica Milenkovic. 1 [doi]
- A hard-to-compress interactive task?Mark Braverman. 8-12 [doi]
- On hypercontractivity and the mutual information between Boolean functionsVenkat Anantharam, Amin Aminzadeh Gohari, Sudeep Kamath, Chandra Nair. 13-19 [doi]
- The mutual information of a class of graphical channelsEmmanuel Abbe, Andrea Montanari. 20-25 [doi]
- On dispersion of compound DMCsYury Polyanskiy. 26-32 [doi]
- Online optimization in parametric dynamic environmentsEric C. Hall, Rebecca Willett. 33-38 [doi]
- Optimal decentralized control problem as a rank-constrained optimizationJavad Lavaei. 39-45 [doi]
- Peak-minimizing online EV chargingShizhen Zhao, Xiaojun Lin, Minghua Chen. 46-53 [doi]
- Risky power forward contracts for wind aggregationYue Zhao, Junjie Qin, Ram Rajagopal, Andrea Goldsmith, H. Vincent Poor. 54-61 [doi]
- Optimal investment of conventional and renewable generation assetsDesmond W. H. Cai, Yunjian Xu, Steven H. Low. 62-69 [doi]
- A receding horizon control law for harbor defenseSeungho Lee, Elijah Polak, Jean C. Walrand. 70-77 [doi]
- Approximation of stationary control policies by quantized control in Markov decision processesNaci Saldi, Tamás Linder, Serdar Yüksel. 78-84 [doi]
- Spectrum sharing policies for heterogeneous delay-sensitive users: A novel design frameworkYuanzhang Xiao, Mihaela van der Schaar. 85-92 [doi]
- Convex control design via covariance minimizationKrishnamurthy Dvijotham, Emanuel Todorov, Maryam Fazel. 93-99 [doi]
- A distributed continuous-time gradient dynamics approach for the active power loss minimizationsXu Ma, Nicola Elia. 100-106 [doi]
- Learning the causal graph of Markov time seriesAvhishek Chatterjee, Ankit Singh Rawat, Sriram Vishwanath, Sujay Sanghavi. 107-114 [doi]
- On the privacy-cost tradeoff of an in-home power storage mechanismJiyun Yao, Parv Venkitasubramaniam. 115-122 [doi]
- Proportional fairness in heterogeneous peer-to-peer networks through reciprocity and Gibbs samplingMartin Zubeldia, Andrés Ferragut, Fernando Paganini. 123-130 [doi]
- Double hashing thresholds via local weak convergenceMathieu Leconte. 131-137 [doi]
- Fairness via priority schedulingVeeraruna Kavitha, N. Hemachandra, Debayan Das. 138-145 [doi]
- Generalized proportional allocation mechanism design for multi-rate multicast service on the InternetAbhinav Sinha, Achilleas Anastasopoulos. 146-153 [doi]
- Non-homogeneous hidden Markov chain models for wavelet-based hyperspectral image processingMarco F. Duarte, Mario Parente. 154-159 [doi]
- Pilot signal design via constrained optimization with application to delay-Doppler shift estimation in OFDM systemsLishuai Jing, Troels Pedersen, Bernard H. Fleury. 160-166 [doi]
- Markov processes: Estimation in the undersampled regimeMeysam Asadi, Ramezan Paravi Torghabeh, Narayana P. Santhanam. 167-172 [doi]
- Energy disaggregation via adaptive filteringRoy Dong, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry. 173-180 [doi]
- Blind phase/frequency synchronization with low-precision ADC: A Bayesian approachAseem Wadhwa, Upamanyu Madhow. 181-188 [doi]
- Non-coherence in estimation and controlGireeja Ranade, Anant Sahai. 189-196 [doi]
- Modular filters based on filter sharpening and optimal minimax designSefa Demirtas, Alan V. Oppenheim. 197-202 [doi]
- An achievable rate region for Gaussian interference channel with intermittent feedbackCan Karakus, I-Hsiang Wang, Suhas N. Diggavi. 203-210 [doi]
- Communication requirements for secure computationDeepesh Data, Vinod M. Prabhakaran. 211-217 [doi]
- A rank ratio inequality and the linear degrees of freedom of X-channel with delayed CSITSina Lashgari, Amir Salman Avestimehr, Changho Suh. 218-225 [doi]
- Pilot contamination precoding for interference reduction in large scale antenna systemsLiangbin Li, Alexei E. Ashikhmin, Thomas L. Marzetta. 226-232 [doi]
- A new upper-bounding technique for a primitive relay channel based on channel simulationFeng Xue. 233-239 [doi]
- Wiretap channel with causal state information and secure rate-limited feedbackAlejandro Cohen, Asaf Cohen. 240-247 [doi]
- Fragility and robust design of optimal auctionsGeorgios Kotsalis, Jeff S. Shamma. 248-253 [doi]
- A separation signal for heterogeneous networksJean-Pierre de la Croix, Magnus Egerstedt. 254-261 [doi]
- Optimal plug-in electric vehicle charging with schedule constraintsAndres Cortes, Sonia Martínez. 262-266 [doi]
- A distributed algorithm for solving a linear algebraic equationShaoshuai Mou, Ji Liu, A. Stephen Morse. 267-274 [doi]
- A multi-agent projected dual gradient method with primal convergence guaranteesJie Lu, Mikael Johansson. 275-281 [doi]
- Successive integer-forcing and its sum-rate optimalityOr Ordentlich, Uri Erez, Bobak Nazer. 282-292 [doi]
- Massive MU-MIMO downlink TDD systems with linear precoding and downlink pilotsHien Quoc Ngo, Erik G. Larsson, Thomas L. Marzetta. 293-298 [doi]
- Complex low density lattice codes for the 2×2 MIMO fading channelYair Yona, Meir Feder. 299-306 [doi]
- Statistical CSI based zero-forcing beamforming for cooperative two-cell downlink transmissionJing Xu, Jiangyuan Li, Yizhai Zhang. 307-314 [doi]
- Approximate capacity of the K-user fading MIMO MAC with common informationHenry P. Romero, Mahesh K. Varanasi. 315-319 [doi]
- Distributed storage allocation for heterogeneous systemsZhao Li, Tracey Ho, Derek Leong, Hongyi Yao. 320-326 [doi]
- On prioritized coding for real-time streaming under packet erasuresYunkai Wei, Tracey Ho. 327-334 [doi]
- Anytime characteristics of spatially coupled codeMd. Noor-A.-Rahim, Khoa D. Nguyen, Gottfried Lechner. 335-341 [doi]
- On the convergence speed of spatially coupled LDPC ensemblesVahid Aref, Laurent Schmalen, Stephan ten Brink. 342-349 [doi]
- Delete-and-Conquer: Rateless coding with constrained feedbackMorteza Hashemi, Ari Trachtenberg, Yuval Cassuto. 350-357 [doi]
- Decentralized decision-making on robotic networks with hybrid performance metricsFederico Rossi, Marco Pavone. 358-365 [doi]
- Examples of distance-based synchronization: An extremum seeking approachHans-Bernd Durr, Milos S. Stankovic, Karl Henrik Johansson, Christian Ebenbauer. 366-373 [doi]
- Optimal decentralized control in unidirectional one-step delayed sharing patternNaumaan Nayyar, Dileep M. Kalathil, Rahul Jain. 374-380 [doi]
- Privacy in stochastic control: A Markov Decision Process perspectiveParv Venkitasubramaniam. 381-388 [doi]
- Strategic information dissemination in endogenous networksYu Zhang, Mihaela van der Schaar. 389-396 [doi]
- Searching and bargaining with middlemenThanh Nguyen, Vijay G. Subramanian, Randall Berry. 397 [doi]
- A Stackelberg game model for Plug-in Electric Vehicles in a Smart GridShuvomoy Das Gupta, Lacra Pavel. 398-405 [doi]
- Truthful and non-monetary mechanism for direct data exchangeI-Hong Hou, Yu-Pin Hsu, Alex Sprintson. 406-412 [doi]
- CApacity provisioning and PRIcing for cloud computing with energy cappingMarco Polverini, Shaolei Ren, Antonio Cianfrani. 413-420 [doi]
- Decentralized coded caching attains order-optimal memory-rate tradeoffMohammad Ali Maddah-Ali, Urs Niesen. 421-427 [doi]
- Fast multi-channel Gibbs-sampling for low-overhead distributed resource allocation in OFDMA cellular networksPo-Kai Huang, Xiaojun Lin, Ness B. Shroff, David J. Love. 428-435 [doi]
- Delay analysis of the Max-Weight policy under heavy-tailed traffic via fluid approximationsMihalis G. Markakis, Eytan Modiano, John N. Tsitsiklis. 436-444 [doi]
- Optimal denoising of simultaneously sparse and low rank matrices in high dimensionsAndreas Buja, Zongming Ma, Dan Yang. 445-447 [doi]
- A heterogeneous routing gameFarhad Farokhi, Walid Krichene, Alexandre M. Bayen, Karl Henrik Johansson. 448-455 [doi]
- Adaptive traffic light controlChristos G. Cassandras, Yanfeng Geng. 456-463 [doi]
- On maximally stabilizing adaptive traffic signal controlKetan Savla, Enrico Lovisari, Giacomo Como. 464-471 [doi]
- Estimating fuel consumption and emissions via traffic data from mobile sensorsBenedetto Piccoli, Ke Han, Terry L. Friesz, Tao Yao. 472-477 [doi]
- Exact solutions to robust control problems involving scalar hyperbolic conservation laws using Mixed Integer Linear ProgrammingYanning Li, Edward S. Canepa, Christian G. Claudel. 478-485 [doi]
- Nonparametric dynamics estimation for time periodic systemsEdgar D. Klenske, Melanie Nicole Zeilinger, Bernhard Schölkopf, Philipp Hennig. 486-493 [doi]
- On optimal foraging and multi-armed banditsVaibhav Srivastava, Paul Reverdy, Naomi Ehrich Leonard. 494-499 [doi]
- Sparse structured associative memories as efficient set-membership data structuresVincent Gripon, Vitaly Skachek, Michael Rabbat. 500-505 [doi]
- Weight convergence of SpikeProp and adaptive learning rateSumit Bam Shrestha, Qing Song. 506-511 [doi]
- Learning optimal classifier chains for real-time big data miningJie Xu, Cem Tekin, Mihaela van der Schaar. 512-519 [doi]
- Continuous-time distributed optimization of homogenous dynamicsGuodong Shi, Alexandre Proutiere, Karl Henrik Johansson. 520-527 [doi]
- A separation principle for decentralized state-feedback optimal controlLaurent Lessard. 528-534 [doi]
- Resource sharing games with failures and heterogeneous risk attitudesAshish R. Hota, Siddharth Garg, Shreyas Sundaram. 535-542 [doi]
- Distributed aspects of the artificial pancreasStephen D. Patek, Sanjian Chen, Patrick Keith-Hynes, Insup Lee. 543-550 [doi]
- A generalized battery model of a collection of Thermostatically Controlled Loads for providing ancillary serviceHe Hao, Borhan Molazem Sanandaji, Kameshwar Poolla, Tyrone L. Vincent. 551-558 [doi]
- Approximate theoretical models for TCP connections using different high speed congestion control algorithms in a multihop networkSudheer Poojary, Vinod Sharma. 559-566 [doi]
- Bounds on inferenceFlávio du Pin Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy, Stefano Tessaro. 567-574 [doi]
- An infinite server system with general packing constraints: Asymptotic optimality of a greedy randomized algorithmAlexander L. Stolyar, Yuan Zhong. 575-582 [doi]
- On the second-order coding rate of non-ergodic fading channelsEbrahim MolavianJazi, J. Nicholas Laneman. 583-587 [doi]
- Second-order rate region of constant-composition codes for the multiple-access channelJonathan Scarlett, Alfonso Martinez, Albert Guillen i Fabregas. 588-593 [doi]
- On the corner points of the capacity region of a two-user Gaussian interference channelIgal Sason. 594-598 [doi]
- Bounds on the capacity region of a class of multiple access interference channelsYimin Pang, Mahesh K. Varanasi. 599-606 [doi]
- On the capacity of the modulo lattice channelsHamed Mirghasemi, Jean-Claude Belfiore. 607-614 [doi]
- Capacity of the K-user discrete memoryless multiple access channel with common information and with or without stateHenry P. Romero, Mahesh K. Varanasi. 615-620 [doi]
- On the poset structure of floating codesMochan Shrestha, Lihao Xu. 621-628 [doi]
- Folded tree maximum-likelihood decoder for Kronecker product-based codesSinan Kahraman, Emanuele Viterbo, Mehmet Ertugrul Çelebi. 629-636 [doi]
- Improved bounds and constructions for granular media codingArtyom Sharov, Ron M. Roth. 637-644 [doi]
- Lowest density MDS array codes on incomplete graphsMagnus Sandell, Filippo Tosato. 645-652 [doi]
- Iterative detection and decoding for the four-rectangular-grain TDMR modelMichael Carosino, Yiming Chen, Benjamin Belzer, Krishnamoorthy Sivakumar, Jacob Murray, Paul Wettin. 653-659 [doi]
- Polar codes are optimal for write-efficient memoriesQing Li, Anxiao Jiang. 660-667 [doi]
- Capacity performance of multicell large-scale antenna systemsHong Yang, Thomas L. Marzetta. 668-675 [doi]
- On the incompatibility of connectivity and local pooling in Erdős-Rényi GraphsJeffrey Wildman, Steven Weber. 676-683 [doi]
- Half-duplex and full-duplex distributed relay systems under power constraintsKanghee Lee, Hyuck M. Kwon, M. Edwin Sawan, Hyuncheol Park, Yong-Hwan Lee. 684-689 [doi]
- Multicasting for wireless video-on-demandMd Saifur Rahman, Aaron B. Wagner. 690-697 [doi]
- The throughput of slotted aloha with diversityAndrea Munari, Michael Heindlmaier, Gianluigi Liva, Matteo Berioli. 698-706 [doi]
- Game theoretic design of MAC protocols: Pricing and intervention in slotted-AlohaLuca Canzian, Yuanzhang Xiao, Michele Zorzi, Mihaela van der Schaar. 707-714 [doi]
- On the channel-sensitive delay behavior of LIFO-backpressureWei Si, David Starobinski. 715-722 [doi]
- Transient flow level models for interference-coupled cellular networksDavid Ohmann, Albrecht J. Fehske, Gerhard Fettweis. 723-730 [doi]
- When do redundant requests reduce latency ?Nihar B. Shah, Kangwook Lee, Kannan Ramchandran. 731-738 [doi]
- Scheduling in cooperative cognitive radio networksDibakar Das, Alhussein A. Abouzeid, Marian Codreanu. 739-746 [doi]
- Batch job scheduling for Reducing Water footprints in data centerShaolei Ren. 747-754 [doi]
- Bits through bufferless queuesMehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa. 755-762 [doi]
- Networked cyber-physical systems: Interdependence, resilience and information exchangeQuanyan Zhu, Linda Bushnell. 763-769 [doi]
- On the secure interference channelAnelia Somekh-Baruch. 770-773 [doi]
- How many antennas does a cooperative jammer need for achieving the degrees of freedom of multiple antenna Gaussian channels in the presence of an eavesdropper?Mohamed S. Nafea, Aylin Yener. 774-780 [doi]
- Why cyber-insurance contracts fail to reflect cyber-risksGalina Schwartz, Nikhil Shetty, Jean C. Walrand. 781-787 [doi]
- On the interior points of the storage-repair bandwidth tradeoff of regenerating codesBirenjith Sasidharan, P. Vijay Kumar. 788-795 [doi]
- Matroid bounds on the region of entropic vectorsCongduan Li, John MacLaren Walsh, Steven Weber. 796-803 [doi]
- Groups and information inequalities in 5 variablesNadya Markin, Eldho K. Thomas, Frédérique E. Oggier. 804-809 [doi]
- Superadditivity of quantum channel coding rate with finite blocklength quantum measurementsHye Won Chung, Lizhong Zheng. 810-817 [doi]
- Information rates in the optical nonlinear phase noise channelRonen Dar, Mark Shtaif, Meir Feder. 818-823 [doi]
- An outer bound of the capacity region of biometric systems under keys, secrets, and privacy requirementsPo-Hsiang Lai, Joseph A. O'Sullivan. 824-831 [doi]
- Generalized cut-set bounds for broadcast networksAmir Salimi, Tie Liu, Shuguang Cui. 832-838 [doi]
- How to sleep, control and transfer data in an energy constrained wireless sensor networkVijay Venkateswaran, Irwin O. Kennedy. 839-846 [doi]
- Network observability and localization of the source of diffusion based on a subset of nodesSabina Zejnilovic, Joao Gomes, Bruno Sinopoli. 847-852 [doi]
- The Central Detection Officer problem: SALSA detector and performance guaranteesXiao Li, H. Vincent Poor, Anna Scaglione. 853-860 [doi]
- A new graph model with random edge values: Connectivity and diameterRichard J. La, Maya Kabkab. 861-868 [doi]
- Correlated sources with actionsOron Sabag, Asaf Cohen, Haim H. Permuter. 869-874 [doi]
- Non-asymptotic bounds on fixed length source coding for Markov chainsMasahito Hayashi, Shun Watanabe. 875-882 [doi]
- Efficient similarity queries via lossy compressionIdoia Ochoa, Amir Ingber, Tsachy Weissman. 883-889 [doi]
- Results on the optimal memory-assisted universal compression performance for mixture sourcesAhmad Beirami, Mohsen Sardari, Faramarz Fekri. 890-895 [doi]
- Interactive function computation with reconstruction constraintsFarideh Ebrahim Rezagah, Elza Erkip. 896-900 [doi]
- Distortion rate function of sub-Nyquist sampled Gaussian sources corrupted by noiseAlon Kipnis, Andrea J. Goldsmith, Tsachy Weissman, Yonina C. Eldar. 901-908 [doi]
- Joint control of transmission power and channel switching against adaptive jammingQingsi Wang, Mingyan Liu. 909-916 [doi]
- Characterization and computation of local Nash equilibria in continuous gamesLillian J. Ratliff, Samuel Burden, S. Shankar Sastry. 917-924 [doi]
- A dynamic VCG mechanism for random allocation spacesMaximilian Balandat, Claire J. Tomlin. 925-931 [doi]
- Nonstationary resource sharing with imperfect binary feedback: An optimal design framework for cost minimizationYuanzhang Xiao, Mihaela van der Schaar. 932-939 [doi]
- Queue length as an implicit communication channelSe-Yong Park, Anant Sahai. 940-947 [doi]
- Polytope codes for large-alphabet channelsXiaoqing Fan, Aaron B. Wagner, Ebad Ahmed. 948-955 [doi]
- A derivation of the asymptotic random-coding prefactorJonathan Scarlett, Alfonso Martinez, Albert Guillen i Fabregas. 956-961 [doi]
- On exploiting algebraic structure in control of finite state machinesDanielle C. Tarraf. 962-965 [doi]
- A bridge between decentralized and coordination controlJan Komenda, Tomás Masopust. 966-972 [doi]
- A model checking framework for linear time invariant switching systems using structural systems analysisGuilherme Ramos, Sergio Daniel Pequito, A. Pedro Aguiar, Jaime Ramos, Soummya Kar. 973-980 [doi]
- Robust supervisory control of networked discrete event systemsFei Wang, Shaolong Shu, Feng Lin. 981-988 [doi]
- Probability bounds for false alarm analysis of fault detection systemsBin Hu, Peter Seiler. 989-995 [doi]
- Robust structure estimation of maximum causal entropy processesBrian D. Ziebart. 996-1001 [doi]
- The squared-error of generalized LASSO: A precise analysisSamet Oymak, Christos Thrampoulidis, Babak Hassibi. 1002-1009 [doi]
- A rank minimization algorithm to enhance semidefinite relaxations of Optimal Power FlowRaphael Louca, Peter Seiler, Eilyan Bitar. 1010-1020 [doi]
- Power system structure and confidentiality preserving transformation of Optimal Power Flow problemAlexander R. Borden, Daniel K. Molzahn, Bernard C. Lesieutre, Parmeswaran Ramanathan. 1021-1028 [doi]
- Incentive design for Direct Load Control programsMahnoosh Alizadeh, Yuanzhang Xiao, Anna Scaglione, Mihaela van der Schaar. 1029-1036 [doi]
- The redistribution of power flow in cascading failuresChengdi Lai, Steven H. Low. 1037-1044 [doi]
- Phase and power estimation for per-hop multi-user detection in frequency-hopping systemsDavid Qiu, Thomas C. Royster IV, Frederick J. Block. 1045-1051 [doi]
- Non-coherent multi-user detection of DPSK signals after differential demodulationDavid Qiu, Frederick J. Block. 1052-1058 [doi]
- The Incidence and Cross methods for efficient radar detectionAlexander Fish, Shamgar Gurevich. 1059-1066 [doi]
- Capacity analysis of uplink multi-user SC-FDMA system with frequency-dependent I/Q imbalanceAamir Ishaque, Pranav Sakulkar, Gerd Ascheid. 1067-1074 [doi]
- Reliable uncoded communication in the underdetermined SIMO MAC with low-complexity decodingMainak Chowdhury, Andrea Goldsmith, Tsachy Weissman. 1075-1081 [doi]
- A Lyapunov optimization approach to repeated stochastic gamesMichael J. Neely. 1082-1089 [doi]
- Road traffic networks: Optimal transport and incentivesChinmoy Mandayam, Balaji Prabhakar. 1090-1097 [doi]
- Asymptotic optimality results for controlled sequential estimationGeorge Atia, Shuchin Aeron. 1098-1105 [doi]
- Even symmetric parallel linear deterministic interference channels are inseparablePritam Mukherjee, Ravi Tandon, Sennur Ulukus. 1106-1113 [doi]
- Estimation over the collision channel: Structural resultsMarcos M. Vasconcelos, Nuno C. Martins. 1114-1119 [doi]
- Distributed linear estimation of dynamic random fieldsSubhro Das, José M. F. Moura. 1120-1125 [doi]
- Visual attributes for enhanced human-machine communicationDevi Parikh. 1126-1127 [doi]
- Extrinsic Jensen-Shannon divergence and noisy Bayesian active learningMohammad Naghshvar, Tara Javidi, Kamalika Chaudhuri. 1128-1135 [doi]
- Approximate capacity of the two-user MISO Broadcast Channel with delayed CSITAlireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. 1136-1143 [doi]
- K-user symmetric MIMO distributed full-duplex network via wireless side-channelsJingwen Bai, Chris Dick, Ashutosh Sabharwal. 1144-1151 [doi]
- Degrees of freedom region for MIMO interference channel with limited receiver cooperationMehdi Ashraphijuo, Vaneet Aggarwal, Xiaodong Wang. 1152-1158 [doi]
- Degrees of freedom of the MIMO rank-deficient interference channel with feedbackSung Ho Chae, Changho Suh, Sae-Young Chung. 1159-1165 [doi]
- On the optimality of treating interference as noiseChunhua Geng, Navid Naderializadeh, Amir Salman Avestimehr, Syed A. Jafar. 1166-1173 [doi]
- Asymmetric compute-and-forwardVasileios Ntranos, Viveck R. Cadambe, Bobak Nazer, Giuseppe Caire. 1174-1181 [doi]
- Smart data pricing for the Internet: Agenda & research directionsSoumya Sen. 1182-1187 [doi]
- Market structures for wireless services with shared spectrumRandall Berry, Michael L. Honig, Vijay G. Subramanian, Thanh Nguyen, Rakesh Vohra. 1188-1191 [doi]
- Fostering wireless spectrum sharing via subsidizationMurat Yuksel, Thomas Quint, Ismail Güvenç, Walid Saad, Naim Kapucu. 1192-1199 [doi]
- Stable real-time pricing and scheduling for serving opportunistic users with deferrable loadsOzgur Dalkilic, Atilla Eryilmaz, Xiaojun Lin. 1200-1207 [doi]
- Implementing sponsored content in wireless data networksMatthew Andrews. 1208-1212 [doi]
- A practical framework for efficient file synchronizationNicolas Bitouze, Frederic Sala, S. M. Sadegh Tabatabaei Yazdi, Lara Dolecek. 1213-1220 [doi]
- An improvement of the deletion channel capacity upper boundMojtaba Rahmati, Tolga M. Duman. 1221-1225 [doi]
- Efficient interactive algorithms for file synchronization under general editsRamji Venkataramanan, Vasuki Narasimha Swamy, Kannan Ramchandran. 1226-1233 [doi]
- GROTESQUE: Noisy Group Testing (Quick and Efficient)Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi. 1234-1241 [doi]
- Compressed sensing of streaming dataNikolaos M. Freris, Orhan Öçal, Martin Vetterli. 1242-1249 [doi]
- A fast Hadamard transform for signals with sub-linear sparsityRobin Scheibler, Saeid Haghighatshoar, Martin Vetterli. 1250-1257 [doi]
- Sample-optimal average-case sparse Fourier Transform in two dimensionsBadih Ghazi, Haitham Hassanieh, Piotr Indyk, Dina Katabi, Eric Price, Lixin Shi. 1258-1265 [doi]
- Guarantees of total variation minimization for signal recoveryJian-Feng Cai, Weiyu Xu. 1266-1271 [doi]
- Adaptive stochastic convex optimization over networksZaid J. Towfic, Ali H. Sayed. 1272-1277 [doi]
- A routing problem in a simple queueing system with non-classical information structureYi Ouyang, Demosthenis Teneketzis. 1278-1284 [doi]
- Fusion center feedback for quasi-decentralized estimation in Sensor NetworksNicolò Michelusi, Urbashi Mitra. 1285-1291 [doi]
- The Gaussian two-way diamond channelPrathyusha V, Srikrishna Bhashyam, Andrew Thangaraj. 1292-1299 [doi]
- Capacity to within a constant gap for a class of Interference Relay ChannelsGermán Bassi, Pablo Piantanida, Sheng Yang. 1300-1306 [doi]
- The state-dependent broadcast channel with cooperationLior Dikstein, Haim H. Permuter, Yossef Steinberg. 1307-1313 [doi]
- An analysis of the joint compute-and-forward decoder for the binary-input two-way relay channelBrett Hern, Krishna R. Narayanan. 1314-1320 [doi]
- The generalized degrees of freedom of the interference relay channel with strong interferenceSoheyl Gherekhloo, Anas Chaaban, Aydin Sezgin. 1321-1328 [doi]
- Optimal jamming Over additive noise: Vector source-channel caseEmrah Akyol, Kenneth Rose. 1329-1335 [doi]
- Distributed stopping in average consensus via event-triggered strategiesNicolaos Manitara, Christoforos N. Hadjicostis. 1336-1343 [doi]
- Stochastic models and control for electrical power line temperatureDaniel Bienstock, Jose H. Blanchet, Juan Li. 1344-1348 [doi]
- Applicability of topology control algorithms (TCA) to a real-size power systemEvgeniy Goldis, Xiaoguang Li, Michael C. Caramanis, Bhavana Keshavamurthy, Mahendra Patel, Aleksandr Rudkevich, Pablo A. Ruiz. 1349-1352 [doi]
- Retail pricing for stochastic demand with unknown parameters: An online machine learning approachLiyan Jia, Qing Zhao, Lang Tong. 1353-1358 [doi]
- Virtual Oscillator Control for voltage source invertersSairaj V. Dhople, Brian B. Johnson, Abdullah O. Hamadeh. 1359-1363 [doi]
- Contagion and observability in security domainsYoram Bachrach, Moez Draief, Sanjeev Goyal. 1364-1371 [doi]
- Optimal distributed scheduling in wireless networks under SINR interference modelPrasanna Chaporkar, Alexandre Proutière. 1372-1379 [doi]
- Small cell networks: Speed based power allocationVeeraruna Kavitha, Véronique Capdevielle, Manu K. Gupta. 1380-1387 [doi]
- Distributed power control in femto cells using Bayesian density trackingAhmed Farhan Hanif, Hamidou Tembine, Mohamad Assaad, Djamal Zeghlache. 1388-1393 [doi]
- Renewable energy scheduling for fading channels with maximum power constraintZhe Wang, Vaneet Aggarwal, Xiaodong Wang. 1394-1400 [doi]
- Analysis and design of spectrum sharing in cognitive femtocell networksXiangwei Zhou, Hayder Al-Hraishawi, Yupeng Jia. 1401-1407 [doi]
- Channel-adaptive spectrum detection and sensing strategy for Cognitive Radio ad-hoc networksYuan Lu, Alexandra Duel-Hallen. 1408-1414 [doi]
- Quantized auction schemes for secondary spectrum marketsDeepan Palguna, David J. Love, Ilya Pollak. 1415-1421 [doi]
- Performance analysis of coexisting secondary users in heterogeneous cognitive radio networkXiaohua Li, Chengyu Xiong. 1422-1426 [doi]
- Nearly optimal sample size in hypothesis testing for high-dimensional regressionAdel Javanmard, Andrea Montanari. 1427-1434 [doi]
- Distributed online Big Data classification using context informationCem Tekin, Mihaela van der Schaar. 1435-1442 [doi]
- Compressed hypothesis testing: To mix or not to mix?Weiyu Xu, Lifeng Lai. 1443-1449 [doi]
- Sparse signal recovery under Poisson statisticsDelaram Motamedvaziri, Mohammad H. Rohban, Venkatesh Saligrama. 1450-1457 [doi]
- Efficient probabilistic group testing based on traitor tracingThijs Laarhoven. 1458-1465 [doi]
- Time-variant regularization in affine projection algorithmsAmadou Ba, Sean McKenna. 1466-1473 [doi]
- Cloud K-SVD: Computing data-adaptive representations in the cloudHaroon Raja, Waheed U. Bajwa. 1474-1481 [doi]
- The maximum likelihood approach to voting on social networksVincent Conitzer. 1482-1487 [doi]
- CP-nets with indifferenceThomas E. Allen. 1488-1495 [doi]
- Social group utility maximization game with applications in mobile social networksXiaowen Gong, Xu Chen, Junshan Zhang. 1496-1500 [doi]
- Credibility optimization and power control for secure mobile crowdsourcingKishwar Ahmed, Shaolei Ren, Vance Turnewitsch, Athanasios V. Vasilakos. 1501-1508 [doi]
- Group learning and opinion diffusion in a broadcast networkYang Liu, Mingyan Liu. 1509-1516 [doi]
- Secure network coding with erasures and feedbackLászló Czap, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi. 1517-1524 [doi]
- Index coding problem with side information repositoriesKarthikeyan Shanmugam, Alexandros G. Dimakis, Giuseppe Caire. 1525-1530 [doi]
- Complexity and rate-distortion tradeoff via successive refinementAlbert No, Amir Ingber, Tsachy Weissman. 1531-1536 [doi]
- On a capacity equivalence between multiple multicast and multiple unicastM. F. Wong, Michael Langberg, Michelle Effros. 1537-1544 [doi]
- On the capacity of sum-networksBrijesh Kumar Rai, Niladri Das. 1545-1552 [doi]
- Duality codes and the integrality gap bound for index codingHao Yu, Michael J. Neely. 1553-1560 [doi]
- On the structure of approximately optimal schedules for half-duplex diamond networksSiddhartha Brahma, Christina Fragouli, Ayfer Özgür. 1561-1566 [doi]
- Double bracket flows, toda flows and rigid body todaAnthony M. Bloch, François Gay-Balmaz, Tudor S. Ratiu. 1567-1572 [doi]
- Topological obstructions to distributed feedback stabilizationAbdol-Reza Mansouri. 1573-1575 [doi]
- Equivariant Morse theory and formation controlUwe Helmke, Brian D. O. Anderson. 1576-1583 [doi]
- Structure and geometry of minimum-time trajectories for planar rigid bodiesAndrei A. Furtuna, Weifu Wang, Yu-Han Lyu, Devin J. Balkcom. 1584-1591 [doi]
- Local privacy and statistical minimax ratesJohn C. Duchi, Michael I. Jordan, Martin J. Wainwright. 1592 [doi]
- Differential privacy, equilibrium, and efficient allocation of resourcesAaron Roth. 1593-1597 [doi]
- A Bayesian method for matching two similar graphs without seedsPedram Pedarsani, Daniel R. Figueiredo, Matthias Grossglauser. 1598-1607 [doi]
- Privacy as a coordination gameArpita Ghosh, Katrina Ligett. 1608-1615 [doi]
- De-anonymizing private data by matching statisticsJayakrishnan Unnikrishnan, Farid Movahedi Naini. 1616-1623 [doi]
- Robust subspace iteration and privacy-preserving spectral analysisMoritz Hardt. 1624-1626 [doi]
- Privacy-utility tradeoff under statistical uncertaintyAli Makhdoumi, Nadia Fawaz. 1627-1634 [doi]