Abstract is missing.
- Bias in Stochastic Approximation Cannot Be Eliminated With AveragingCaio Kalil Lauand, Sean Meyn. 1-4 [doi]
- A Concentration Bound for Distributed Stochastic ApproximationHarsh Dolhare, Vivek S. Borkar. 1-6 [doi]
- System Identification Entropy for Chen-Fliess Series and Their InterconnectionsW. Steven Gray. 1-6 [doi]
- Finite-Blocklength Results for the A-channel: Applications to Unsourced Random Access and Group TestingAlejandro Lancho, Alexander Fengler, Yury Polyanskiy. 1-8 [doi]
- Exploration. Exploitation, and Engagement in Multi-Armed Bandits with AbandonmentZixian Yang, Xin Liu, Lei Ying. 1-2 [doi]
- The Effects of Varying Charging Rates on Optimal Charging Station Choices for Electric VehiclesLihui Yi, Ermin Wei. 1-5 [doi]
- Model-Enhanced Localization of Forced Oscillation Using PMU DataBernard C. Lesieutre, Yasmine Abdennadher, Sandip Roy 0002. 1-8 [doi]
- Achievable Rate Regions for the Gaussian Broadcast Channel with Fixed Blocklength and Per User ReliabilityPaul Sheldon, Besma Smida, Natasha Devroye, Daniela Tuninetti. 1-6 [doi]
- Controlled Sensing with Corrupted CommandsMeng-Che Chang, Shi-Yuan Wang, Matthieu R. Bloch. 1-7 [doi]
- Multi-Message Private Information Retrieval: A Scalar Linear SolutionNingze Wang, Anoosheh Heidarzadeh, Alex Sprintson. 1-8 [doi]
- Multivariate Feature ExtractionXiangxiang Xu 0001, Lizhong Zheng. 1-8 [doi]
- Classifying Incomplete Data with a Mixture of Subspace ExpertsBen A. Kizaric, Daniel L. Pimentel-Alarcón. 1-8 [doi]
- Over-the-Air Federated Learning with Privacy Protection via Correlated Additive PerturbationsJialing Liao, Zheng Chen 0002, Erik G. Larsson. 1-8 [doi]
- Byzantine Resilience With Reputation ScoresJayanth Regatti, Hao Chen, Abhishek Gupta 0002. 1-8 [doi]
- An Error Exponent for the AWGN Channel with Decision Feedback and Lattice CodingKenneth Palacio-Baus, Natasha Devroye. 1-6 [doi]
- Active Learning for Individual Data via Minimal Stochastic ComplexityShachar Shayovitz, Meir Feder. 1-5 [doi]
- Schedule Based Temporal Difference AlgorithmsRohan Deb, Meet Gandhi, Shalabh Bhatnagar. 1-6 [doi]
- Rubik Tables, Stack Rearrangement, and Multi-Robot Path PlanningTeng Guo, Si Wei Feng, Mario Szegedy, Jingjin Yu. 1-4 [doi]
- Queueing Delay Minimization in Overloaded Networks via Rate ControlXinyu Wu, Dan Wu, Eytan H. Modiano. 1-8 [doi]
- Unbounded Gradients in Federated Learning with Buffered Asynchronous AggregationMohammad Taha Toghani, César A. Uribe. 1-8 [doi]
- Identifying Impactful Agents Via Faux Adversarial GamesCarmel Fiscko, Soummya Kar, Bruno Sinopoli. 1-7 [doi]
- Decentralized Online Influence MaximizationYigit E. Bayiz, Ufuk Topcu. 1-8 [doi]
- Finite-State Mutual DimensionAdam Case, Jack H. Lutz. 1-8 [doi]
- Risk-Aware Safe Optimal Control of Uncertain Linear SystemsPouria Tooranjipour, Bahare Kiumarsi, Hamidreza Modares. 1-5 [doi]
- GRAND: A Gradient-Related Ascent and Descent Algorithmic Framework for Minimax ProblemsXiaochun Niu, Ermin Wei. 1-2 [doi]
- Bounds on Reversible, Complement, Reversible-Complement, Constant Weight Sum CodesKrishna Gopal Benerjee, Adrish Banerjee. 1-8 [doi]
- An Information-Theoretic Analysis of Bayesian Reinforcement LearningAmaury Gouverneur, Borja Rodríguez Gálvez, Tobias J. Oechtering, Mikael Skoglund. 1-7 [doi]
- Grassmannian packings: Trust-region stochastic tuning for matrix incoherenceJosiah Park, Carlos Saltijeral, Ming Zhong. 1-6 [doi]
- Wholesale Market Participation of Storage with State-of-Charge Dependent BidsCong Chen, Lang Tong. 1-8 [doi]
- Adversarial Examples for Model-Based Control: A Sensitivity AnalysisPo-han Li, Ufuk Topcu, Sandeep P. Chinchali. 1-7 [doi]
- Trimmed Minimum Error Entropy for Robust Online RegressionSajjad Bahrami, Ertem Tuncel. 1-8 [doi]
- Extracting Unique Information Through Markov RelationsKeerthana Gurushankar, Praveen Venkatesh, Pulkit Grover. 1-6 [doi]
- On Learning a Hidden Directed Graph with Path QueriesMano Vikash Janardhanan, Lev Reyzin. 1-5 [doi]
- Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong LawAdrian Redder, Arunselvan Ramaswamy, Holger Karl. 1-8 [doi]
- Towards Optimal Primary- and Secondary-control Design for Networks with Generators and InvertersManish K. Singh, D. Venkatramanan, Sairaj V. Dhople. 1-6 [doi]
- Alternating Direction Method of Multipliers for Decomposable Saddle-Point ProblemsMustafa O. Karabag, David Fridovich-Keil, Ufuk Topcu. 1-8 [doi]
- Policy Gradient Based Entropic-VaR Optimization in Risk-Sensitive Reinforcement LearningXinyi Ni, Lifeng Lai. 1-6 [doi]
- Equilibrium analysis of game on heterogeneous networks with coupled activitiesJean-Baptiste Seby, Charles Harvey, Saurabh Amin. 1-8 [doi]
- Distributed Consensus-based Kalman Filter under Limited CommunicationDiego R. Benalcázar, Chinwendu Enyioha. 1-7 [doi]
- Commitment over Multiple-Access ChannelsRémi A. Chou, Matthieu R. Bloch. 1-6 [doi]
- Minimum-Length Trace Reconstruction via Integer ProgrammingHuanran Li, Daniel L. Pimentel-Alarcón. 1-8 [doi]
- Synchronized Stop and Re-Start in Distributed Average Consensus for Control and Coordination ApplicationsNicolaos E. Manitara, Christoforos N. Hadjicostis, Themistoklis Charalambous. 1-7 [doi]
- Multi-Pose Fusion for Sparse-View CT Reconstruction Using Consensus EquilibriumDiyu Yang, Craig A. J. Kemp, Gregery T. Buzzard, Charles A. Bouman. 1-5 [doi]
- Proximal Methods for Self-Healing and Exact Distributed Convex Optimization Extended abstractRandy A. Freeman. 1-7 [doi]
- Q-linear Convergence of Distributed Optimization with Barzilai-Borwein Step SizesIyanuoluwa Emiola, Chinwendu Enyioha. 1-8 [doi]
- On Sample Complexity of Learning Shared Representations: The Asymptotic RegimeXinyi Tong, Xiangxiang Xu 0001, Shao-Lun Huang. 1-8 [doi]
- Pricing, competition and market segmentation in ride hailingTushar Shankar Walunj, Shiksha Singhal, Veeraruna Kavitha, Jayakrishnan Nair. 1-8 [doi]
- Reinforcement Learning using Physics Inspired Graph Convolutional Neural NetworksTong Wu, Anna Scaglione, Daniel B. Arnold. 1-8 [doi]
- Repeated Games, Optimal Channel Capture, and Open Problems for Slotted Multiple AccessMichael J. Neely. 1-8 [doi]
- Degree Tables for Private Information RetrievalFatemeh Kazemi, Ningze Wang, Rafael G. L. D'Oliveira, Alex Sprintson. 1-8 [doi]
- ASUMAN: Age Sense Updating Multiple Access in NetworksPurbesh Mitra, Sennur Ulukus. 1-7 [doi]
- *Ivan Perez Avellaneda, Luis A. Duffaut Espinosa. 1-7 [doi]
- Learning-based Optimal Admission Control in a Single Server Queuing SystemYili Zhang, Asaf Cohen, Vijay G. Subramanian. 1-2 [doi]
- On the Limits of Distributed Agreement between Correlated SourcesJonathan Ponniah. 1-7 [doi]
- Throughput Optimized Random Access Channel AssignmentAbhinanda Dutta, Steven Weber 0001. 1-8 [doi]
- May the force be with youYulan Zhang, Anna C. Gilbert, Stefan Steinerberger. 1-8 [doi]
- An Interactive Search Game with Two AgentsXing Gao, Lev Reyzin. 1-8 [doi]
- Understanding the Generalization Power of Overfitted NTK Models: 3-layer vs. 2-layer (Extended Abstract)Peizhong Ju, Xiaojun Lin, Ness B. Shroff. 1-2 [doi]
- Compensating Network Dynamics in Grid-Forming ControlDominic Groß. 1-8 [doi]
- Learning Preference Distributions From Distance MeasurementsGokcan Tatli, Robert D. Nowak, Ramya Korlakai Vinayak. 1-8 [doi]
- Quickest Change Detection using Time Inconsistent Anticipatory and Quantum Decision ModelingVikram Krishnamurthy, Luke Snow. 1-8 [doi]
- Covering Properties of Sum-Rank Metric CodesCornelia Ott, Hedongliang Liu, Antonia Wachter-Zeh. 1-7 [doi]
- Oversquashing in GNNs through the lens of information contraction and graph expansionPradeep Kr. Banerjee, Kedar Karhadkar, Yuguang Wang 0001, Uri Alon 0002, Guido Montúfar. 1-8 [doi]
- Dynamic Performance of Unified Grid-Forming/Following Inverter ControlSijia Geng, Ian A. Hiskens. 1-8 [doi]
- Efficient Sequential UCB-based Hungarian Algorithm for Assignment ProblemsYuyang Shi, Yajun Mei. 1-8 [doi]
- *Anand Kalvit, Assaf Zeevi. 1-7 [doi]
- Practical Control Design for the Deep Learning Age: Distillation of Deep RL-Based ControllersNathan Dahlin, Kevin Chang, Krishna Chaitanya Kalagarla, Rahul Jain 0002, Pierluigi Nuzzo. 1-8 [doi]
- Secure Linear MDS Coded Matrix InversionNeophytos Charalambides, Mert Pilanci, Alfred O. Hero III. 1-8 [doi]
- On the Symmetries of the Deletion ChannelFrancisco Pernice. 1-6 [doi]
- Universal Policy Tracking: Scheduling for Wireless Networks with Delayed State ObservationBai Liu, Eytan H. Modiano. 1-8 [doi]
- Uncertainty in Biometric Identification and Authentication Systems with Strong SecrecyLinghui Zhou, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- Ensuring the Defense of Paths and Perimeters in Dynamic Defender-Attacker Blotto Games (dDAB) on GraphsBryce L. Ferguson, Daigo Shishika, Jason R. Marden. 1-7 [doi]
- Individual Altruism Cannot Overcome Congestion Effects in a Global Pandemic GamePhilip N. Brown, Brandon C. Collins, Colton Hill, Gia Barboza, Lisa Hines. 1-6 [doi]
- Optimal Discrimination Between Two Pure States and Dolinar-Type Coherent-State DetectionItamar Katz, Yuval Kochman. 1 [doi]
- Online Detection of Cascading Change-Points Using Diffusion NetworksRui Zhang 0053, Yao Xie 0002, Rui Yao, Feng Qiu. 1-6 [doi]
- A Kernel Analysis of Feature Learning in Deep Neural NetworksAbdulkadir Canatar, Cengiz Pehlevan. 1-8 [doi]
- The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash?Yunhan Huang, Tao Zhang 0011, Quanyan Zhu. 1-7 [doi]
- On the Sample Complexity of Stabilizing LTI Systems on a Single Trajectory (Extended Abstract)Yang Hu, Adam Wierman, Guannan Qu. 1-2 [doi]
- Decentralized Anomaly Detection via Deep Multi-Agent Reinforcement LearningHadar Szostak, Kobi Cohen. 1-4 [doi]
- Managing Resources in Multi-resource General Lotto GamesAdel Aghajan, Keith Paarporn, Jason R. Marden. 1-2 [doi]
- Distributed Online Non-convex Optimization with Composite RegretZhanhong Jiang, Aditya Balu, Xian Yeow Lee, Young M. Lee, Chinmay Hegde, Soumik Sarkar. 1-8 [doi]
- How to Charge Lightning: The Economics of Bitcoin Transaction ChannelsSimina Brânzei, Erel Segal-haLevi, Aviv Zohar. 1-8 [doi]
- Data-driven estimation of probabilistic constraints for network-safe distributed energy resource controlSunho Jang, Necmiye Ozay, Johanna L. Mathieu. 1-8 [doi]
- CoBAAF: Controlled Bayesian Air Aggregation Federated Learning from Heterogeneous DataTomer Gafni, Kobi Cohen, Yonina C. Eldar. 1-4 [doi]
- Evaluating interpretations of deep-learned error-correcting codesA. Mulgund, R. Shekhar, Natasha Devroye, György Turán, M. Zefran. 1-8 [doi]
- Hardness of Linear Index Coding on Perturbed InstancesDror Chawin, Ishay Haviv. 1-7 [doi]
- Permutation Codes for Correcting a Burst of at Most $t$ DeletionsShuche Wang, Yuanyuan Tang, Ryan Gabrys, Farzad Farnoud. 1-6 [doi]
- Quickest Detection of a Threat to an Impending DisasterTim Brucks, Taposh Banerjee, Rahul Mishra. 1-7 [doi]
- Linear Coding for Gaussian Two-Way ChannelsJunghoon Kim, Seyyedali Hosseinalipour, Taejoon Kim, David J. Love, Christopher G. Brinton. 1-8 [doi]