Abstract is missing.
- Linear-Time Scheduling for Time-Varying Wireless Networks via RandomizationQuang Minh Nguyen, Eytan H. Modiano. 1-8 [doi]
- Multi-Functional Distributed ComputingDerya Malak, Mohammad Reza Deylam Salehi, Berksan Serbetci, Petros Elia. 1-8 [doi]
- Structured Regularization for SPD Optimization with Side InformationAndrew Cheng, Melanie Weber 0001. 1-8 [doi]
- Exploring Feasible Transition from Local to Global Optima in Power SystemsBernard C. Lesieutre, Yiwen Gu, Patrick Panciatici. 1-8 [doi]
- A Hypothesis Testing-based Framework for Cyber Deception with SludgingAbhinav Kumar, Swastik Brahma, Baocheng Geng, Charles A. Kamhoua, Pramod K. Varshney. 1-8 [doi]
- Distributed Quantized Algorithms in Adversarial NetworksIyanuoluwa Emiola, Chinwendu Enyioha. 1-8 [doi]
- Traffic-driven Spectrum and Power Allocation via Scalable Multi-Agent Reinforcement LearningYiming Zhang, Dongning Guo. 1-8 [doi]
- Lossless Binary Image Compression Using Learned Multi-Level DictionariesSamar Agnihotri, Renu M. Rameshan, Ritwik Ghosal, Prerit Gupta. 1-8 [doi]
- A Masked Pruning-Based Algorithm for Dimensionality Reduction in Federated Learning SystemsTamir L. S. Gez, Kobi Cohen. 1-6 [doi]
- Mobility in Age-Based Gossip NetworksArunabh Srivastava, Sennur Ulukus. 1-8 [doi]
- Quantum Margulis CodesMichele Pacenti, Bane Vasic. 1-5 [doi]
- Minkowski Descent: An Algorithm for Stochastic Global OptimizationKeshav Patel Keval, Vivek Shripad Borkar, Ananya Singhal. 1-8 [doi]
- Active Change Point Anomaly Detection Over Composite HypothesesLiad Lea Didi, Tomer Gafni, Kobi Cohen. 1-6 [doi]
- Classification with a Network of Partially Informative Agents: Enabling Wise Crowds from Individually Myopic ClassifiersTong Yao, Shreyas Sundaram. 1-8 [doi]
- Linearly Solvable General-Sum Markov GamesBraden C. Soper, Caleb J. Miller, Dan M. Merl. 1-8 [doi]
- Binary Triorthogonal and CSS-T Codes for Quantum Error CorrectionEduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Diego Ruano, Rodrigo San-José, Ivan Soprunov. 1-6 [doi]
- Dependence Induced RepresentationsXiangxiang Xu 0001, Lizhong Zheng. 1-8 [doi]
- Communication-efficient and Decentralized Federated Minimax OptimizationSajjad Ghiasvand, Amirhossein Reisizadeh, Mahnoosh Alizadeh, Ramtin Pedarsani. 1-7 [doi]
- Learning the Eye of the Beholder: Statistical Modeling and Estimation for Personalized Color PerceptionXuanzhou Chen, Austin Xu, Jingyan Wang 0001, Ashwin Pananjady. 1-8 [doi]
- Fair-Over-Time Distributed Energy Resource CoordinationHannah Moring, Xavier Farrell, Johanna L. Mathieu. 1-8 [doi]
- Strategic Quantization with Quadratic Distortion MeasuresAnju Anand, Emrah Akyol. 1-6 [doi]
- Price of Censorship of a Policy Removing Misinformation in a Social NetworkJeremy Petithomme, Corinne Touati, Christophe Bravard. 1-8 [doi]
- Opportunistic Learning for Markov Decision Systems with Application to Smart RobotsMichael J. Neely. 1-8 [doi]
- Restricted Converse Results for $g$-Group Complete-$\{s\}$ Pliable Index Coding ProblemsSina Eghbal, Badri N. Vellambi, Lawrence Ong, Parastoo Sadeghi. 1-8 [doi]
- Sensitivity to Hopf Bifurcation in Grid-Following Inverters Using Normal Vector MethodsSushobhan Chatterjee, Sijia Geng. 1-8 [doi]
- Slow Convergence of Interacting Kalman Filters in Word-of-Mouth Social LearningVikram Krishnamurthy, Cristian R. Rojas. 1-6 [doi]
- SPIR with Colluding and Non-Replicated Servers from a Noisy ChannelAmirhossein Shekofteh, Rémi A. Chou. 1-6 [doi]
- Quickest Change Detection Using Mismatched CUSUM Extended AbstractAustin Cooper, Sean P. Meyn. 1-7 [doi]
- A New Framework for Designing Polynomial Codes for Private Information RetrievalFatemeh Kazemi, Ningze Wang, Alex Sprintson, Rafael G. L. D'Oliveira. 1-6 [doi]
- Understanding Neural Population Communication with Latent ChannelsAmanda Merkley, Pulkit Grover. 1-8 [doi]
- Contraction Coefficients of Product Symmetric ChannelsDongmin Lee, Anuran Makur. 1-8 [doi]
- Impossibility of Latent Inner Product Recovery via Rate DistortionCheng Mao, Shenduo Zhang. 1-8 [doi]
- Influence Chain Recovery and Application in Distributed Fact-CheckingAlireza Sharbafchi, Behrouz Touri, Soheil Mohajer. 1-8 [doi]
- Temporal Predictive Coding for Gradient Compression in Distributed LearningAdrian Edin, Zheng Chen, Michel Kieffer, Mikael Johansson. 1-8 [doi]
- A Synthesis Approach for Distributed H2 Control Problems with Communication DelaysYuanji Zou, Nicola Elia. 1-8 [doi]
- Metric Clustering From Triplet ComparisonsGokcan Tatli, Ramya Korlakai Vinayak. 1-8 [doi]
- Closing the Duality Gap on Integer Linear ProgrammingScott Sirri. 1-8 [doi]
- Communication-Efficient Federated Learning via Sparse Training with Regularized Error CorrectionRan Greidi, Kobi Cohen. 1-7 [doi]
- Fairness of Equilibrium in Proportional Sharing Mechanisms with Bid CostsLi Zhang, Sanjiv Kapoor. 1-8 [doi]
- An Information Geometric Analysis of Noise Contrastive EstimationH. S. Melihcan Erol, Jiejun Jin, Lizhong Zheng. 1-8 [doi]
- Graph Codes for Dual-Parameter Barrier ChannelsYuval Ben-Hur, Saar Stern, Yoav Cohen, Yuval Cassuto. 1-8 [doi]
- Finite-Length Coding Bounds via GuessworkAlexander Mariona, Ken R. Duffy, Muriel Médard. 1-8 [doi]
- Weyl Calculus and Exactly Solvable Schrödinger Bridges with Quadratic State CostAlexis M. H. Teter, Wenqing Wang, Abhishek Halder. 1-8 [doi]
- Distributed Matrix Multiplication: Download Rate, Randomness and Privacy Trade-OffsAmirhosein Morteza, Remi A. Chou. 1-7 [doi]
- On the Scalability of Large Graph Methods for Kernel-Based Machine LearningYifan Sun. 1-8 [doi]
- Constrained Correlated EquilibriaOmar Boufous, Rachid El Azouzi, Mikaël Touati, Eitan Altman, Mustapha Bouhtou. 1-8 [doi]
- Distributed Difference of Convex OptimizationVivek Khatana, Murti V. Salapaka. 1-8 [doi]
- Optimal Infinite-Horizon Mixed H2/ H∞ ControlVikrant Malik, Taylan Kargin, Joudi Hajar, Babak Hassibi. 1-8 [doi]
- Mitigating Backdoor Threats to Large Language Models: Advancement and ChallengesQin Liu, Wenjie Mo, Terry Tong, Jiashu Xu, Fei Wang 0060, Chaowei Xiao, Muhao Chen. 1-8 [doi]
- Chernoff Information as a Privacy Constraint for Adversarial ClassificationAyse Ünsal, Melek Önen. 1-8 [doi]
- Solving the B-SAT Problem Using Quantum Computing: Smaller is Sometimes BetterAhmad Bennakhi, Gregory T. Byrd, Paul Franzon. 1-8 [doi]
- Suppressing Overestimation in Q-Learning Through Adversarial BehaviorsHyeAnn Lee, Donghwan Lee. 1-7 [doi]
- On the Capacity of Scalar Gaussian Channels Subject to State ObfuscationOmri Lev, Matthew Ho, Ligong Wang 0002, Gregory W. Wornell. 1-5 [doi]
- Capacity of a Complex-Valued Gaussian Channel with Frequency OffsetOmkar Mujumdar, J. Nicholas Laneman. 1-8 [doi]
- Privacy-Utility Tradeoff Based on α-liftMohammad A. Zarrabian, Parastoo Sadeghi. 1-6 [doi]
- Rendering Wireless Environments Useful for Gradient Estimators: A Zero-Order Stochastic Federated Learning MethodElissa Mhanna, Mohamad Assaad. 1-8 [doi]
- Decentralized Equitable Energy Access in Energy CommunitiesSiying Li, Timothy D. Mount, Lang Tong 0001. 1-4 [doi]
- Beyond PCA: A Gram-Schmidt Approach to Feature ExtractionBahram Yaghooti, Netanel Raviv, Bruno Sinopoli. 1-8 [doi]
- Adaptive Online Model Update Algorithm for Predictive Control in Networked SystemsVivek Khatana, Chin-Yao Chang, Wenbo Wang. 1-8 [doi]
- Authenticated Partial Correction Over AV-MACs: Toward Characterization and CodingDuncan Koepke, Michaela Schnell, Madelyn St. Pierre, Allison Beemer. 1-8 [doi]
- Transferable Learning of GCN Sampling Graph Data Clusters from Different Power SystemsTong Wu 0002, Anna Scaglione, Daniel B. Arnold, Tianyi Chen. 1-7 [doi]
- Differentially Private Sinkhorn AlgorithmJiaqi Wang, Ziv Goldfeld. 1-8 [doi]
- Erasure Decoding for Quantum LDPC Codes via Belief Propagation with Guided DecimationMert Gökduman, Hanwen Yao, Henry D. Pfister. 1-8 [doi]
- Non-Adaptive Multi-Stage Algorithm for Group Testing with Prior StatisticsAyelet C. Portnoy, Alejandro Cohen. 1-8 [doi]
- Generalized Barrier Functions: Integral Conditions & Recurrent RelaxationsYue Shen, Hussein Sibai, Enrique Mallada. 1-8 [doi]
- An Algorithm for Computing the Capacity of Symmetrized KL Information for Discrete ChannelsHaobo Chen, Gholamali Aminian, Yuheng Bu. 1-8 [doi]
- Strategies for Rate Optimization in Joint Communication and Sensing over Channels with MemorySiva Aditya Gooty, Hessam Mahdavifar. 1-6 [doi]
- The Power Method with Row ErasuresNicholas Sacco, Viveck R. Cadambe, Bobak Nazer. 1-8 [doi]
- Non-Monotone Variational InequalitiesSina Arefizadeh, Angelia Nedic. 1-7 [doi]
- Caching or Pre-fetching? the Role of Hazard RatesAndrés Ferragut, Matías Carrasco, Fernando Paganini. 1-8 [doi]
- Higher-order Interpretations of Deepcode, a Learned Feedback CodeYingyao Zhou, Natasha Devroye, György Turán, Milos Zefran. 1-8 [doi]