Abstract is missing.
- Barndorff-Nielsen diffusions model neurons in primary sensory cortexToby Berger, Mustafa Sungkar. 1-4 [doi]
- Energy efficient scheduling algorithms for pumping water in radial networksSeyyed A. Fatemi, Anthony Kuh, Vijay Gupta. 1-6 [doi]
- Energy harvesting communications under temperature constraintsAbdulrahman Baknina, Omur Ozel, Sennur Ulukus. 1-10 [doi]
- The quality of tree approximation from AUC boundsNavid Tafaghodi Khajavi, Anthony Kuh. 1-7 [doi]
- Fast distributed multi-channel MAC for achieving FDM in unlicensed spectrumOnkar Dabeer. 1-4 [doi]
- On communications through a Gaussian noise channel with an MMSE disturbance constraintAlex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, Shlomo Shamai Shitz. 1-8 [doi]
- Limiting performance of massive MIMO downlink cellular systemsChao He, Richard D. Gitlin. 1-6 [doi]
- Towards the design of an end-to-end automated system for image and video-based recognitionRama Chellappa, Jun-Cheng Chen, Rajeev Ranjan, Swami Sankaranarayanan, Amit Kumar, Vishal M. Patel, Carlos D. Castillo. 1-7 [doi]
- A concentration result for stochastic approximation (Extended abstract)Gugan Thoppe, Vivek S. Borkar. 1-2 [doi]
- Radar aided beam alignment in MmWave V2I communications supporting antenna diversityNuria González Prelcic, Roi Méndez-Rial, Robert W. Heath Jr.. 1-7 [doi]
- Duality between erasures and defectsYongjune Kim, B. V. K. Vijaya Kumar. 1-10 [doi]
- Encoding movies and data in DNA storageNaveen Goela, Jean Bolot. 1 [doi]
- Progress on high-rate MSR codes: Enabling arbitrary number of helper nodesAnkit Singh Rawat, Onur Ozan Koyluoglu, Sriram Vishwanath. 1-6 [doi]
- Asymptotically tight bounds on the depth of estimated context treesAlvaro Martín, Gadiel Seroussi. 1-3 [doi]
- Locating sources in a dense array through network-based clusteringNima Riahi, Peter Gerstoft. 1-8 [doi]
- The number of paths in boundary restricted Pascal triangleKingo Kobayashi, Hajime Sato, Mamoru Hoshi. 1-10 [doi]
- Approaching maximum likelihood performance of LDPC codes by stochastic resonance in noisy iterative decodersBane V. Vasic, Predrag Ivanis, David Declercq, Khoa LeTrung. 1-9 [doi]
- Secondary spectrum oligopoly market over large locationsArnob Ghosh, Saswati Sarkar. 1-10 [doi]
- Resource allocation in fading multiple access wiretap channel via game theoretic learningShahid Mehraj Shah, A. Krishna Chaitanya, Vinod Sharma. 1-7 [doi]
- A remark on channels with transceiver distortionWenyi Zhang. 1-4 [doi]
- On the robustness of power systems: Optimal load-capacity distributions and hardness of attackingEvangelos Chatziafratis, Yingrui Zhang, Osman Yagan. 1-10 [doi]
- On perfect q-ary codes in the maximum metricClaudio Qureshi, Sueli I. R. Costa. 1-4 [doi]
- A new converse bound for coded cachingChien-Yi Wang, Sung-Hoon Lim, Michael Gastpar. 1-6 [doi]
- A coding theorem for f-separable distortion measuresYanina Shkel, Sergio Verdú. 1-7 [doi]
- Robustness analysis for an online decentralized descent power allocation algorithmChinwendu Enyioha, Sindri Magnússon, Kathryn Heal, Na Li, Carlo Fischione, Vahid Tarokh. 1-8 [doi]
- Energy-reliability limits in nanoscale circuitsAvhishek Chatterjee, Lav R. Varshney. 1-6 [doi]
- Sample compression schemes for VC classesShay Moran, Amir Yehudayoff. 1-14 [doi]
- On media-based modulation using RF mirrorsYalagala Naresh, Ananthanarayanan Chockalingam. 1-10 [doi]
- Optimal exchange of data over broadcast networks with adversariesAnoosheh Heidarzadeh, Alex Sprintson. 1-5 [doi]
- On the efficiency of connection charges under renewable integration in distribution systemsDaniel Munoz-Alvarez, Lang Tong. 1-6 [doi]
- Scoping environment for robust 60 GHz link deploymentSanjib Sur, Xinyu Zhang. 1-6 [doi]
- Differentially coherent detection: Lower complexity, higher capacity?Yashar M. Aval, Sarah Kate Wilson, Milica Stojanovic. 1-5 [doi]
- Communication complexity of functions related to set intersectionUlrich Tamm. 1-4 [doi]
- On sparsity by NUV-EM, Gaussian message passing, and Kalman smoothingHans-Andrea Loeliger, Lukas Bruderer, Hampus Malmberg, Federico Wadehn, Nour Zalmai. 1-10 [doi]
- On some almost propertiesOlivier Rioul, Max H. M. Costa. 1-5 [doi]
- Methods for quantized compressed sensingHao-Jun Michael Shi, Mindy Case, Xiaoyi Gu, Shenyinying Tu, Deanna Needell. 1-9 [doi]
- The structure of communities in information networksPeter Marbach. 1-6 [doi]
- Optimal link scheduling in millimeter wave multi-hop networks with space division multiple accessFelipe Gómez-Cuba, Michele Zorzi. 1-9 [doi]
- Fire codes capable of correcting bursts beyond their guaranteed burst-correcting capabilitiesWei Zhou, Shu Lin, Khaled A. S. Abdel-Ghaffar. 1-5 [doi]
- Minimum conditional description length estimation for Markov random fieldsMatthew G. Reyes, David L. Neuhoff. 1-6 [doi]
- Can operators simply share millimeter wave spectrum licenses?Abhishek K. Gupta, Jeffrey G. Andrews, Robert W. Heath Jr.. 1-7 [doi]
- Lossy subset source codingEbrahim MolavianJazi, Aylin Yener. 1-10 [doi]
- Designing polar codes to minimize the BER of CRC-aided list decodingDavid R. Wasserman. 1-3 [doi]
- Full and partial frequency reuses for the layered bitstream transmissionSeok Ho Chang, Meesue Shin, Jihwan P. Choi, Jun Won Choi. 1-4 [doi]
- Continuous-time marginal pricing of power trajectories in power systemsAnna Scaglione. 1-6 [doi]
- Language coverage for mismatched crowdsourcingLav R. Varshney, Preethi Jyothi, Mark Hasegawa-Johnson. 1-9 [doi]
- Estimating millimeter wave channels using out-of-band measurementsAnum Ali, Nuria González Prelcic, Robert W. Heath Jr.. 1-6 [doi]
- Inter-temporal incentives in security information sharing agreementsParinaz Naghizadeh, Mingyan Liu. 1-8 [doi]
- Blocking avoidance in wireless NetworksShanyu Zhou, Hulya Seferoglu, Erdem Koyuncu. 1-6 [doi]
- Gaussian Z-interference channel: Around the cornerMax H. M. Costa, Chandra Nair. 1-6 [doi]
- Engineering safety in machine learningKush R. Varshney. 1-5 [doi]
- Information-theoretic analysis of MaxCut algorithmsYatao Bian, Alexey Gronskiy, Joachim M. Buhmann. 1-5 [doi]
- A coding theorem and converse of Kadota and Wyner revisitedMartin Mittelbach, Eduard A. Jorswieck. 1-6 [doi]
- Fundamental limits of remote estimation of autoregressive Markov processes under communication constraintsJhelum Chakravorty, Aditya Mahajan. 1-16 [doi]
- Network-coded file distribution in an ad hoc relay networkSiddhartha S. Borkotoky, Michael B. Pursley. 1-5 [doi]
- On adaptive linear programming decoding of linear codes over GF(8)Eirik Rosnes, Michael Helmling. 1-10 [doi]
- On maximizing the average capacity with interference alignment in a time varying channelHemant Saggar, Greg Pottie, Babak Daneshrad. 1-5 [doi]
- Interactive fingerprinting codes and the hardness of preventing false discoveryThomas Steinke, Jonathan Ullman. 1-41 [doi]
- Encoding of control information and data for downlink broadcast of short packetsKasper Fløe Trillingsgaard, Petar Popovski. 1-5 [doi]
- Control-data separation in cloud RAN: The case of uplink HARQShahrouz Khalili, Osvaldo Simeone. 1-5 [doi]
- New algorithms for maximizing cellular wireless network energy efficiencyKemal Davaslioglu, Cemil Can Coskun, Ender Ayanoglu. 1-10 [doi]
- Some results on spatially coupled protograph LDPC codesSudarsan V. S. Ranganathan, Kasra Vakilinia, Lara Dolecek, Dariush Divsalar, Richard D. Wesel. 1-6 [doi]
- Localization in Internet of Things network: Matrix completion approachLuong Nguyen, Sangtae Kim, Byonghyo Shim. 1-4 [doi]
- Capacity benefits of antenna couplingAbbas Termos, Bertrand M. Hochwald. 1-5 [doi]
- Optimal beamforming with combined channel and path CSIT for multi-cell multi-user MIMOWassim Tabikh, Dirk T. M. Slock, Yi Yuan-Wu. 1-6 [doi]
- Predicting and containing epidemic risk using friendship networksLorenzo Coviello, Massimo Franceschetti, Manuel García-Herranz, Iyad Rahwan. 1-7 [doi]
- Delay tolerant cooperation in the energy harvesting multiple access channelOnur Kaya, Nugman Su, Sennur Ulukus, Mutlu Koca. 1-8 [doi]
- Message-aggregation enhanced iterative hard-decision decodersSrdan Brkic, Predrag Ivanis, Bane V. Vasic, David Declercq. 1-8 [doi]
- Joint user-beam selection for hybrid beamforming in asynchronously coordinated multi-cell networksAntonios Michaloliakos, Weng-Chon Ao, Konstantinos Psounis. 1-10 [doi]
- State estimation in energy harvesting systemsOmur Ozel, Venkat Anantharam. 1-9 [doi]
- On coding for data analytics: New information distancesEn-Hui Yang. 1-6 [doi]
- New models and super-resolution techniques for short-range radar: Theory and experimentsBabak Mamandipoor, Amin Arbabian, Upamanyu Madhow. 1-7 [doi]
- On privacy-utility tradeoffs for constrained data release mechanismsYuksel Ozan Basciftci, Ye Wang, Prakash Ishwar. 1-6 [doi]
- Globally coupled LDPC codesJuane Li, Shu Lin, Khaled A. S. Abdel-Ghaffar, William E. Ryan, Daniel J. Costello Jr.. 1-10 [doi]
- Containing errors in computations for neural sensing: Does a hierarchical-referencing strategy lead to energy savings?Matthew Boring, Shawn K. Kelly, Jeffrey Weldon, Michael J. Tarr, Amanda Robinson, Marlene Behrmann, Pulkit Grover. 1-5 [doi]