


default search action
58th Allerton Conference 2022: Monticello, IL, USA
- 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022, Monticello, IL, USA, September 27-30, 2022. IEEE 2022, ISBN 979-8-3503-9998-1

- Yigit E. Bayiz

, Ufuk Topcu:
Decentralized Online Influence Maximization. 1-8 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:

Uncertainty in Biometric Identification and Authentication Systems with Strong Secrecy. 1-6 - Jean-Baptiste Seby, Charles Harvey, Saurabh Amin:

Equilibrium analysis of game on heterogeneous networks with coupled activities. 1-8 - Alejandro Lancho, Alexander Fengler, Yury Polyanskiy:

Finite-Blocklength Results for the A-channel: Applications to Unsourced Random Access and Group Testing. 1-8 - Diego R. Benalcázar, Chinwendu Enyioha:

Distributed Consensus-based Kalman Filter under Limited Communication. 1-7 - Purbesh Mitra, Sennur Ulukus:

ASUMAN: Age Sense Updating Multiple Access in Networks. 1-7 - Tong Wu

, Anna Scaglione, Daniel B. Arnold:
Reinforcement Learning using Physics Inspired Graph Convolutional Neural Networks. 1-8 - Teng Guo, Si Wei Feng, Mario Szegedy, Jingjin Yu:

Rubik Tables, Stack Rearrangement, and Multi-Robot Path Planning. 1-4 - Francisco Pernice:

On the Symmetries of the Deletion Channel. 1-6 - Sajjad Bahrami, Ertem Tuncel:

Trimmed Minimum Error Entropy for Robust Online Regression. 1-8 - Ivan Perez Avellaneda, Luis A. Duffaut Espinosa

:
Reachability of Chen-Fliess series: A Gradient Descent Approach*. 1-7 - Diyu Yang, Craig A. J. Kemp, Gregery T. Buzzard, Charles A. Bouman:

Multi-Pose Fusion for Sparse-View CT Reconstruction Using Consensus Equilibrium. 1-5 - Bai Liu, Eytan H. Modiano:

Universal Policy Tracking: Scheduling for Wireless Networks with Delayed State Observation. 1-8 - Mustafa O. Karabag, David Fridovich-Keil, Ufuk Topcu:

Alternating Direction Method of Multipliers for Decomposable Saddle-Point Problems. 1-8 - Yulan Zhang, Anna C. Gilbert, Stefan Steinerberger

:
May the force be with you. 1-8 - Sunho Jang, Necmiye Ozay, Johanna L. Mathieu:

Data-driven estimation of probabilistic constraints for network-safe distributed energy resource control. 1-8 - Amaury Gouverneur, Borja Rodríguez Gálvez, Tobias J. Oechtering, Mikael Skoglund:

An Information-Theoretic Analysis of Bayesian Reinforcement Learning. 1-7 - Abhinanda Dutta, Steven Weber:

Throughput Optimized Random Access Channel Assignment. 1-8 - Anand Kalvit

, Assaf Zeevi:
Bandits with Dynamic Arm-acquisition Costs*. 1-7 - Zhanhong Jiang, Aditya Balu, Xian Yeow Lee

, Young M. Lee, Chinmay Hegde
, Soumik Sarkar:
Distributed Online Non-convex Optimization with Composite Regret. 1-8 - Shachar Shayovitz, Meir Feder:

Active Learning for Individual Data via Minimal Stochastic Complexity. 1-5 - Xing Gao, Lev Reyzin

:
An Interactive Search Game with Two Agents. 1-8 - Adel Aghajan, Keith Paarporn, Jason R. Marden:

Managing Resources in Multi-resource General Lotto Games. 1-2 - Huanran Li, Daniel L. Pimentel-Alarcón:

Minimum-Length Trace Reconstruction via Integer Programming. 1-8 - Xinyi Tong, Xiangxiang Xu, Shao-Lun Huang:

On Sample Complexity of Learning Shared Representations: The Asymptotic Regime. 1-8 - Adam Case, Jack H. Lutz:

Finite-State Mutual Dimension. 1-8 - Pradeep Kr. Banerjee, Kedar Karhadkar, Yuguang Wang, Uri Alon, Guido Montúfar:

Oversquashing in GNNs through the lens of information contraction and graph expansion. 1-8 - Meng-Che Chang, Shi-Yuan Wang, Matthieu R. Bloch:

Controlled Sensing with Corrupted Commands. 1-7 - Tushar Shankar Walunj

, Shiksha Singhal, Veeraruna Kavitha, Jayakrishnan Nair:
Pricing, competition and market segmentation in ride hailing. 1-8 - Lihui Yi, Ermin Wei:

The Effects of Varying Charging Rates on Optimal Charging Station Choices for Electric Vehicles. 1-5 - Randy A. Freeman:

Proximal Methods for Self-Healing and Exact Distributed Convex Optimization Extended abstract. 1-7 - Xinyi Ni, Lifeng Lai:

Policy Gradient Based Entropic-VaR Optimization in Risk-Sensitive Reinforcement Learning. 1-6 - Caio Kalil Lauand, Sean P. Meyn:

Bias in Stochastic Approximation Cannot Be Eliminated With Averaging. 1-4 - Dominic Groß

:
Compensating Network Dynamics in Grid-Forming Control. 1-8 - Pouria Tooranjipour, Bahare Kiumarsi, Hamidreza Modares:

Risk-Aware Safe Optimal Control of Uncertain Linear Systems. 1-5 - Ningze Wang, Anoosheh Heidarzadeh, Alex Sprintson:

Multi-Message Private Information Retrieval: A Scalar Linear Solution. 1-8 - Peizhong Ju, Xiaojun Lin

, Ness B. Shroff:
Understanding the Generalization Power of Overfitted NTK Models: 3-layer vs. 2-layer (Extended Abstract). 1-2 - Abdulkadir Canatar

, Cengiz Pehlevan:
A Kernel Analysis of Feature Learning in Deep Neural Networks. 1-8 - Xinyu Wu, Dan Wu, Eytan H. Modiano:

Queueing Delay Minimization in Overloaded Networks via Rate Control. 1-8 - Carmel Fiscko, Soummya Kar

, Bruno Sinopoli:
Identifying Impactful Agents Via Faux Adversarial Games. 1-7 - Bernard C. Lesieutre, Yasmine Abdennadher, Sandip Roy:

Model-Enhanced Localization of Forced Oscillation Using PMU Data. 1-8 - Itamar Katz, Yuval Kochman:

Optimal Discrimination Between Two Pure States and Dolinar-Type Coherent-State Detection. 1 - Yuyang Shi, Yajun Mei:

Efficient Sequential UCB-based Hungarian Algorithm for Assignment Problems. 1-8 - Rui Zhang, Yao Xie, Rui Yao, Feng Qiu:

Online Detection of Cascading Change-Points Using Diffusion Networks. 1-6 - Cong Chen, Lang Tong:

Wholesale Market Participation of Storage with State-of-Charge Dependent Bids. 1-8 - Kenneth Palacio-Baus

, Natasha Devroye:
An Error Exponent for the AWGN Channel with Decision Feedback and Lattice Coding. 1-6 - Philip N. Brown

, Brandon C. Collins, Colton Hill, Gia Barboza, Lisa Hines:
Individual Altruism Cannot Overcome Congestion Effects in a Global Pandemic Game. 1-6 - Jayanth Regatti, Hao Chen, Abhishek Gupta:

Byzantine Resilience With Reputation Scores. 1-8 - Neophytos Charalambides, Mert Pilanci, Alfred O. Hero III:

Secure Linear MDS Coded Matrix Inversion. 1-8 - Harsh Dolhare, Vivek S. Borkar:

A Concentration Bound for Distributed Stochastic Approximation. 1-6 - Rohan Deb, Meet Gandhi, Shalabh Bhatnagar:

Schedule Based Temporal Difference Algorithms. 1-6 - Xiaochun Niu, Ermin Wei:

GRAND: A Gradient-Related Ascent and Descent Algorithmic Framework for Minimax Problems. 1-2 - Zixian Yang, Xin Liu, Lei Ying

:
Exploration. Exploitation, and Engagement in Multi-Armed Bandits with Abandonment. 1-2 - Sijia Geng

, Ian A. Hiskens:
Dynamic Performance of Unified Grid-Forming/Following Inverter Control. 1-8 - W. Steven Gray:

System Identification Entropy for Chen-Fliess Series and Their Interconnections. 1-6 - Josiah Park

, Carlos Saltijeral, Ming Zhong
:
Grassmannian packings: Trust-region stochastic tuning for matrix incoherence. 1-6 - Nicolaos E. Manitara, Christoforos N. Hadjicostis, Themistoklis Charalambous:

Synchronized Stop and Re-Start in Distributed Average Consensus for Control and Coordination Applications. 1-7 - Shuche Wang, Yuanyuan Tang, Ryan Gabrys, Farzad Farnoud:

Permutation Codes for Correcting a Burst of at Most $t$ Deletions. 1-6 - Adrian Redder, Arunselvan Ramaswamy

, Holger Karl:
Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong Law. 1-8 - Paul Sheldon, Besma Smida

, Natasha Devroye, Daniela Tuninetti:
Achievable Rate Regions for the Gaussian Broadcast Channel with Fixed Blocklength and Per User Reliability. 1-6 - Dror Chawin, Ishay Haviv:

Hardness of Linear Index Coding on Perturbed Instances. 1-7 - Nathan Dahlin, Kevin Chang, Krishna Chaitanya Kalagarla, Rahul Jain, Pierluigi Nuzzo:

Practical Control Design for the Deep Learning Age: Distillation of Deep RL-Based Controllers. 1-8 - Krishna Gopal Benerjee

, Adrish Banerjee:
Bounds on Reversible, Complement, Reversible-Complement, Constant Weight Sum Codes. 1-8 - Xiangxiang Xu

, Lizhong Zheng:
Multivariate Feature Extraction. 1-8 - Jonathan Ponniah:

On the Limits of Distributed Agreement between Correlated Sources. 1-7 - Yang Hu, Adam Wierman, Guannan Qu:

On the Sample Complexity of Stabilizing LTI Systems on a Single Trajectory (Extended Abstract). 1-2 - Gokcan Tatli, Robert D. Nowak, Ramya Korlakai Vinayak:

Learning Preference Distributions From Distance Measurements. 1-8 - Rémi A. Chou

, Matthieu R. Bloch:
Commitment over Multiple-Access Channels. 1-6 - Yili Zhang, Asaf Cohen, Vijay G. Subramanian

:
Learning-based Optimal Admission Control in a Single Server Queuing System. 1-2 - Tim Brucks, Taposh Banerjee, Rahul Mishra:

Quickest Detection of a Threat to an Impending Disaster. 1-7 - Yunhan Huang, Tao Zhang, Quanyan Zhu:

The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash? 1-7 - Mohammad Taha Toghani, César A. Uribe:

Unbounded Gradients in Federated Learning with Buffered Asynchronous Aggregation. 1-8 - Fatemeh Kazemi, Ningze Wang, Rafael G. L. D'Oliveira, Alex Sprintson:

Degree Tables for Private Information Retrieval. 1-8 - Keerthana Gurushankar, Praveen Venkatesh

, Pulkit Grover
:
Extracting Unique Information Through Markov Relations. 1-6 - Simina Brânzei, Erel Segal-Halevi, Aviv Zohar:

How to Charge Lightning: The Economics of Bitcoin Transaction Channels. 1-8 - Jialing Liao, Zheng Chen, Erik G. Larsson:

Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations. 1-8 - Mano Vikash Janardhanan, Lev Reyzin

:
On Learning a Hidden Directed Graph with Path Queries. 1-5 - Manish Kumar Singh

, D. Venkatramanan
, Sairaj V. Dhople:
Towards Optimal Primary- and Secondary-control Design for Networks with Generators and Inverters. 1-6 - Junghoon Kim, Seyyedali Hosseinalipour, Taejoon Kim, David J. Love, Christopher G. Brinton

:
Linear Coding for Gaussian Two-Way Channels. 1-8 - Abhijeet Mulgund

, Raj Shekhar, Natasha Devroye
, György Turán, Milos Zefran
:
Evaluating interpretations of deep-learned error-correcting codes. 1-8 - Po-han Li, Ufuk Topcu, Sandeep P. Chinchali:

Adversarial Examples for Model-Based Control: A Sensitivity Analysis. 1-7 - Michael J. Neely:

Repeated Games, Optimal Channel Capture, and Open Problems for Slotted Multiple Access. 1-8 - Cornelia Ott, Hedongliang Liu, Antonia Wachter-Zeh:

Covering Properties of Sum-Rank Metric Codes. 1-7 - Bryce L. Ferguson, Daigo Shishika, Jason R. Marden:

Ensuring the Defense of Paths and Perimeters in Dynamic Defender-Attacker Blotto Games (dDAB) on Graphs. 1-7 - Hadar Szostak, Kobi Cohen:

Decentralized Anomaly Detection via Deep Multi-Agent Reinforcement Learning. 1-4 - Iyanuoluwa Emiola, Chinwendu Enyioha:

Q-linear Convergence of Distributed Optimization with Barzilai-Borwein Step Sizes. 1-8 - Ben A. Kizaric, Daniel L. Pimentel-Alarcón:

Classifying Incomplete Data with a Mixture of Subspace Experts. 1-8 - Tomer Gafni, Kobi Cohen, Yonina C. Eldar:

CoBAAF: Controlled Bayesian Air Aggregation Federated Learning from Heterogeneous Data. 1-4 - Vikram Krishnamurthy, Luke Snow:

Quickest Change Detection using Time Inconsistent Anticipatory and Quantum Decision Modeling. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














