Department of Mathematics
 Search | Help | Login | pdf version | printable version

Math @ Duke





.......................

.......................


Publications of Vahid Tarokh    :chronological  alphabetical  combined listing:

%% Books   
@book{fds336754,
   Author = {Tarokh, V},
   Title = {Preface},
   Publisher = {Springer US},
   Year = {2009},
   Month = {December},
   ISBN = {9781441906724},
   url = {http://dx.doi.org/10.1007/978-1-4419-0673-1},
   Doi = {10.1007/978-1-4419-0673-1},
   Key = {fds336754}
}


%% Papers Published   
@article{fds370318,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Region selection in Markov random fields: Gaussian
             case},
   Journal = {Journal of Multivariate Analysis},
   Volume = {196},
   Year = {2023},
   Month = {July},
   url = {http://dx.doi.org/10.1016/j.jmva.2023.105178},
   Abstract = {We consider the problem of model selection in Gaussian
             Markov fields in the sample deficient scenario. The
             benchmark information-theoretic results in the case of
             d-regular graphs require the number of samples to be at
             least proportional to the logarithm of the number of
             vertices to allow consistent graph recovery. When the number
             of samples is less than this amount, reliable recovery of
             all edges is impossible. In many applications, it is more
             important to learn the distribution of the edge (coupling)
             parameters over the network than the specific locations of
             the edges. Assuming that the entire graph can be partitioned
             into a number of spatial regions with similar edge
             parameters and reasonably regular boundaries, we develop new
             information-theoretic sample complexity bounds and show that
             a bounded number of samples can be sufficient to
             consistently recover these regions. Finally, we introduce
             and analyze an efficient region growing algorithm capable of
             recovering the regions with high accuracy. We show that it
             is consistent and demonstrate its performance benefits in
             synthetic simulations.},
   Doi = {10.1016/j.jmva.2023.105178},
   Key = {fds370318}
}

@article{fds351055,
   Author = {Hasan, A and Pereira, JM and Farsiu, S and Tarokh,
             V},
   Title = {Identifying Latent Stochastic Differential
             Equations},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {70},
   Pages = {89-104},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TSP.2021.3131723},
   Abstract = {We present a method for learning latent stochastic
             differential equations (SDEs) from high dimensional time
             series data. Given a high-dimensional time series generated
             from a lower dimensional latent unknown Itô process, the
             proposed method learns the mapping from ambient to latent
             space, and the underlying SDE coefficients, through a
             self-supervised learning approach. Using the framework of
             variational autoencoders, we consider a conditional
             generative model for the data based on the Euler-Maruyama
             approximation of SDE solutions. Furthermore, we use recent
             results on identifiability of latent variable models to show
             that the proposed model can recover not only the underlying
             SDE coefficients, but also the original latent variables, up
             to an isometry, in the limit of infinite data. We validate
             the method through several simulated video processing tasks,
             where the underlying SDE is known, and through real world
             datasets.},
   Doi = {10.1109/TSP.2021.3131723},
   Key = {fds351055}
}

@article{fds362106,
   Author = {Huo, Q and Shi, Y and Liu, C and Tarokh, V and Ferrari,
             S},
   Title = {Online Action Change Detection for Automatic Vision-based
             Ground Control of Aircraft},
   Journal = {Aiaa Science and Technology Forum and Exposition, Aiaa
             Scitech Forum 2022},
   Year = {2022},
   Month = {January},
   ISBN = {9781624106316},
   url = {http://dx.doi.org/10.2514/6.2022-2031},
   Abstract = {Classical action recognition algorithms require the user to
             pre-select the time window for the action by clipping the
             video or choosing the initial and final time frames.
             Recently, new deep learning algorithms have been developed
             to detect a key action from an untrimmed video. However,
             they are unsuitable for temporally segmenting continuous
             action sequences and are too computationally expensive for
             implementation on autonomous systems. This paper presents a
             fast and accurate online action change detection framework.
             Given a streaming RGB video, the algorithm is used to detect
             any changes in the sequence. If a new action is discovered,
             the action recognition module will be applied to classify
             the action. Compared to existing methods, this two-stage
             approach reduces computational cost by not applying the
             recognition algorithm on every time window and improves
             classification accuracy by locating the starting time step
             of each action. In a simulated airport environment created
             using Unreal Engine ™, the framework is demonstrated and
             validated by detecting and recognizing sequential gestures
             from a ground crew, who sends gesture commands to control
             the movement of an autonomous aircraft. A hybrid optimal
             controller is developed to combine the visual information
             obtained from the framework and prior information, such as
             airport map and reference lines, to control the aircraft to
             safely navigate to a terminal gate.},
   Doi = {10.2514/6.2022-2031},
   Key = {fds362106}
}

@article{fds363206,
   Author = {Momenifar, M and Diao, E and Tarokh, V and Bragg,
             AD},
   Title = {Dimension reduced turbulent flow data from deep vector
             quantisers},
   Journal = {Journal of Turbulence},
   Volume = {23},
   Number = {4-5},
   Pages = {232-264},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1080/14685248.2022.2060508},
   Abstract = {Analysing large-scale data from simulations of turbulent
             flows is memory intensive, requiring significant resources.
             This major challenge highlights the need for data
             compression techniques. In this study, we apply a
             physics-informed Deep Learning technique based on vector
             quantisation to generate a discrete, low-dimensional
             representation of data from simulations of three-dimensional
             turbulent flows. The deep learning framework is composed of
             convolutional layers and incorporates physical constraints
             on the flow, such as preserving incompressibility and global
             statistical characteristics of the velocity gradients. The
             accuracy of the model is assessed using statistical,
             comparison-based similarity and physics-based metrics. The
             training data set is produced from Direct Numerical
             Simulation of an incompressible, statistically stationary,
             isotropic turbulent flow. The performance of this lossy data
             compression scheme is evaluated not only with unseen data
             from the stationary, isotropic turbulent flow, but also with
             data from decaying isotropic turbulence, a Taylor–Green
             vortex flow, and a turbulent channel flow. Defining the
             compression ratio (CR) as the ratio of original data size to
             the compressed one, the results show that our model based on
             vector quantisation can offer CR (Formula presented.) with a
             mean square error (MSE) of (Formula presented.), and
             predictions that faithfully reproduce the statistics of the
             flow, except at the very smallest scales where there is some
             loss. Compared to the recent study of Glaws. et al. [Deep
             learning for in situ data compression of large turbulent
             flow simulations. Phys Rev Fluids. 2020;5(11):114602], which
             was based on a conventional autoencoder (where compression
             is performed in a continuous space), our model improves the
             CR by more than 30%, and reduces the MSE by an order of
             magnitude. Our compression model is an attractive solution
             for situations where fast, high quality and low-overhead
             encoding and decoding of large data are required.},
   Doi = {10.1080/14685248.2022.2060508},
   Key = {fds363206}
}

@article{fds363388,
   Author = {Le, CP and Soltani, M and Dong, J and Tarokh, V},
   Title = {Fisher Task Distance and its Application in Neural
             Architecture Search},
   Journal = {Ieee Access},
   Volume = {10},
   Pages = {47235-47249},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1109/ACCESS.2022.3171741},
   Abstract = {We formulate an asymmetric (or non-commutative) distance
             between tasks based on Fisher Information Matrices, called
             Fisher task distance. This distance represents the
             complexity of transferring the knowledge from one task to
             another. We provide a proof of consistency for our distance
             through theorems and experiments on various classification
             tasks from MNIST, CIFAR-10, CIFAR-100, ImageNet, and
             Taskonomy datasets. Next, we construct an online neural
             architecture search framework using the Fisher task
             distance, in which we have access to the past learned tasks.
             By using the Fisher task distance, we can identify the
             closest learned tasks to the target task, and utilize the
             knowledge learned from these related tasks for the target
             task. Here, we show how the proposed distance between a
             target task and a set of learned tasks can be used to reduce
             the neural architecture search space for the target task.
             The complexity reduction in search space for task-specific
             architectures is achieved by building on the optimized
             architectures for similar tasks instead of doing a full
             search and without using this side information. Experimental
             results for tasks in MNIST, CIFAR-10, CIFAR-100, ImageNet
             datasets demonstrate the efficacy of the proposed approach
             and its improvements, in terms of the performance and the
             number of parameters, over other gradient-based search
             methods, such as ENAS, DARTS, PC-DARTS.},
   Doi = {10.1109/ACCESS.2022.3171741},
   Key = {fds363388}
}

@article{fds364294,
   Author = {Momenifar, M and Diao, E and Tarokh, V and Bragg,
             AD},
   Title = {A Physics-Informed Vector Quantized Autoencoder for Data
             Compression of Turbulent Flow},
   Journal = {Data Compression Conference Proceedings},
   Volume = {2022-March},
   Pages = {312-321},
   Year = {2022},
   Month = {January},
   ISBN = {9781665478939},
   url = {http://dx.doi.org/10.1109/DCC52660.2022.00039},
   Abstract = {Analyzing large-scale data from simulations of turbulent
             flows is memory intensive, requiring significant resources.
             This major challenge highlights the need for data
             compression techniques. In this study, we apply a
             physics-informed Deep Learning technique based on vector
             quantization to generate a discrete, low-dimensional
             representation of data from simulations of three-dimensional
             turbulent flows. The deep learning framework is composed of
             convolutional layers and incorporates physical constraints
             on the flow, such as preserving incompressibility and global
             statistical characteristics of the velocity gradients. The
             accuracy of the model is assessed using statistical,
             comparison-based similarity and physics-based metrics. The
             training data set is produced from Direct Numerical
             Simulation of an incompressible, statistically stationary,
             isotropic turbulent flow. The performance of this lossy data
             compression scheme is evaluated not only with unseen data
             from the stationary, isotropic turbulent flow, but also with
             data from decaying isotropic turbulence, and a Taylor-Green
             vortex flow. Defining the compression ratio (CR) as the
             ratio of original data size to the compressed one, the
             results show that our model based on vector quantization can
             offer CR = 85 with a mean square error (MSE) of O(10-3), and
             predictions that faithfully reproduce the statistics of the
             flow, except at the very smallest scales where there is some
             loss. Compared to the recent study based on a conventional
             autoencoder where compression is performed in a continuous
             space, our model improves the CR by more than 30 percent,
             and reduces the MSE by an order of magnitude. Our
             compression model is an attractive solution for situations
             where fast, high quality and low-overhead encoding and
             decoding of large data are required.},
   Doi = {10.1109/DCC52660.2022.00039},
   Key = {fds364294}
}

@article{fds364343,
   Author = {Soltani, M and Wu, S and Li, Y and Ding, J and Tarokh,
             V},
   Title = {On The Energy Statistics of Feature Maps in Pruning of
             Neural Networks with Skip-Connections},
   Journal = {Data Compression Conference Proceedings},
   Volume = {2022-March},
   Pages = {482},
   Year = {2022},
   Month = {January},
   ISBN = {9781665478939},
   url = {http://dx.doi.org/10.1109/DCC52660.2022.00093},
   Abstract = {We propose a new structured pruning framework for
             compressing Deep Neural Networks (DNNs) with
             skip-connections, based on measuring the statistical
             dependency of hidden layers and predicted outputs. The
             dependence measure defined by the energy statistics of
             hidden layers serves as a model-free measure of information
             between the feature maps and the output of the network. The
             estimated dependence measure is subsequently used to prune a
             collection of redundant and uninformative layers. Extensive
             numerical experiments on various architectures show the
             efficacy of the proposed pruning approach with competitive
             performance to state-of-the-art methods.},
   Doi = {10.1109/DCC52660.2022.00093},
   Key = {fds364343}
}

@article{fds364344,
   Author = {Dong, J and Wu, S and Soltani, M and Tarokh, V},
   Title = {Multi-Agent Adversarial Attacks for Multi-Channel
             Communications},
   Journal = {Proceedings of the International Joint Conference on
             Autonomous Agents and Multiagent Systems,
             Aamas},
   Volume = {3},
   Pages = {1580-1582},
   Year = {2022},
   Month = {January},
   ISBN = {9781713854333},
   Abstract = {Recently Reinforcement Learning (RL) has been applied as an
             anti-adversarial remedy in wireless communication networks.
             However studying the RL-based approaches from the
             adversary's perspective has received little attention.
             Additionally, RL-based approaches in an anti-adversary or
             adversarial paradigm mostly consider single-channel
             communication (either channel selection or single channel
             power control), while multi-channel communication is more
             common in practice. In this paper, we propose a multi-agent
             adversary system (MAAS) for modeling and analyzing
             adversaries in a wireless communication scenario by careful
             design of the reward function under realistic communication
             scenarios. In particular, by modeling the adversaries as
             learning agents, we show that the proposed MAAS is able to
             successfully choose the transmitted channel(s) and their
             respective allocated power(s) without any prior knowledge of
             the sender strategy. Compared to the single-agent adversary
             (SAA), multi-agents in MAAS can achieve significant
             reduction in signal-to-noise ratio (SINR) under the same
             power constraints and partial observability, while providing
             improved stability and a more efficient learning process.
             Moreover, through empirical studies we show that the results
             in simulation are close to the ones in communication in
             reality, a conclusion that is pivotal to the validity of
             performance of agents evaluated in simulations.},
   Key = {fds364344}
}

@article{fds364345,
   Author = {Wu, S and Diao, E and Elkhalil, K and Ding, J and Tarokh,
             V},
   Title = {Score-Based Hypothesis Testing for Unnormalized
             Models},
   Journal = {Ieee Access},
   Volume = {10},
   Pages = {71936-71950},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1109/ACCESS.2022.3187991},
   Abstract = {Unnormalized statistical models play an important role in
             machine learning, statistics, and signal processing. In this
             paper, we derive a new hypothesis testing procedure for
             unnormalized models. Our approach is motivated by the
             success of score matching techniques that avoid the
             intensive computational costs of normalization constants in
             many high-dimensional settings. Our proposed test statistic
             is the difference between Hyvärinen scores corresponding to
             the null and alternative hypotheses. Under some reasonable
             conditions, we prove that the asymptotic distribution of
             this statistic is Chi-squared. We outline a bootstrap
             approach to learn the test critical values, particularly
             when the distribution under the null hypothesis cannot be
             expressed in a closed form, and provide consistency
             guarantees. Finally, we conduct extensive numerical
             experiments and demonstrate that our proposed approach
             outperforms goodness-of-fit benchmarks in various
             settings.},
   Doi = {10.1109/ACCESS.2022.3187991},
   Key = {fds364345}
}

@article{fds365734,
   Author = {Venkatasubramanian, S and Wongkamthong, C and Soltani, M and Kang, B and Gogineni, S and Pezeshki, A and Rangaswamy, M and Tarokh,
             V},
   Title = {Toward Data-Driven STAP Radar},
   Journal = {Proceedings of the Ieee Radar Conference},
   Publisher = {IEEE},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1109/RadarConf2248738.2022.9764354},
   Abstract = {Using an amalgamation of techniques from classical radar,
             computer vision, and deep learning, we characterize our
             ongoing data-driven approach to space-time adaptive
             processing (STAP) radar. We generate a rich example dataset
             of received radar signals by randomly placing targets of
             variable strengths in a predetermined region using RFView, a
             site-specific radio frequency modeling and simulation tool
             developed by ISL Inc. For each data sample within this
             region, we generate heatmap tensors in range, azimuth, and
             elevation of the output power of a minimum variance
             distortionless response (MVDR) beamformer, which can be
             replaced with a desired test statistic. These heatmap
             tensors can be thought of as stacked images, and in an
             airborne scenario, the moving radar creates a sequence of
             these time-indexed image stacks, resembling a video. Our
             goal is to use these images and videos to detect targets and
             estimate their locations, a procedure reminiscent of
             computer vision algorithms for object detection-namely, the
             Faster Region Based Convolutional Neural Network (Faster
             R-CNN). The Faster R-CNN consists of a proposal generating
             network for determining regions of interest (ROI), a
             regression network for positioning anchor boxes around
             targets, and an object classification algorithm; it is
             developed and optimized for natural images. Our ongoing
             research will develop analogous tools for heatmap images of
             radar data. In this regard, we will generate a large,
             representative adaptive radar signal processing database for
             training and testing, analogous in spirit to the COCO
             dataset for natural images. Subsequently, we will build
             upon, adapt, and optimize the existing Faster R-CNN
             framework, and develop tools to detect and localize targets
             in the heatmap tensors discussed previously. As a
             preliminary example, we present a regression network in this
             paper for estimating target locations to demonstrate the
             feasibility of and significant improvements provided by our
             data-driven approach.},
   Doi = {10.1109/RadarConf2248738.2022.9764354},
   Key = {fds365734}
}

@article{fds365907,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Large deviations of convex polyominoes*},
   Journal = {Electronic Journal of Probability},
   Volume = {27},
   Year = {2022},
   Month = {January},
   url = {http://dx.doi.org/10.1214/22-EJP835},
   Abstract = {Many open problems in machine learning, pattern recognition,
             and geometric analysis require enumeration of different
             types of lattice polygons, and in particular convex
             polyominoes. In this work, we develop a large deviation
             principle for convex polyominoes under different
             restrictions, such as fixed area and/or perimeter.},
   Doi = {10.1214/22-EJP835},
   Key = {fds365907}
}

@article{fds366703,
   Author = {Kojima, S and Feng, Y and Maruta, K and Ootsu, K and Yokota, T and Ahn, CJ and Tarokh, V},
   Title = {Towards Deep Learning-Guided Multiuser SNR and Doppler Shift
             Detection for Next-Generation Wireless Systems},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {2022-June},
   Year = {2022},
   Month = {January},
   ISBN = {9781665482431},
   url = {http://dx.doi.org/10.1109/VTC2022-Spring54318.2022.9860990},
   Abstract = {In order to meet the ever-growing demand for data traffic,
             highly efficient multiple access schemes, such as OFDMA, are
             widely used in modern communication standards. In such
             multiple access schemes, adaptive modulation and coding
             (AMC) are used to optimize the transmission rate of each
             user. However, feedback information, such as SNR and Doppler
             shift, characterizing the communication environment of each
             user is indispensable of key importance for AMC. In the
             past, these information and parameters were often estimated
             using reference signals. However, the reference signal
             becomes overhead, resulting in throughput degradation and
             processing delay. Furthermore, the computation burden can be
             large as it is necessary to perform channel parameter
             estimation individually for each user. Previously, over the
             single-user channel, we have proposed a joint SNR and
             Doppler shift detection method via a spectrogram-based
             data-driven method, without the reference signal. This paper
             extends this framework to multiuser OFDM multiple access
             channels. In the newly proposed method, SNR and Doppler
             shift for all users can be detected simultaneously via deep
             learning-guided object detection algorithms from each
             spectrogram image. Simulation results are provided to
             validate the effectiveness of the proposed
             method.},
   Doi = {10.1109/VTC2022-Spring54318.2022.9860990},
   Key = {fds366703}
}

@article{fds368346,
   Author = {Cannella, C and Tarokh, V},
   Title = {Semi-Empirical Objective Functions for MCMC Proposal
             Optimization},
   Journal = {Proceedings International Conference on Pattern
             Recognition},
   Volume = {2022-August},
   Pages = {4758-4764},
   Year = {2022},
   Month = {January},
   ISBN = {9781665490627},
   url = {http://dx.doi.org/10.1109/ICPR56361.2022.9956603},
   Abstract = {Current objective functions used for training neural MCMC
             proposal distributions implicitly rely on architectural
             restrictions to yield sensible optimization results, which
             hampers the development of highly expressive neural MCMC
             proposal architectures. In this work, we introduce and
             demonstrate a semi-empirical procedure for determining
             approximate objective functions suitable for optimizing
             arbitrarily parameterized proposal distributions in MCMC
             methods. Our proposed Ab Initio objective functions consist
             of the weighted combination of functions following
             constraints on their global optima and transformation
             invariances that we argue should be upheld by general
             measures of MCMC efficiency for use in proposal
             optimization. Our experimental results demonstrate that Ab
             Initio objective functions maintain favorable performance
             and preferable optimization behavior compared to existing
             objective functions for neural MCMC optimization. We find
             that Ab Initio objective functions are sufficiently robust
             to enable the confident optimization of neural proposal
             distributions parameterized by deep generative networks
             extending beyond the regimes of traditional MCMC
             schemes.},
   Doi = {10.1109/ICPR56361.2022.9956603},
   Key = {fds368346}
}

@article{fds369086,
   Author = {Hasan, A and Elkhalil, K and Ng, Y and Pereira, JM and Farsiu, S and Blanchet, J and Tarokh, V},
   Title = {Modeling Extremes with d-max-decreasing Neural
             Networks},
   Journal = {Proceedings of the 38th Conference on Uncertainty in
             Artificial Intelligence, Uai 2022},
   Pages = {759-768},
   Year = {2022},
   Month = {January},
   ISBN = {9781713863298},
   Abstract = {We propose a neural network architecture that enables
             non-parametric calibration and generation of multivariate
             extreme value distributions (MEVs). MEVs arise from Extreme
             Value Theory (EVT) as the necessary class of models when
             extrapolating a distributional fit over large spatial and
             temporal scales based on data observed in intermediate
             scales. In turn, EVT dictates that d-max-decreasing, a
             stronger form of convexity, is an essential shape constraint
             in the characterization of MEVs. As far as we know, our
             proposed architecture provides the first class of
             non-parametric estimators for MEVs that preserve these
             essential shape constraints. We show that the architecture
             approximates the dependence structure encoded by MEVs at
             parametric rate. Moreover, we present a new method for
             sampling high-dimensional MEVs using a generative model. We
             demonstrate our methodology on a wide range of experimental
             settings, ranging from environmental sciences to financial
             mathematics and verify that the structural properties of
             MEVs are retained compared to existing methods.},
   Key = {fds369086}
}

@article{fds370106,
   Author = {Le, CP and Dong, J and Soltani, M and Tarokh, V},
   Title = {TASK AFFINITY WITH MAXIMUM BIPARTITE MATCHING IN FEW-SHOT
             LEARNING},
   Journal = {Iclr 2022 10th International Conference on Learning
             Representations},
   Year = {2022},
   Month = {January},
   Abstract = {We propose an asymmetric affinity score for representing the
             complexity of utilizing the knowledge of one task for
             learning another one. Our method is based on the maximum
             bipartite matching algorithm and utilizes the Fisher
             Information matrix. We provide theoretical analyses
             demonstrating that the proposed score is mathematically
             well-defined, and subsequently use the affinity score to
             propose a novel algorithm for the few-shot learning problem.
             In particular, using this score, we find relevant training
             data labels to the test data and leverage the discovered
             relevant data for episodically fine-tuning a few-shot model.
             Results on various few-shot benchmark datasets demonstrate
             the efficacy of the proposed approach by improving the
             classification accuracy over the state-of-the-art methods
             even when using smaller models.},
   Key = {fds370106}
}

@article{fds369995,
   Author = {Le, Q and Diao, E and Wang, X and Anwar, A and Tarokh, V and Ding,
             J},
   Title = {Personalized Federated Recommender Systems with Private and
             Partially Federated AutoEncoders},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Volume = {2022-October},
   Pages = {1157-1163},
   Year = {2022},
   Month = {January},
   ISBN = {9781665459068},
   url = {http://dx.doi.org/10.1109/IEEECONF56349.2022.10051918},
   Abstract = {Recommender Systems (RSs) have become increasingly important
             in many application domains, such as digital marketing.
             Conventional RSs often need to collect users' data,
             centralize them on the server-side, and form a global model
             to generate reliable recommendations. However, they suffer
             from two critical limitations: the personalization problem
             that the RSs trained traditionally may not be customized for
             individual users, and the privacy problem that directly
             sharing user data is not encouraged. We propose Personalized
             Federated Recommender Systems (PersonalFR), which introduces
             a personalized autoencoder-based recommendation model with
             Federated Learning (FL) to address these challenges.
             PersonalFR guarantees that each user can learn a personal
             model from the local dataset and other participating users'
             data without sharing local data, data embeddings, or models.
             PersonalFR consists of three main components, including
             AutoEncoder-based RSs (ARSs) that learn the user-item
             interactions, Partially Federated Learning (PFL) that
             updates the encoder locally and aggregates the decoder on
             the server-side, and Partial Compression (PC) that only
             computes and transmits active model parameters. Extensive
             experiments on two real-world datasets demonstrate that
             PersonalFR can achieve private and personalized performance
             comparable to that trained by centralizing all users' data.
             Moreover, PersonalFR requires significantly less computation
             and communication overhead than standard FL
             baselines.},
   Doi = {10.1109/IEEECONF56349.2022.10051918},
   Key = {fds369995}
}

@article{fds370060,
   Author = {Dong, J and Ren, S and Deng, Y and Khatib, O and Malof, J and Soltani, M and Padilla, W and Tarokh, V},
   Title = {BLASCHKE PRODUCT NEURAL NETWORK (BPNN): A PHYSICS-INFUSED
             NEURAL NETWORK FOR PHASE RETRIEVAL OF MEROMORPHIC
             FUNCTIONS},
   Journal = {Iclr 2022 10th International Conference on Learning
             Representations},
   Year = {2022},
   Month = {January},
   Abstract = {Numerous physical systems are described by ordinary or
             partial differential equations whose solutions are given by
             holomorphic or meromorphic functions in the complex domain.
             In many cases, only the magnitude of these functions are
             observed on various points on the purely imaginary jω-axis
             since coherent measurement of their phases is often
             expensive. However, it is desirable to retrieve the lost
             phases from the magnitudes when possible. To this end, we
             propose a physics-infused deep neural network based on the
             Blaschke products for phase retrieval. Inspired by the
             Helson and Sarason Theorem, we recover coefficients of a
             rational function of Blaschke products using a Blaschke
             Product Neural Network (BPNN), based upon the magnitude
             observations as input. The resulting rational function is
             then used for phase retrieval. We compare the BPNN to
             conventional deep neural networks (NNs) on several phase
             retrieval problems, comprising both synthetic and
             contemporary real-world problems (e.g., metamaterials for
             which data collection requires substantial expertise and is
             time consuming). On each phase retrieval problem, we compare
             against a population of conventional NNs of varying size and
             hyperparameter settings. Even without any hyper-parameter
             search, we find that BPNNs consistently outperform the
             population of optimized NNs in scarce data scenarios, and do
             so despite being much smaller models. The results can in
             turn be applied to calculate the refractive index of
             metamaterials, which is an important problem in emerging
             areas of material science.},
   Key = {fds370060}
}

@article{fds361494,
   Author = {Xu, X and Hasan, A and Elkhalil, K and Ding, J and Tarokh,
             V},
   Title = {Characteristic Neural Ordinary Differential
             Equations},
   Year = {2021},
   Month = {November},
   Abstract = {We propose Characteristic-Neural Ordinary Differential
             Equations (C-NODEs), a framework for extending Neural
             Ordinary Differential Equations (NODEs) beyond ODEs. While
             NODEs model the evolution of a latent variables as the
             solution to an ODE, C-NODE models the evolution of the
             latent variables as the solution of a family of first-order
             quasi-linear partial differential equations (PDEs) along
             curves on which the PDEs reduce to ODEs, referred to as
             characteristic curves. This in turn allows the application
             of the standard frameworks for solving ODEs, namely the
             adjoint method. Learning optimal characteristic curves for
             given tasks improves the performance and computational
             efficiency, compared to state of the art NODE models. We
             prove that the C-NODE framework extends the classical NODE
             on classification tasks by demonstrating explicit C-NODE
             representable functions not expressible by NODEs.
             Additionally, we present C-NODE-based continuous normalizing
             flows, which describe the density evolution of latent
             variables along multiple dimensions. Empirical results
             demonstrate the improvements provided by the proposed method
             for classification and density estimation on CIFAR-10, SVHN,
             and MNIST datasets under a similar computational budget as
             the existing NODE methods. The results also provide
             empirical evidence that the learned curves improve the
             efficiency of the system through a lower number of
             parameters and function evaluations compared with
             baselines.},
   Key = {fds361494}
}

@article{fds361495,
   Author = {Dong, J and Ren, S and Deng, Y and Khatib, O and Malof, J and Soltani, M and Padilla, W and Tarokh, V},
   Title = {Blaschke Product Neural Networks (BPNN): A Physics-Infused
             Neural Network for Phase Retrieval of Meromorphic
             Functions},
   Year = {2021},
   Month = {November},
   Abstract = {Numerous physical systems are described by ordinary or
             partial differential equations whose solutions are given by
             holomorphic or meromorphic functions in the complex domain.
             In many cases, only the magnitude of these functions are
             observed on various points on the purely imaginary jw-axis
             since coherent measurement of their phases is often
             expensive. However, it is desirable to retrieve the lost
             phases from the magnitudes when possible. To this end, we
             propose a physics-infused deep neural network based on the
             Blaschke products for phase retrieval. Inspired by the
             Helson and Sarason Theorem, we recover coefficients of a
             rational function of Blaschke products using a Blaschke
             Product Neural Network (BPNN), based upon the magnitude
             observations as input. The resulting rational function is
             then used for phase retrieval. We compare the BPNN to
             conventional deep neural networks (NNs) on several phase
             retrieval problems, comprising both synthetic and
             contemporary real-world problems (e.g., metamaterials for
             which data collection requires substantial expertise and is
             time consuming). On each phase retrieval problem, we compare
             against a population of conventional NNs of varying size and
             hyperparameter settings. Even without any hyper-parameter
             search, we find that BPNNs consistently outperform the
             population of optimized NNs in scarce data scenarios, and do
             so despite being much smaller models. The results can in
             turn be applied to calculate the refractive index of
             metamaterials, which is an important problem in emerging
             areas of material science.},
   Key = {fds361495}
}

@article{fds361525,
   Author = {Diao, E and Tarokh, V and Ding, J},
   Title = {Decentralized Multi-Target Cross-Domain Recommendation for
             Multi-Organization Collaborations},
   Year = {2021},
   Month = {October},
   Abstract = {Recommender Systems (RSs) are operated locally by different
             organizations in many realistic scenarios. If various
             organizations can fully share their data and perform
             computation in a centralized manner, they may significantly
             improve the accuracy of recommendations. However,
             collaborations among multiple organizations in enhancing the
             performance of recommendations are primarily limited due to
             the difficulty of sharing data and models. To address this
             challenge, we propose Decentralized Multi-Target
             Cross-Domain Recommendation (DMTCDR) with Multi-Target
             Assisted Learning (MTAL) and Assisted AutoEncoder (AAE). Our
             method can help multiple organizations collaboratively
             improve their recommendation performance in a decentralized
             manner without sharing sensitive assets. Consequently, it
             allows decentralized organizations to collaborate and form a
             community of shared interest. We conduct extensive
             experiments to demonstrate that the new method can
             significantly outperform locally trained RSs and mitigate
             the cold start problem.},
   Key = {fds361525}
}

@article{fds361526,
   Author = {Le, CP and Dong, J and Soltani, M and Tarokh, V},
   Title = {Task Affinity with Maximum Bipartite Matching in Few-Shot
             Learning},
   Year = {2021},
   Month = {October},
   Abstract = {We propose an asymmetric affinity score for representing the
             complexity of utilizing the knowledge of one task for
             learning another one. Our method is based on the maximum
             bipartite matching algorithm and utilizes the Fisher
             Information matrix. We provide theoretical analyses
             demonstrating that the proposed score is mathematically
             well-defined, and subsequently use the affinity score to
             propose a novel algorithm for the few-shot learning problem.
             In particular, using this score, we find relevant training
             data labels to the test data and leverage the discovered
             relevant data for episodically fine-tuning a few-shot model.
             Results on various few-shot benchmark datasets demonstrate
             the efficacy of the proposed approach by improving the
             classification accuracy over the state-of-the-art methods
             even when using smaller models.},
   Key = {fds361526}
}

@article{fds356488,
   Author = {Kojima, S and Maruta, K and Feng, Y and Ahn, CJ and Tarokh,
             V},
   Title = {CNN-Based Joint SNR and Doppler Shift Classification Using
             Spectrogram Images for Adaptive Modulation and
             Coding},
   Journal = {Ieee Transactions on Communications},
   Volume = {69},
   Number = {8},
   Pages = {5152-5167},
   Year = {2021},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TCOMM.2021.3077565},
   Abstract = {This paper proposes a novel convolutional neural network
             (CNN) based joint classification method to characterize the
             signal-to-noise power ratio (SNR) and Doppler shift using
             spectrogram images, in order to enable efficient adaptive
             modulation and coding (AMC) designs. It is necessary to
             maintain high communication performances even in stringent
             environments where transceivers move at high speed due to
             the diversification of wireless applications. To optimize
             the transmission rate in such dynamic environments, AMC
             scheme is known to be effective. AMC is generally designed
             based on feedback information (FBI) such as the SNR and
             Doppler shift acquired on the receiving side. Here, the
             challenge is an increase in calculation burden, processing
             delay and estimation accuracy of the FBI. We focused on the
             spectrogram which is composed of power values in the time
             and frequency domains. Its two-dimensional fluctuation
             represents the Doppler shift as well as noise values. In the
             proposed method, such key information for AMC can be
             simultaneously extracted from a single spectrogram via a
             trained CNN. Therefore it is expected to contribute to
             reducing the computational burden and speeding up the signal
             processing. Simulation results are presented to demonstrate
             that the proposed method achieves better performance than
             traditional methods.},
   Doi = {10.1109/TCOMM.2021.3077565},
   Key = {fds356488}
}

@article{fds357266,
   Author = {Cannella, C and Tarokh, V},
   Title = {Semi-Empirical Objective Functions for MCMC Proposal
             Optimization},
   Volume = {abs/2106.02104},
   Year = {2021},
   Month = {June},
   Abstract = {Current objective functions used for training neural MCMC
             proposal distributions implicitly rely on architectural
             restrictions to yield sensible optimization results, which
             hampers the development of highly expressive neural MCMC
             proposal architectures. In this work, we introduce and
             demonstrate a semi-empirical procedure for determining
             approximate objective functions suitable for optimizing
             arbitrarily parameterized proposal distributions in MCMC
             methods. Our proposed Ab Initio objective functions consist
             of the weighted combination of functions following
             constraints on their global optima and transformation
             invariances that we argue should be upheld by general
             measures of MCMC efficiency for use in proposal
             optimization. Our experimental results demonstrate that Ab
             Initio objective functions maintain favorable performance
             and preferable optimization behavior compared to existing
             objective functions for neural MCMC optimization. We find
             that Ab Initio objective functions are sufficiently robust
             to enable the confident optimization of neural proposal
             distributions parameterized by deep generative networks
             extending beyond the regimes of traditional MCMC
             schemes},
   Key = {fds357266}
}

@article{fds357267,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {GAL: Gradient Assisted Learning for Decentralized
             Multi-Organization Collaborations},
   Volume = {abs/2106.01425},
   Year = {2021},
   Month = {June},
   Abstract = {Collaborations among multiple organizations, such as
             financial institutions, medical centers, and retail markets
             in decentralized settings are crucial to providing improved
             service and performance. However, the underlying
             organizations may have little interest in sharing their
             local data, models, and objective functions. These
             requirements have created new challenges for
             multi-organization collaboration. In this work, we propose
             Gradient Assisted Learning (GAL), a new method for multiple
             organizations to assist each other in supervised learning
             tasks without sharing local data, models, and objective
             functions. In this framework, all participants
             collaboratively optimize the aggregate of local loss
             functions, and each participant autonomously builds its own
             model by iteratively fitting the gradients of the
             overarching objective function. We also provide asymptotic
             convergence analysis and practical case studies of GAL.
             Experimental studies demonstrate that GAL can achieve
             performance close to centralized learning when all data,
             models, and objective functions are fully
             disclosed.},
   Key = {fds357267}
}

@article{fds357268,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {SemiFL: Semi-Supervised Federated Learning for Unlabeled
             Clients with Alternate Training},
   Volume = {abs/2106.01432},
   Year = {2021},
   Month = {June},
   Abstract = {Federated Learning allows the training of machine learning
             models by using the computation and private data resources
             of many distributed clients. Most existing results on
             Federated Learning (FL) assume the clients have ground-truth
             labels. However, in many practical scenarios, clients may be
             unable to label task-specific data due to a lack of
             expertise or resource. We propose SemiFL to address the
             problem of combining communication-efficient FL such as
             FedAvg with Semi-Supervised Learning (SSL). In SemiFL,
             clients have completely unlabeled data and can train
             multiple local epochs to reduce communication costs, while
             the server has a small amount of labeled data. We provide a
             theoretical understanding of the success of data
             augmentation-based SSL methods to illustrate the bottleneck
             of a vanilla combination of communication-efficient FL with
             SSL. To address this issue, we propose alternate training to
             `fine-tune global model with labeled data' and `generate
             pseudo-labels with the global model.' We conduct extensive
             experiments and demonstrate that our approach significantly
             improves the performance of a labeled server with unlabeled
             clients training with multiple local epochs. Moreover, our
             method outperforms many existing SSFL baselines and performs
             competitively with the state-of-the-art FL and SSL
             results.},
   Key = {fds357268}
}

@article{fds357269,
   Author = {Yanchenko, AK and Soltani, M and Ravier, RJ and Mukherjee, S and Tarokh,
             V},
   Title = {A Methodology for Exploring Deep Convolutional Features in
             Relation to Hand-Crafted Features with an Application to
             Music Audio Modeling},
   Volume = {abs/2106.00110},
   Year = {2021},
   Month = {May},
   Abstract = {Understanding the features learned by deep models is
             important from a model trust perspective, especially as deep
             systems are deployed in the real world. Most recent
             approaches for deep feature understanding or model
             explanation focus on highlighting input data features that
             are relevant for classification decisions. In this work, we
             instead take the perspective of relating deep features to
             well-studied, hand-crafted features that are meaningful for
             the application of interest. We propose a methodology and
             set of systematic experiments for exploring deep features in
             this setting, where input feature importance approaches for
             deep feature understanding do not apply. Our experiments
             focus on understanding which hand-crafted and deep features
             are useful for the classification task of interest, how
             robust these features are for related tasks and how similar
             the deep features are to the meaningful hand-crafted
             features. Our proposed method is general to many application
             areas and we demonstrate its utility on orchestral music
             audio data.},
   Key = {fds357269}
}

@article{fds358777,
   Author = {Feng, Y and Wongkamthong, C and Soltani, M and Ng, Y and Gogineni, S and Kang, B and Pezeshki, A and Calderbank, R and Rangaswamy, M and Tarokh,
             V},
   Title = {Knowledge-Aided Data-Driven Radar Clutter
             Representation},
   Journal = {Ieee National Radar Conference Proceedings},
   Volume = {2021-May},
   Year = {2021},
   Month = {May},
   ISBN = {9781728176093},
   url = {http://dx.doi.org/10.1109/RadarConf2147009.2021.9455318},
   Abstract = {We use a knowledge-aided, data-driven, location-aware
             approach based on the RFView simulation software to model
             and estimate the effect of ground clutter in airborne
             radars. Using the RFView simulator, we produce many samples
             of potential clutter effects and, by employing the K-means
             clustering algorithm on the corresponding geographical power
             map given by RFView, represent them by a small number of
             virtual scatterers. These virtual scatterers are used for
             clutter estimation. We show comparable accuracy for
             significantly less computational time complexity to those of
             state-of-the-art methods using RFView realistic clutter-like
             data.},
   Doi = {10.1109/RadarConf2147009.2021.9455318},
   Key = {fds358777}
}

@article{fds355092,
   Author = {Ding, J and Diao, E and Zhou, J and Tarokh, V},
   Title = {On Statistical Efficiency in Learning},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {67},
   Number = {4},
   Pages = {2488-2506},
   Year = {2021},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TIT.2020.3047620},
   Abstract = {A central issue of many statistical learning problems is to
             select an appropriate model from a set of candidate models.
             Large models tend to inflate the variance (or overfitting),
             while small models tend to cause biases (or underfitting)
             for a given fixed dataset. In this work, we address the
             critical challenge of model selection to strike a balance
             between model fitting and model complexity, thus gaining
             reliable predictive power. We consider the task of
             approaching the theoretical limit of statistical learning,
             meaning that the selected model has the predictive
             performance that is as good as the best possible model given
             a class of potentially misspecified candidate models. We
             propose a generalized notion of Takeuchi's information
             criterion and prove that the proposed method can
             asymptotically achieve the optimal out-sample prediction
             loss under reasonable assumptions. It is the first proof of
             the asymptotic property of Takeuchi's information criterion
             to our best knowledge. Our proof applies to a wide variety
             of nonlinear models, loss functions, and high dimensionality
             (in the sense that the models' complexity can grow with
             sample size). The proposed method can be used as a
             computationally efficient surrogate for leave-one-out
             cross-validation. Moreover, for modeling streaming data, we
             propose an online algorithm that sequentially expands the
             model complexity to enhance selection stability and reduce
             computation cost. Experimental studies show that the
             proposed method has desirable predictive power and
             significantly less computational cost than some popular
             methods.},
   Doi = {10.1109/TIT.2020.3047620},
   Key = {fds355092}
}

@article{fds356190,
   Author = {Le, CP and Soltani, M and Dong, J and Tarokh, V},
   Title = {Fisher Task Distance and Its Application in Neural
             Architecture Search},
   Volume = {abs/2103.12827},
   Year = {2021},
   Month = {March},
   Abstract = {We formulate an asymmetric (or non-commutative) distance
             between tasks based on Fisher Information Matrices, called
             Fisher task distance. This distance represents the
             complexity of transferring the knowledge from one task to
             another. We provide a proof of consistency for our distance
             through theorems and experiments on various classification
             tasks from MNIST, CIFAR-10, CIFAR-100, ImageNet, and
             Taskonomy datasets. Next, we construct an online neural
             architecture search framework using the Fisher task
             distance, in which we have access to the past learned tasks.
             By using the Fisher task distance, we can identify the
             closest learned tasks to the target task, and utilize the
             knowledge learned from these related tasks for the target
             task. Here, we show how the proposed distance between a
             target task and a set of learned tasks can be used to reduce
             the neural architecture search space for the target task.
             The complexity reduction in search space for task-specific
             architectures is achieved by building on the optimized
             architectures for similar tasks instead of doing a full
             search and without using this side information. Experimental
             results for tasks in MNIST, CIFAR-10, CIFAR-100, ImageNet
             datasets demonstrate the efficacy of the proposed approach
             and its improvements, in terms of the performance and the
             number of parameters, over other gradient-based search
             methods, such as ENAS, DARTS, PC-DARTS.},
   Key = {fds356190}
}

@article{fds356189,
   Author = {Xing, J and Fischer, D and Labh, N and Piersma, R and Lee, BC and Xia, YA and Sahai, T and Tarokh, V},
   Title = {Talaria: A Framework for Simulation of Permissioned
             Blockchains for Logistics and Beyond},
   Volume = {abs/2103.02260},
   Year = {2021},
   Month = {March},
   Abstract = {In this paper, we present Talaria, a novel permissioned
             blockchain simulator that supports numerous protocols and
             use cases, most notably in supply chain management. Talaria
             extends the capability of BlockSim, an existing blockchain
             simulator, to include permissioned blockchains and serves as
             a foundation for further private blockchain assessment.
             Talaria is designed with both practical Byzantine Fault
             Tolerance (pBFT) and simplified version of
             Proof-of-Authority consensus protocols, but can be revised
             to include other permissioned protocols within its modular
             framework. Moreover, Talaria is able to simulate different
             types of malicious authorities and a variable daily
             transaction load at each node. In using Talaria, business
             practitioners and policy planners have an opportunity to
             measure, evaluate, and adapt a range of blockchain solutions
             for commercial operations.},
   Key = {fds356189}
}

@article{fds356487,
   Author = {Soltani, M and Wu, S and Li, Y and Ravier, R and Ding, J and Tarokh,
             V},
   Title = {Compressing Deep Networks Using Fisher Score of Feature
             Maps},
   Journal = {Data Compression Conference Proceedings},
   Volume = {2021-March},
   Pages = {371},
   Year = {2021},
   Month = {March},
   ISBN = {9780738112275},
   url = {http://dx.doi.org/10.1109/DCC50243.2021.00083},
   Abstract = {In this paper, we propose a new structural technique for
             pruning deep neural networks with skip-connections. Our
             approach is based on measuring the importance of feature
             maps in predicting the output of the model using their
             Fisher scores. These scores subsequently used for removing
             the less informative layers from the graph of the network.
             Extensive experiments on the classification of CIFAR-10,
             CIFAR-100, and SVHN data sets demonstrate the efficacy of
             our compressing method both in the number of parameters and
             operations.},
   Doi = {10.1109/DCC50243.2021.00083},
   Key = {fds356487}
}

@article{fds361403,
   Author = {Momenifar, M and Diao, E and Tarokh, V and Bragg,
             AD},
   Title = {Dimension Reduced Turbulent Flow Data From Deep Vector
             Quantizers},
   Journal = {Journal of Turbulence 2022},
   Year = {2021},
   Month = {March},
   Abstract = {Analyzing large-scale data from simulations of turbulent
             flows is memory intensive, requiring significant resources.
             This major challenge highlights the need for data
             compression techniques. In this study, we apply a
             physics-informed Deep Learning technique based on vector
             quantization to generate a discrete, low-dimensional
             representation of data from simulations of three-dimensional
             turbulent flows. The deep learning framework is composed of
             convolutional layers and incorporates physical constraints
             on the flow, such as preserving incompressibility and global
             statistical characteristics of the velocity gradients. The
             accuracy of the model is assessed using statistical,
             comparison-based similarity and physics-based metrics. The
             training data set is produced from Direct Numerical
             Simulation of an incompressible, statistically stationary,
             isotropic turbulent flow. The performance of this lossy data
             compression scheme is evaluated not only with unseen data
             from the stationary, isotropic turbulent flow, but also with
             data from decaying isotropic turbulence, a Taylor-Green
             vortex flow, and a turbulent channel flow. Defining the
             compression ratio (CR) as the ratio of original data size to
             the compressed one, the results show that our model based on
             vector quantization can offer CR$=85$ with a mean square
             error (MSE) of $O(10^{-3})$, and predictions that faithfully
             reproduce the statistics of the flow, except at the very
             smallest scales where there is some loss. Compared to the
             recent study of Glaws. et. al. (Physical Review Fluids,
             5(11):114602, 2020), which was based on a conventional
             autoencoder (where compression is performed in a continuous
             space), our model improves the CR by more than $30$
             percent...},
   Key = {fds361403}
}

@article{fds356188,
   Author = {Le, CP and Soltani, M and Ravier, R and Tarokh, V},
   Title = {Improved Automated Machine Learning from Transfer
             Learning},
   Volume = {abs/2103.00241},
   Year = {2021},
   Month = {February},
   Abstract = {In this paper, we propose a neural architecture search
             framework based on a similarity measure between some
             baseline tasks and a target task. We first define the notion
             of the task similarity based on the log-determinant of the
             Fisher Information matrix. Next, we compute the task
             similarity from each of the baseline tasks to the target
             task. By utilizing the relation between a target and a set
             of learned baseline tasks, the search space of architectures
             for the target task can be significantly reduced, making the
             discovery of the best candidates in the set of possible
             architectures tractable and efficient, in terms of GPU days.
             This method eliminates the requirement for training the
             networks from scratch for a given target task as well as
             introducing the bias in the initialization of the search
             space from the human domain.},
   Key = {fds356188}
}

@article{fds356186,
   Author = {Ng, Y and Hasan, A and Elkhalil, K and Tarokh, V},
   Title = {Generative Archimedean Copulas},
   Volume = {abs/2102.11351},
   Pages = {643-653},
   Year = {2021},
   Month = {February},
   Abstract = {We propose a new generative modeling technique for learning
             multidimensional cumulative distribution functions (CDFs) in
             the form of copulas. Specifically, we consider certain
             classes of copulas known as Archimedean and hierarchical
             Archimedean copulas, popular for their parsimonious
             representation and ability to model different tail
             dependencies. We consider their representation as mixture
             models with Laplace transforms of latent random variables
             from generative neural networks. This alternative
             representation allows for computational efficiencies and
             easy sampling, especially in high dimensions. We describe
             multiple methods for optimizing the network parameters.
             Finally, we present empirical results that demonstrate the
             efficacy of our proposed method in learning multidimensional
             CDFs and its computational efficiency compared to existing
             methods.},
   Key = {fds356186}
}

@article{fds356187,
   Author = {Hasan, A and Elkhalil, K and Ng, Y and Pereira, JM and Farsiu, S and Blanchet, JH and Tarokh, V},
   Title = {Modeling Extremes with d-max-decreasing Neural
             Networks},
   Volume = {abs/2102.09042},
   Year = {2021},
   Month = {February},
   Abstract = {We propose a novel neural network architecture that enables
             non-parametric calibration and generation of multivariate
             extreme value distributions (MEVs). MEVs arise from Extreme
             Value Theory (EVT) as the necessary class of models when
             extrapolating a distributional fit over large spatial and
             temporal scales based on data observed in intermediate
             scales. In turn, EVT dictates that $d$-max-decreasing, a
             stronger form of convexity, is an essential shape constraint
             in the characterization of MEVs. As far as we know, our
             proposed architecture provides the first class of
             non-parametric estimators for MEVs that preserve these
             essential shape constraints. We show that our architecture
             approximates the dependence structure encoded by MEVs at
             parametric rate. Moreover, we present a new method for
             sampling high-dimensional MEVs using a generative model. We
             demonstrate our methodology on a wide range of experimental
             settings, ranging from environmental sciences to financial
             mathematics and verify that the structural properties of
             MEVs are retained compared to existing methods.},
   Key = {fds356187}
}

@article{fds356185,
   Author = {Chan, CH and Tarokh, V and Xiong, M},
   Title = {Convergence Rate of Empirical Spectral Distribution of
             Random Matrices from Linear Codes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {67},
   Number = {2},
   Pages = {1080-1087},
   Year = {2021},
   Month = {February},
   url = {http://dx.doi.org/10.1109/TIT.2020.3039175},
   Abstract = {It is known that the empirical spectral distribution of
             random matrices obtained from linear codes of increasing
             length converges to the well-known Marchenko-Pastur law, if
             the Hamming distance of the dual codes is at least 5. In
             this paper, we prove that the convergence rate in
             probability is at least of the order n{-1/4} where n is the
             length of the code.},
   Doi = {10.1109/TIT.2020.3039175},
   Key = {fds356185}
}

@article{fds360666,
   Author = {Zhou, J and Ding, J and Tan, KM and Tarokh, V},
   Title = {Model linkage selection for cooperative learning},
   Journal = {Journal of Machine Learning Research},
   Volume = {22},
   Year = {2021},
   Month = {January},
   Abstract = {We consider the distributed learning setting where each
             agent or learner holds a specific parametric model and a
             data source. The goal is to integrate information across a
             set of learners and data sources to enhance the prediction
             accuracy of a given learner. A natural way to integrate
             information is to build a joint model across a group of
             learners that shares common parameters of interest. However,
             the underlying parameter sharing patterns across a set of
             learners may not be known a priori. Misspecifying the
             parameter sharing patterns or the parametric model for each
             learner often yields a biased estimator that degrades the
             prediction accuracy. We propose a general method to
             integrate information across a set of learners that is
             robust against misspecification of both models and parameter
             sharing patterns. The main crux of our proposed method is to
             sequentially incorporate additional learners that can
             enhance the prediction accuracy of an existing joint model
             based on user-specified parameter sharing patterns across a
             set of learners. Theoretically, we show that the proposed
             method can data-adaptively select a parameter sharing
             pattern that enhances the predictive performance of a given
             learner. Extensive numerical studies are conducted to assess
             the performance of the proposed method.},
   Key = {fds360666}
}

@article{fds355221,
   Author = {Yang, H and Jing, D and Tarokh, V and Bewley, G and Ferrari,
             S},
   Title = {Flow parameter estimation based on on-board measurements of
             air vehicle traversing turbulent flows},
   Journal = {Aiaa Scitech 2021 Forum},
   Pages = {1-10},
   Year = {2021},
   Month = {January},
   ISBN = {9781624106095},
   Abstract = {Inspired by principles from particle transport theory in
             fluid dynamics, we recently developed a new energy-efficient
             control approach via implicit model following (IMF) for air
             vehicles traversing turbulent flows. However, the control
             design requires prior knowledge of the vortex timescale of
             the turbulent flow. In this paper, we propose an approach to
             estimate the turbulent flow parameters based on noisy
             on-board measurements without prior knowledge of the exact
             flow conditions, and validate it on a two-dimensional
             cellular flow model. By sparse identification of nonlinear
             dynamics (SINDy), the nonlinear vehicle dynamics with wind
             effects introduced are approximated as a sparsely weighted
             combination of user-defined candidate functions.
             Accordingly, separate optimization problems are set up to
             determine the weights representing the active level of
             candidate functions in the unknown nonlinear dynamics. We
             then identify the flow parameters by analyzing the weights
             statistically. Finally, the ability of the proposed method
             to estimate the flow parameters, including the mean
             velocity, the vortex length scale and the vortex timescale,
             is demonstrated by testing the algorithms on different
             measurement data sets with various initial conditions and
             flow parameters. We show that this method can accurately
             estimate the flow parameters within a permissible range of
             error.},
   Key = {fds355221}
}

@article{fds356193,
   Author = {Le, CP and Soltani, M and Ravier, R and Tarokh, V},
   Title = {Task-aware neural architecture search},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {2021-June},
   Pages = {4090-4094},
   Year = {2021},
   Month = {January},
   url = {http://dx.doi.org/10.1109/ICASSP39728.2021.9414412},
   Abstract = {The design of handcrafted neural networks requires a lot of
             time and resources. Recent techniques in Neural Architecture
             Search (NAS) have proven to be competitive or better than
             traditional handcrafted design, although they require domain
             knowledge and have generally used limited search spaces. In
             this paper, we propose a novel framework for neural
             architecture search, utilizing a dictionary of models of
             base tasks and the similarity between the target task and
             the atoms of the dictionary; hence, generating an adaptive
             search space based on the base models of the dictionary. By
             introducing a gradient-based search algorithm, we can
             evaluate and discover the best architecture in the search
             space without fully training the networks. The experimental
             results show the efficacy of our proposed task-aware
             approach.},
   Doi = {10.1109/ICASSP39728.2021.9414412},
   Key = {fds356193}
}

@article{fds357013,
   Author = {Angjelichinoski, M and Soltani, M and Choi, J and Pesaran, B and Tarokh,
             V},
   Title = {Deep Pinsker and James-Stein Neural Networks for Decoding
             Motor Intentions From Limited Data.},
   Journal = {Ieee Transactions on Neural Systems and Rehabilitation
             Engineering : a Publication of the Ieee Engineering in
             Medicine and Biology Society},
   Volume = {29},
   Pages = {1058-1067},
   Year = {2021},
   Month = {January},
   url = {http://dx.doi.org/10.1109/tnsre.2021.3083755},
   Abstract = {Non-parametric regression has been shown to be useful in
             extracting relevant features from Local Field Potential
             (LFP) signals for decoding motor intentions. Yet, in many
             instances, brain-computer interfaces (BCIs) rely on simple
             classification methods, circumventing deep neural networks
             (DNNs) due to limited training data. This paper leverages
             the robustness of several important results in
             non-parametric regression to harness the potentials of deep
             learning in limited data setups. We consider a solution that
             combines Pinsker's theorem as well as its adaptively optimal
             counterpart due to James-Stein for feature extraction from
             LFPs, followed by a DNN for classifying motor intentions. We
             apply our approach to the problem of decoding eye movement
             intentions from LFPs collected in macaque cortex while the
             animals perform memory-guided visual saccades to one of
             eight target locations. The results demonstrate that a DNN
             classifier trained over the Pinsker features outperforms the
             benchmark method based on linear discriminant analysis (LDA)
             trained over the same features.},
   Doi = {10.1109/tnsre.2021.3083755},
   Key = {fds357013}
}

@article{fds361828,
   Author = {Kojima, S and Feng, Y and Maruta, K and Ootsu, K and Yokota, T and Ahn, CJ and Tarokh, V},
   Title = {Investigation of Input Signal Representation to CNN for
             Improving SNR Classification Accuracy},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {2021-September},
   Year = {2021},
   Month = {January},
   ISBN = {9781665413688},
   url = {http://dx.doi.org/10.1109/VTC2021-Fall52928.2021.9625566},
   Abstract = {With the increase in demand for wireless data traffic,
             high-speed communication systems are required in many
             environment. Adaptive modulation and coding is an important
             technique to realize this, but it requires feedback of
             communication environment information represented by SNR.
             Conventional SNR estimation methods have a problem of
             degrading estimation accuracy in fast-moving environments
             and the presence of carrier frequency offset (CFO).
             Convolutional neural network (CNN) is capable of estimating
             the SNR from the trained received signal dataset accurately.
             This paper investigates an input signal representation to
             further improve the SNR classification accuracy by CNN. We
             then propose to combine respective spectrogram data of IQ
             domains. It can extract the features related to SNR from the
             received signal to the maximum extent possible and thus
             achieve highly accurate SNR estimation. Simulation results
             show that the proposed approach outperforms the other
             existing candidates.},
   Doi = {10.1109/VTC2021-Fall52928.2021.9625566},
   Key = {fds361828}
}

@article{fds362635,
   Author = {Ng, Y and Hasan, A and Elkhalil, K and Tarokh, V},
   Title = {Generative Archimedean Copulas},
   Journal = {37th Conference on Uncertainty in Artificial Intelligence,
             Uai 2021},
   Pages = {643-653},
   Year = {2021},
   Month = {January},
   Abstract = {We propose a new generative modeling technique for learning
             multidimensional cumulative distribution functions (CDFs) in
             the form of copulas. Specifically, we consider certain
             classes of copulas known as Archimedean and hierarchical
             Archimedean copulas, popular for their parsimonious
             representation and ability to model different tail
             dependencies. We consider their representation as mixture
             models with Laplace transforms of latent random variables
             from generative neural networks. This alternative
             representation allows for computational efficiencies and
             easy sampling, especially in high dimensions. We describe
             multiple methods for optimizing the network parameters.
             Finally, we present empirical results that demonstrate the
             efficacy of our proposed method in learning multidimensional
             CDFs and its computational efficiency compared to existing
             methods.},
   Key = {fds362635}
}

@article{fds370107,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {HETEROFL: COMPUTATION AND COMMUNICATION EFFICIENT FEDERATED
             LEARNING FOR HETEROGENEOUS CLIENTS},
   Journal = {Iclr 2021 9th International Conference on Learning
             Representations},
   Year = {2021},
   Month = {January},
   Abstract = {Federated Learning (FL) is a method of training machine
             learning models on private data distributed over a large
             number of possibly heterogeneous clients such as mobile
             phones and IoT devices. In this work, we propose a new
             federated learning framework named HeteroFL to address
             heterogeneous clients equipped with very different
             computation and communication capabilities. Our solution can
             enable the training of heterogeneous local models with
             varying computation complexities and still produce a single
             global inference model. For the first time, our method
             challenges the underlying assumption of existing work that
             local models have to share the same architecture as the
             global model. We demonstrate several strategies to enhance
             FL training and conduct extensive empirical evaluations,
             including five computation complexity levels of three model
             architecture on three datasets. We show that adaptively
             distributing subnetworks according to clients' capabilities
             is both computation and communication efficient.},
   Key = {fds370107}
}

@article{fds359640,
   Author = {Le, CP and Soltani, M and Ravier, RJ and Tarokh, V},
   Title = {Task-Aware Neural Architecture Search.},
   Journal = {Icassp},
   Pages = {4090-4094},
   Publisher = {IEEE},
   Year = {2021},
   ISBN = {978-1-7281-7606-2},
   Key = {fds359640}
}

@article{fds351064,
   Author = {Elkhalil, K and Hasan, A and Ding, J and Farsiu, S and Tarokh,
             V},
   Title = {Fisher Auto-Encoders},
   Journal = {24th International Conference on Artificial Intelligence and
             Statistics (Aistats)},
   Volume = {130},
   Pages = {352-360},
   Publisher = {PMLR},
   Editor = {Banerjee, A and Fukumizu, K},
   Year = {2021},
   Key = {fds351064}
}

@article{fds356191,
   Author = {Ding, J and Diao, E and Zhou, J and Tarokh, V},
   Title = {On Statistical Efficiency in Learning.},
   Journal = {Ieee Trans. Inf. Theory},
   Volume = {67},
   Pages = {2488-2506},
   Year = {2021},
   url = {http://dx.doi.org/10.1109/TIT.2020.3047620},
   Doi = {10.1109/TIT.2020.3047620},
   Key = {fds356191}
}

@article{fds357586,
   Author = {Cannella, C and Soltani, M and Tarokh, V},
   Title = {Projected Latent Markov Chain Monte Carlo: Conditional
             Sampling of Normalizing Flows},
   Publisher = {OpenReview.net},
   Year = {2021},
   Abstract = {We introduce Projected Latent Markov Chain Monte Carlo
             (PL-MCMC), a technique for sampling from the exact
             conditional distributions learned by normalizing flows. As a
             conditional sampling method, PL-MCMC enables Monte Carlo
             Expectation Maximization (MC-EM) training of normalizing
             flows from incomplete data. Through experimental tests
             applying normalizing flows to missing data tasks for a
             variety of data sets, we demonstrate the efficacy of PL-MCMC
             for conditional sampling from normalizing
             flows.},
   Key = {fds357586}
}

@article{fds362636,
   Author = {Elkhalil, K and Hasan, A and Ding, J and Farsiu, S and Tarokh,
             V},
   Title = {Fisher Auto-Encoders.},
   Journal = {Aistats},
   Volume = {130},
   Pages = {352-360},
   Publisher = {PMLR},
   Editor = {Banerjee, A and Fukumizu, K},
   Year = {2021},
   Key = {fds362636}
}

@article{fds356192,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {HeteroFL: Computation and Communication Efficient Federated
             Learning for Heterogeneous Clients},
   Volume = {abs/2010.01264},
   Publisher = {OpenReview.net},
   Year = {2020},
   Month = {October},
   Abstract = {Federated Learning (FL) is a method of training machine
             learning models on private data distributed over a large
             number of possibly heterogeneous clients such as mobile
             phones and IoT devices. In this work, we propose a new
             federated learning framework named HeteroFL to address
             heterogeneous clients equipped with very different
             computation and communication capabilities. Our solution can
             enable the training of heterogeneous local models with
             varying computation complexities and still produce a single
             global inference model. For the first time, our method
             challenges the underlying assumption of existing work that
             local models have to share the same architecture as the
             global model. We demonstrate several strategies to enhance
             FL training and conduct extensive empirical evaluations,
             including five computation complexity levels of three model
             architecture on three datasets. We show that adaptively
             distributing subnetworks according to clients' capabilities
             is both computation and communication efficient.},
   Key = {fds356192}
}

@article{fds351056,
   Author = {Angjelichinoski, M and Pesaran, B and Tarokh, V},
   Title = {Deep Cross-Subject Mapping of Neural Activity},
   Volume = {abs/2007.06407},
   Year = {2020},
   Month = {July},
   Abstract = {Objective. In this paper, we consider the problem of
             cross-subject decoding, where neural activity data collected
             from the prefrontal cortex of a given subject (destination)
             is used to decode motor intentions from the neural activity
             of a different subject (source). Approach. We cast the
             problem of neural activity mapping in a probabilistic
             framework where we adopt deep generative modelling. Our
             proposed algorithm uses deep conditional variational
             autoencoder to infer the representation of the neural
             activity of the source subject into an adequate feature
             space of the destination subject where neural decoding takes
             place. Results. We verify our approach on an experimental
             data set in which two macaque monkeys perform memory-guided
             visual saccades to one of eight target locations. The
             results show a peak cross-subject decoding improvement of
             $8\%$ over subject-specific decoding. Conclusion. We
             demonstrate that a neural decoder trained on neural activity
             signals of one subject can be used to robustly decode the
             motor intentions of a different subject with high
             reliability. This is achieved in spite of the non-stationary
             nature of neural activity signals and the subject-specific
             variations of the recording conditions. Significance. The
             findings reported in this paper are an important step
             towards the development of cross-subject brain-computer that
             generalize well across a population.},
   Key = {fds351056}
}

@article{fds351060,
   Author = {Ravier, RJ and Soltani, M and Simões, M and Garagic, D and Tarokh,
             V},
   Title = {GeoStat Representations of Time Series for Fast
             Classification},
   Volume = {abs/2007.06682},
   Year = {2020},
   Month = {July},
   Abstract = {Recent advances in time series classification have largely
             focused on methods that either employ deep learning or
             utilize other machine learning models for feature
             extraction. Though successful, their power often comes at
             the requirement of computational complexity. In this paper,
             we introduce GeoStat representations for time series.
             GeoStat representations are based off of a generalization of
             recent methods for trajectory classification, and summarize
             the information of a time series in terms of comprehensive
             statistics of (possibly windowed) distributions of easy to
             compute differential geometric quantities, requiring no
             dynamic time warping. The features used are intuitive and
             require minimal parameter tuning. We perform an exhaustive
             evaluation of GeoStat on a number of real datasets, showing
             that simple KNN and SVM classifiers trained on these
             representations exhibit surprising performance relative to
             modern single model methods requiring significant
             computational power, achieving state of the art results in
             many cases. In particular, we show that this methodology
             achieves good performance on a challenging dataset involving
             the classification of fishing vessels, where our methods
             achieve good performance relative to the state of the art
             despite only having access to approximately two percent of
             the dataset used in training and evaluating this state of
             the art.},
   Key = {fds351060}
}

@article{fds351059,
   Author = {Cannella, C and Soltani, M and Tarokh, V},
   Title = {Projected Latent Markov Chain Monte Carlo: Conditional
             Sampling of Normalizing Flows},
   Volume = {abs/2007.06140},
   Year = {2020},
   Month = {July},
   Abstract = {We introduce Projected Latent Markov Chain Monte Carlo
             (PL-MCMC), a technique for sampling from the
             high-dimensional conditional distributions learned by a
             normalizing flow. We prove that a Metropolis-Hastings
             implementation of PL-MCMC asymptotically samples from the
             exact conditional distributions associated with a
             normalizing flow. As a conditional sampling method, PL-MCMC
             enables Monte Carlo Expectation Maximization (MC-EM)
             training of normalizing flows from incomplete data. Through
             experimental tests applying normalizing flows to missing
             data tasks for a variety of data sets, we demonstrate the
             efficacy of PL-MCMC for conditional sampling from
             normalizing flows.},
   Key = {fds351059}
}

@article{fds351061,
   Author = {Angjelichinoski, M and Soltani, M and Choi, J and Pesaran, B and Tarokh,
             V},
   Title = {Deep James-Stein Neural Networks for Brain-Computer
             Interfaces},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {2020-May},
   Pages = {1339-1343},
   Publisher = {IEEE},
   Year = {2020},
   Month = {May},
   ISBN = {9781509066315},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9053694},
   Abstract = {Nonparametric regression has proven to be successful in
             extracting features from limited data in neurological
             applications. However, due to data scarcity, most
             brain-computer interfaces still rely on linear classifiers.
             This work leverages the robustness of the James-Stein
             theorem in nonparametric regression to harness the
             potentials of deep learning and foster its successful
             application in neural engineering with small data sets. We
             propose a novel method that combines James-Stein regression
             for feature extraction, and deep neural network for
             decoding; we refer to the architecture as deep James-Stein
             neural network (DJSNN). We apply the DJSNN to decode eye
             movement goals in a memory-guided visual saccades to one of
             eight target locations. The results demonstrate that the
             DJSNN outperforms existing methods by a substantial margin,
             especially at deep cortical sites.},
   Doi = {10.1109/ICASSP40776.2020.9053694},
   Key = {fds351061}
}

@article{fds348335,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {DRASIC: Distributed recurrent autoencoder for scalable image
             compression},
   Journal = {Data Compression Conference Proceedings},
   Volume = {2020-March},
   Pages = {3-12},
   Publisher = {IEEE},
   Year = {2020},
   Month = {March},
   url = {http://dx.doi.org/10.1109/DCC47342.2020.00008},
   Abstract = {We propose a new architecture for distributed image
             compression from a group of distributed data sources. The
             work is motivated by practical needs of data-driven codec
             design, low power consumption, robustness, and data privacy.
             The proposed architecture, which we refer to as Distributed
             Recurrent Autoencoder for Scalable Image Compression
             (DRASIC), is able to train distributed encoders and one
             joint decoder on correlated data sources. Its compression
             capability is much better than the method of training codecs
             separately. Meanwhile, the performance of our distributed
             system with 10 distributed sources is only within 2 dB peak
             signal-to-noise ratio (PSNR) of the performance of a single
             codec trained with all data sources. We experiment
             distributed sources with different correlations and show how
             our data-driven methodology well matches the Slepian-Wolf
             Theorem in Distributed Source Coding (DSC). To the best of
             our knowledge, this is the first data-driven DSC framework
             for general distributed code design with deep
             learning.},
   Doi = {10.1109/DCC47342.2020.00008},
   Key = {fds348335}
}

@article{fds366448,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {Multimodal Controller for Generative Models},
   Year = {2020},
   Month = {February},
   Abstract = {Class-conditional generative models are crucial tools for
             data generation from user-specified class labels. Existing
             approaches for class-conditional generative models require
             nontrivial modifications of backbone generative
             architectures to model conditional information fed into the
             model. This paper introduces a plug-and-play module named
             `multimodal controller' to generate multimodal data without
             introducing additional learning parameters. In the absence
             of the controllers, our model reduces to non-conditional
             generative models. We test the efficacy of multimodal
             controllers on CIFAR10, COIL100, and Omniglot benchmark
             datasets. We demonstrate that multimodal controlled
             generative models (including VAE, PixelCNN, Glow, and GAN)
             can generate class-conditional images of significantly
             better quality when compared with conditional generative
             models. Moreover, we show that multimodal controlled models
             can also create novel modalities of images.},
   Key = {fds366448}
}

@article{fds348337,
   Author = {Angjelichinoski, M and Choi, J and Banerjee, T and Pesaran, B and Tarokh, V},
   Title = {Cross-subject decoding of eye movement goals from local
             field potentials.},
   Journal = {Journal of Neural Engineering},
   Volume = {17},
   Number = {1},
   Pages = {016067},
   Year = {2020},
   Month = {February},
   url = {http://dx.doi.org/10.1088/1741-2552/ab6df3},
   Abstract = {<h4>Objective</h4>We consider the cross-subject decoding
             problem from local field potential (LFP) signals, where
             training data collected from the prefrontal cortex (PFC) of
             a source subject is used to decode intended motor actions in
             a destination subject.<h4>Approach</h4>We propose a novel
             supervised transfer learning technique, referred to as data
             centering, which is used to adapt the feature space of the
             source to the feature space of the destination. The key
             ingredients of data centering are the transfer functions
             used to model the deterministic component of the
             relationship between the source and destination feature
             spaces. We propose an efficient data-driven estimation
             approach for linear transfer functions that uses the first
             and second order moments of the class-conditional
             distributions.<h4>Main results</h4>We apply our data
             centering technique with linear transfer functions for
             cross-subject decoding of eye movement intentions in an
             experiment where two macaque monkeys perform memory-guided
             visual saccades to one of eight target locations. The
             results show peak cross-subject decoding performance of
             [Formula: see text], which marks a substantial improvement
             over random choice decoder. In addition to this, data
             centering also outperforms standard sampling-based methods
             in setups with imbalanced training data.<h4>Significance</h4>The
             analyses presented herein demonstrate that the proposed data
             centering is a viable novel technique for reliable LFP-based
             cross-subject brain-computer interfacing and neural
             prostheses.},
   Doi = {10.1088/1741-2552/ab6df3},
   Key = {fds348337}
}

@article{fds348861,
   Author = {Zhou, Y and Wang, Z and Ji, K and Liang, Y and Tarokh,
             V},
   Title = {Proximal gradient algorithm with momentum and flexible
             parameter restart for nonconvex optimization},
   Journal = {Ijcai International Joint Conference on Artificial
             Intelligence},
   Volume = {2021-January},
   Pages = {1445-1451},
   Year = {2020},
   Month = {January},
   Abstract = {Various types of parameter restart schemes have been
             proposed for proximal gradient algorithm with momentum to
             facilitate their convergence in convex optimization.
             However, under parameter restart, the convergence of
             proximal gradient algorithm with momentum remains obscure in
             nonconvex optimization. In this paper, we propose a novel
             proximal gradient algorithm with momentum and parameter
             restart for solving nonconvex and nonsmooth problems. Our
             algorithm is designed to 1) allow for adopting flexible
             parameter restart schemes that cover many existing ones; 2)
             have a global sub-linear convergence rate in nonconvex and
             nonsmooth optimization; and 3) have guaranteed convergence
             to a critical point and have various types of asymptotic
             convergence rates depending on the parameterization of local
             geometry in nonconvex and nonsmooth optimization. Numerical
             experiments demonstrate the convergence and effectiveness of
             our proposed algorithm.},
   Key = {fds348861}
}

@article{fds348802,
   Author = {Jeong, S and Li, X and Yang, J and Li, Q and Tarokh,
             V},
   Title = {Sparse Representation-Based Denoising for High-Resolution
             Brain Activation and Functional Connectivity Modeling: A
             Task fMRI Study.},
   Journal = {Ieee Access},
   Volume = {8},
   Pages = {36728-36740},
   Year = {2020},
   Month = {January},
   url = {http://dx.doi.org/10.1109/access.2020.2971261},
   Abstract = {In the field of neuroimaging and cognitive neuroscience,
             functional Magnetic Resonance Imaging (fMRI) has been widely
             used to study the functional localization and connectivity
             of the brain. However, the inherently low signal-to-noise
             ratio (SNR) of the fMRI signals greatly limits the accuracy
             and resolution of current studies. In addressing this
             fundamental challenge in fMRI analytics, in this work we
             develop and implement a denoising method for task fMRI
             (tfMRI) data in order to delineate the high-resolution
             spatial pattern of the brain activation and functional
             connectivity via dictionary learning and sparse coding
             (DLSC). In addition to the traditional unsupervised
             dictionary learning model which has shown success in image
             denoising, we further utilize the prior knowledge of task
             paradigm to learn a dictionary consisting of both
             data-driven and model-driven terms for a more stable sparse
             representation of the data. The proposed method is applied
             to preprocess the motor tfMRI dataset from Human Connectome
             Project (HCP) for the purpose of brain activation detection
             and functional connectivity estimation. Comparison between
             the results from original and denoised fMRI data shows that
             the disruptive brain activation and functional connectivity
             patterns can be recovered, and the prominence of such
             patterns is improved through denoising. The proposed method
             is then compared with the temporal non-local means
             (tNLM)-based denoising method and shows consistently
             superior performance in various experimental settings. The
             promising results show that the proposed DLSC-based fMRI
             denoising method can effectively reduce the noise level of
             the fMRI signals and increase the interpretability of the
             inferred results, therefore constituting a crucial part of
             the preprocessing pipeline and provide the foundation for
             further high-resolution functional analysis.},
   Doi = {10.1109/access.2020.2971261},
   Key = {fds348802}
}

@article{fds366449,
   Author = {Soltani, M and Wu, S and Ding, J and Ravier, R and Tarokh,
             V},
   Title = {On the information of feature maps and pruning of deep
             neural networks},
   Journal = {Proceedings International Conference on Pattern
             Recognition},
   Pages = {6988-6995},
   Year = {2020},
   Month = {January},
   ISBN = {9781728188089},
   url = {http://dx.doi.org/10.1109/ICPR48806.2021.9412579},
   Abstract = {A technique for compressing deep neural models achieving
             competitive performance to state-of-the-art methods is
             proposed. The approach utilizes the mutual information
             between the feature maps and the output of the model in
             order to prune the redundant layers of the network.
             Extensive numerical experiments on both CIFAR-10, CIFAR-100,
             and Tiny ImageNet data sets demonstrate that the proposed
             method can be effective in compressing deep models, both in
             terms of the numbers of parameters and operations. For
             instance, by applying the proposed approach to DenseNet
             model with 0.77 million parameters and 293 million
             operations for classification of CIFAR-10 data set, a
             reduction of 62.66% and 41.00% in the number of parameters
             and the number of operations are respectively achieved,
             while increasing the test error only by less than
             1%.},
   Doi = {10.1109/ICPR48806.2021.9412579},
   Key = {fds366449}
}

@article{fds350557,
   Author = {Wu, S and Diao, E and Ding, J and Tarokh, V},
   Title = {Deep Clustering of Compressed Variational
             Embeddings.},
   Journal = {Dcc},
   Volume = {2020-March},
   Pages = {399-399},
   Publisher = {IEEE},
   Editor = {Bilgin, A and Marcellin, MW and Serra-Sagristà, J and Storer,
             JA},
   Year = {2020},
   ISBN = {978-1-7281-6457-1},
   url = {http://dx.doi.org/10.1109/DCC47342.2020.00051},
   Abstract = {Motivated by the ever-increasing demands for limited
             communication bandwidth and low-power consumption, we
             propose a new methodology, named joint Variational
             Autoencoders with Bernoulli mixture models (VAB), for
             performing clustering in the compressed data domain. The
             idea is to reduce the data dimension by Variational
             Autoencoders (VAEs) and group data representations by
             Bernoulli mixture models (BMMs). Once jointly trained for
             compression and clustering, the model can be decomposed into
             two parts: a data vendor that encodes the raw data into
             compressed data, and a data consumer that classifies the
             received (compressed) data. In this way, the data vendor
             benefits from data security and communication bandwidth,
             while the data consumer benefits from low computational
             complexity. To enable training using the gradient descent
             algorithm, we propose to use the Gumbel-Softmax distribution
             to resolve the infeasibility of the back-propagation
             algorithm when assessing categorical samples.},
   Doi = {10.1109/DCC47342.2020.00051},
   Key = {fds350557}
}

@article{fds350558,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {DRASIC: Distributed Recurrent Autoencoder for Scalable Image
             Compression.},
   Journal = {Dcc},
   Pages = {3-12},
   Publisher = {IEEE},
   Editor = {Bilgin, A and Marcellin, MW and Serra-Sagristà, J and Storer,
             JA},
   Year = {2020},
   ISBN = {978-1-7281-6457-1},
   Key = {fds350558}
}

@article{fds350559,
   Author = {Zhou, Y and Wang, Z and Ji, K and Liang, Y and Tarokh,
             V},
   Title = {Proximal Gradient Algorithm with Momentum and Flexible
             Parameter Restart for Nonconvex Optimization},
   Journal = {Proceedings of the Twenty Ninth International Joint
             Conference on Artificial Intelligence},
   Pages = {1445-1451},
   Publisher = {ijcai.org},
   Editor = {Bessiere, C},
   Year = {2020},
   Key = {fds350559}
}

@article{fds351057,
   Author = {Le, CP and Zhou, Y and Ding, J and Tarokh, V},
   Title = {Supervised Encoding for Discrete Representation
             Learning.},
   Journal = {Icassp},
   Volume = {2020-May},
   Pages = {3447-3451},
   Publisher = {IEEE},
   Year = {2020},
   ISBN = {978-1-5090-6631-5},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9054118},
   Abstract = {Classical supervised classification tasks search for a
             nonlinear mapping that maps each encoded feature directly to
             a probability mass over the labels. Such a learning
             framework typically lacks the intuition that encoded
             features from the same class tend to be similar and thus has
             little interpretability for the learned features. In this
             paper, we propose a novel supervised learning model named
             Supervised-Encoding Quantizer (SEQ). The SEQ applies a
             quantizer to cluster and classify the encoded features. We
             found that the quantizer provides an interpretable graph
             where each cluster in the graph represents a class of data
             samples that have a particular style. We also trained a
             decoder that can decode convex combinations of the encoded
             features from similar and different clusters and provide
             guidance on style transfer between sub-classes.},
   Doi = {10.1109/ICASSP40776.2020.9054118},
   Key = {fds351057}
}

@article{fds351058,
   Author = {Ng, Y and Pereira, JM and Garagic, D and Tarokh, V},
   Title = {Robust Marine Buoy Placement for Ship Detection Using
             Dropout K-Means.},
   Journal = {Icassp},
   Volume = {2020-May},
   Pages = {3757-3761},
   Publisher = {IEEE},
   Year = {2020},
   ISBN = {978-1-5090-6631-5},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9053064},
   Abstract = {Marine buoys aid in the battle against Illegal, Unreported
             and Unregulated (IUU) fishing by detecting fishing vessels
             in their vicinity. Marine buoys, however, may be disrupted
             by natural causes and buoy vandalism. In this paper, we
             formulate marine buoy placement as a clustering problem, and
             propose dropout k-means and dropout k-median to improve
             placement robustness to buoy disruption.We simulated the
             passage of ships in the Gabonese waters near West Africa
             using historical Automatic Identification System (AIS) data,
             then compared the ship detection probability of dropout
             k-means to classic k-means and dropout k-median to classic
             k-median. With 5 buoys, the buoy arrangement computed by
             classic k-means, dropout k-means, classic k-median and
             dropout k-median have ship detection probabilities of 38%,
             45%, 48% and 52%.},
   Doi = {10.1109/ICASSP40776.2020.9053064},
   Key = {fds351058}
}

@article{fds351062,
   Author = {Cannella, C and Ding, J and Soltani, M and Zhou, Y and Tarokh,
             V},
   Title = {Perception-Distortion Trade-Off with Restricted Boltzmann
             Machines.},
   Journal = {Icassp},
   Volume = {2020-May},
   Pages = {4022-4026},
   Publisher = {IEEE},
   Year = {2020},
   ISBN = {978-1-5090-6631-5},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9052991},
   Abstract = {In this work, we introduce a new procedure for applying
             Restricted Boltzmann Machines (RBMs) to missing data
             inference tasks, based on linearization of the effective
             energy function governing the distribution of observations.
             We compare the performance of our proposed procedure with
             those obtained using existing reconstruction procedures
             trained on incomplete data. We place these performance
             comparisons within the context of the perception-distortion
             trade-off observed in other data reconstruction tasks, which
             has, until now, remained unexplored in tasks relying on
             incomplete training data.},
   Doi = {10.1109/ICASSP40776.2020.9052991},
   Key = {fds351062}
}

@article{fds351063,
   Author = {Hasan, A and Pereira, JM and Ravier, RJ and Farsiu, S and Tarokh,
             V},
   Title = {Learning Partial Differential Equations From Data Using
             Neural Networks.},
   Journal = {Icassp},
   Volume = {2020-May},
   Pages = {3962-3966},
   Publisher = {IEEE},
   Year = {2020},
   ISBN = {978-1-5090-6631-5},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9053750},
   Abstract = {We develop a framework for estimating unknown partial
             differential equations (PDEs) from noisy data, using a deep
             learning approach. Given noisy samples of a solution to an
             unknown PDE, our method interpolates the samples using a
             neural network, and extracts the PDE by equating derivatives
             of the neural network approximation. Our method applies to
             PDEs which are linear combinations of user-defined
             dictionary functions, and generalizes previous methods that
             only consider parabolic PDEs. We introduce a regularization
             scheme that prevents the function approximation from
             overfitting the data and forces it to be a solution of the
             underlying PDE. We validate the model on simulated data
             generated by the known PDEs and added Gaussian noise, and we
             study our method under different levels of noise. We also
             compare the error of our method with a Cramer-Rao lower
             bound for an ordinary differential equation (ODE). Our
             results indicate that our method outperforms other methods
             in estimating PDEs, especially in the low signal-to-noise
             (SNR) regime.},
   Doi = {10.1109/ICASSP40776.2020.9053750},
   Key = {fds351063}
}

@article{fds351065,
   Author = {Wang, J and Xue, M and Culhane, R and Diao, E and Ding, J and Tarokh,
             V},
   Title = {Speech Emotion Recognition with Dual-Sequence LSTM
             Architecture.},
   Journal = {Icassp},
   Volume = {2020-May},
   Pages = {6474-6478},
   Publisher = {IEEE},
   Year = {2020},
   ISBN = {978-1-5090-6631-5},
   url = {http://dx.doi.org/10.1109/ICASSP40776.2020.9054629},
   Abstract = {Speech Emotion Recognition (SER) has emerged as a critical
             component of the next generation of human-machine
             interfacing technologies. In this work, we propose a new
             duallevel model that predicts emotions based on both MFCC
             features and mel-spectrograms produced from raw audio
             signals. Each utterance is preprocessed into MFCC features
             and two mel-spectrograms at different time-frequency
             resolutions. A standard LSTM processes the MFCC features,
             while a novel LSTM architecture, denoted as Dual-Sequence
             LSTM (DSLSTM), processes the two mel-spectrograms
             simultaneously. The outputs are later averaged to produce a
             final classification of the utterance. Our proposed model
             achieves, on average, a weighted accuracy of 72.7% and an
             unweighted accuracy of 73.3%-a 6% improvement over current
             state-of-the-art unimodal models-and is comparable with
             multimodal models that leverage textual information as well
             as audio signals.},
   Doi = {10.1109/ICASSP40776.2020.9054629},
   Key = {fds351065}
}

@article{fds348338,
   Author = {Zhang, Y and Ravier, RJ and Zavlanos, MM and Tarokh,
             V},
   Title = {A Distributed Online Convex Optimization Algorithm with
             Improved Dynamic Regret},
   Journal = {Proceedings of the Ieee Conference on Decision and
             Control},
   Volume = {2019-December},
   Pages = {2449-2454},
   Year = {2019},
   Month = {December},
   url = {http://dx.doi.org/10.1109/CDC40024.2019.9029474},
   Abstract = {In this paper, we consider the problem of distributed online
             convex optimization, where a network of local agents aim to
             jointly optimize a convex function over a period of multiple
             time steps. The agents do not have any information about the
             future. Existing algorithms have established dynamic regret
             bounds that have explicit dependence on the number of time
             steps. In this work, we show that we can remove this
             dependence assuming that the local objective functions are
             strongly convex. More precisely, we propose a gradient
             tracking algorithm where agents jointly communicate and
             descend based on corrected gradient steps. We verify our
             theoretical results through numerical experiments.},
   Doi = {10.1109/CDC40024.2019.9029474},
   Key = {fds348338}
}

@article{fds348336,
   Author = {DIao, E and DIng, J and Tarokh, V},
   Title = {Restricted Recurrent Neural Networks},
   Journal = {Proceedings 2019 Ieee International Conference on Big Data,
             Big Data 2019},
   Volume = {abs/1908.07724},
   Pages = {56-63},
   Year = {2019},
   Month = {December},
   url = {http://dx.doi.org/10.1109/BigData47090.2019.9006257},
   Abstract = {Recurrent Neural Network (RNN) and its variations such as
             Long Short-Term Memory (LSTM) and Gated Recurrent Unit
             (GRU), have become standard building blocks for learning
             online data of sequential nature in many research areas,
             including natural language processing and speech data
             analysis. In this paper, we present a new methodology to
             significantly reduce the number of parameters in RNNs while
             maintaining performance that is comparable or even better
             than classical RNNs. The new proposal, referred to as
             Restricted Recurrent Neural Network (RRNN), restricts the
             weight matrices corresponding to the input data and hidden
             states at each time step to share a large proportion of
             parameters. The new architecture can be regarded as a
             compression of its classical counterpart, but it does not
             require pre-training or sophisticated parameter fine-tuning,
             both of which are major issues in most existing compression
             techniques. Experiments on natural language modeling show
             that compared with its classical counterpart, the restricted
             recurrent architecture generally produces comparable results
             at about 50% compression rate. In particular, the Restricted
             LSTM can outperform classical RNN with even less number of
             parameters.},
   Doi = {10.1109/BigData47090.2019.9006257},
   Key = {fds348336}
}

@article{fds348803,
   Author = {Feng, Y and Zhou, Y and Tarokh, V},
   Title = {Recurrent Neural Network-Assisted Adaptive Sampling for
             Approximate Computing},
   Journal = {Proceedings 2019 Ieee International Conference on Big Data,
             Big Data 2019},
   Pages = {2240-2246},
   Year = {2019},
   Month = {December},
   ISBN = {9781728108582},
   url = {http://dx.doi.org/10.1109/BigData47090.2019.9006504},
   Abstract = {We propose an adaptive signal sampling approach that
             dynamically adjusts the sampling rate to approximate the
             local Nyquist rate of the signal. The proposed adaptive
             sampling approach consists of a recurrent neural
             network-based change detector that detects the point of
             frequency change and a local Nyquist rate estimator based on
             a multi-rate signal processing scheme. We empirically
             demonstrate that our adaptive sampling approach
             significantly reduces the overall sampling rate for various
             types of signals and therefore improves the computational
             efficiency of subsequent signal processing.},
   Doi = {10.1109/BigData47090.2019.9006504},
   Key = {fds348803}
}

@article{fds349201,
   Author = {Ravier, RJ and Calderbank, AR and Tarokh, V},
   Title = {Prediction in Online Convex Optimization for Parametrizable
             Objective Functions},
   Journal = {Proceedings of the Ieee Conference on Decision and
             Control},
   Volume = {2019-December},
   Pages = {2455-2460},
   Year = {2019},
   Month = {December},
   url = {http://dx.doi.org/10.1109/CDC40024.2019.9030013},
   Abstract = {Many techniques for online optimization problems involve
             making decisions based solely on presently available
             information: fewer works take advantage of potential
             predictions. In this paper, we discuss the problem of online
             convex optimization for parametrizable objectives, i.e.
             optimization problems that depend solely on the value of a
             parameter at a given time. We introduce a new regularity for
             dynamic regret based on the accuracy of predicted values of
             the parameters and show that, under mild assumptions,
             accurate prediction can yield tighter bounds on dynamic
             regret. Inspired by recent advances on learning how to
             optimize, we also propose a novel algorithm to
             simultaneously predict and optimize for parametrizable
             objectives and study its performance using numerical
             experiments.},
   Doi = {10.1109/CDC40024.2019.9030013},
   Key = {fds349201}
}

@article{fds349562,
   Author = {Zhang, Y and Ravier, RJ and Tarokh, V and Zavlanos,
             MM},
   Title = {Distributed Online Convex Optimization with Improved Dynamic
             Regret},
   Pages = {2449-2454},
   Publisher = {IEEE},
   Year = {2019},
   Month = {November},
   Abstract = {In this paper, we consider the problem of distributed online
             convex optimization, where a group of agents collaborate to
             track the global minimizers of a sum of time-varying
             objective functions in an online manner. Specifically, we
             propose a novel distributed online gradient descent
             algorithm that relies on an online adaptation of the
             gradient tracking technique used in static optimization. We
             show that the dynamic regret bound of this algorithm has no
             explicit dependence on the time horizon and, therefore, can
             be tighter than existing bounds especially for problems with
             long horizons. Our bound depends on a new regularity measure
             that quantifies the total change in the gradients at the
             optimal points at each time instant. Furthermore, when the
             optimizer is approximatly subject to linear dynamics, we
             show that the dynamic regret bound can be further tightened
             by replacing the regularity measure that captures the path
             length of the optimizer with the accumulated prediction
             errors, which can be much lower in this special case. We
             present numerical experiments to corroborate our theoretical
             results.},
   Key = {fds349562}
}

@article{fds342380,
   Author = {Shao, S and Jacob, PE and Ding, J and Tarokh, V},
   Title = {Bayesian Model Comparison with the Hyvärinen Score:
             Computation and Consistency},
   Journal = {Journal of the American Statistical Association},
   Volume = {114},
   Number = {528},
   Pages = {1826-1837},
   Year = {2019},
   Month = {October},
   url = {http://dx.doi.org/10.1080/01621459.2018.1518237},
   Abstract = {The Bayes factor is a widely used criterion in model
             comparison and its logarithm is a difference of
             out-of-sample predictive scores under the logarithmic
             scoring rule. However, when some of the candidate models
             involve vague priors on their parameters, the log-Bayes
             factor features an arbitrary additive constant that hinders
             its interpretation. As an alternative, we consider model
             comparison using the Hyvärinen score. We propose a method
             to consistently estimate this score for parametric models,
             using sequential Monte Carlo methods. We show that this
             score can be estimated for models with tractable likelihoods
             as well as nonlinear non-Gaussian state-space models with
             intractable likelihoods. We prove the asymptotic consistency
             of this new model selection criterion under strong
             regularity assumptions in the case of nonnested models, and
             we provide qualitative insights for the nested case. We also
             use existing characterizations of proper scoring rules on
             discrete spaces to extend the Hyvärinen score to discrete
             observations. Our numerical illustrations include
             Lévy-driven stochastic volatility models and diffusion
             models for population dynamics. Supplementary materials for
             this article are available online.},
   Doi = {10.1080/01621459.2018.1518237},
   Key = {fds342380}
}

@article{fds348339,
   Author = {Zhou, Y and Feng, Y and Tarokh, V and Gintautas, V and McClelland, J and Garagic, D},
   Title = {Multi-Level Mean-Shift Clustering for Single-Channel Radio
             Frequency Signal Separation},
   Journal = {Ieee International Workshop on Machine Learning for Signal
             Processing, Mlsp},
   Volume = {2019-October},
   Pages = {1-6},
   Publisher = {IEEE},
   Year = {2019},
   Month = {October},
   ISBN = {9781728108247},
   url = {http://dx.doi.org/10.1109/MLSP.2019.8918879},
   Abstract = {Emerging wireless communication applications have led to a
             crowded radio frequency (RF) spectrum. Therefore, it is
             desired to develop signal separation techniques that can
             extract different RF signals from their mixtures. Existing
             signal separation approaches typically require multiple
             observations of the signal mixtures and depend on
             statistical independence among the signals. In this paper,
             we consider separating multiple RF wireless signals from
             their single-channel superposition. These RF signals are
             transmitted in their corresponding high-frequency pass bands
             with diverse power spectrum densities, bandwidths, and time
             durations. We propose a signal separation approach that
             exploits the mean-shift clustering algorithm with multiple
             levels of cluster sizes to identify RF signals with
             different bandwidths in the spectrogram of the superposed
             signal. We demonstrate the effectiveness of our approach by
             separating RF signals using real datasets.},
   Doi = {10.1109/MLSP.2019.8918879},
   Key = {fds348339}
}

@article{fds342500,
   Author = {Angjelichinoski, M and Banerjee, T and Choi, J and Pesaran, B and Tarokh, V},
   Title = {Minimax-optimal decoding of movement goals from local field
             potentials using complex spectral features.},
   Journal = {Journal of Neural Engineering},
   Volume = {16},
   Number = {4},
   Pages = {046001},
   Year = {2019},
   Month = {August},
   url = {http://dx.doi.org/10.1088/1741-2552/ab1a1f},
   Abstract = {<h4>Objective</h4>We consider the problem of predicting eye
             movement goals from local field potentials (LFP) recorded
             through a multielectrode array in the macaque prefrontal
             cortex. The monkey is tasked with performing memory-guided
             saccades to one of eight targets during which LFP activity
             is recorded and used to train a decoder.<h4>Approach</h4>Previous
             reports have mainly relied on the spectral amplitude of the
             LFPs as decoding feature, while neglecting the phase without
             proper theoretical justification. This paper formulates the
             problem of decoding eye movement intentions in a
             statistically optimal framework and uses Gaussian sequence
             modeling and Pinsker's theorem to generate minimax-optimal
             estimates of the LFP signals which are used as decoding
             features. The approach is shown to act as a low-pass filter
             and each LFP in the feature space is represented via its
             complex Fourier coefficients after appropriate shrinking
             such that higher frequency components are attenuated; this
             way, the phase information inherently present in the LFP
             signal is naturally embedded into the feature space.<h4>Main
             results</h4>We show that the proposed complex spectrum-based
             decoder achieves prediction accuracy of up to [Formula: see
             text] at superficial cortical depths near the surface of the
             prefrontal cortex; this marks a significant performance
             improvement over conventional power spectrum-based
             decoders.<h4>Significance</h4>The presented analyses
             showcase the promising potential of low-pass filtered LFP
             signals for highly reliable neural decoding of intended
             motor actions.},
   Doi = {10.1088/1741-2552/ab1a1f},
   Key = {fds342500}
}

@article{fds345908,
   Author = {Krishnamurthy, S and Bliss, DW and Richmond, CD and Tarokh,
             V},
   Title = {Peak sidelobe level gumbel distribution of antenna arrays
             with random phase centers},
   Journal = {Ieee Transactions on Antennas and Propagation},
   Volume = {67},
   Number = {8},
   Pages = {5399-5410},
   Year = {2019},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TAP.2019.2917469},
   Abstract = {The maximum value of an antenna array's sidelobe
             beampattern, or radiation pattern in the power domain, is an
             important parameter determining its performance. In this
             paper, when array antenna elements have random phase
             centers, we approximate the maximum sidelobe value, or peak
             sidelobe level, as a Gumbel distribution using the extreme
             value theory (EVT). Before the EVT result, an expression for
             the beampattern distribution at each angle in the array
             field of view is found. From this expression, the pointwise
             convergence of the difference between the beampattern and
             exponential distributions in the limit of a large number of
             antennas is obtained. Using the exponential distribution
             approximation, EVT is applied with samples of the
             beampattern. A bound is given for the difference between the
             beampattern sample maximum and its true maximum in the
             sidelobe region.},
   Doi = {10.1109/TAP.2019.2917469},
   Key = {fds345908}
}

@article{fds343754,
   Author = {Banerjee, T and Allsop, S and Tye, KM and Ba, D and Tarokh,
             V},
   Title = {Sequential Detection of Regime Changes in Neural
             Data},
   Journal = {International Ieee/Embs Conference on Neural Engineering,
             Ner},
   Volume = {2019-March},
   Pages = {139-142},
   Year = {2019},
   Month = {May},
   url = {http://dx.doi.org/10.1109/NER.2019.8716926},
   Abstract = {The problem of detecting changes in firing patterns in
             neural data is studied. The problem is formulated as a
             quickest change detection (QCD) problem. Important
             algorithms from the literature are reviewed. A new
             algorithmic technique is discussed to detect deviations from
             learned baseline behavior. The algorithms studied can be
             applied to both spike and local field potential data. The
             algorithms are applied to mice spike data to verify the
             presence of behavioral learning.},
   Doi = {10.1109/NER.2019.8716926},
   Key = {fds343754}
}

@article{fds339923,
   Author = {Ding, J and Zhou, J and Tarokh, V},
   Title = {Asymptotically Optimal Prediction for Time-Varying Data
             Generating Processes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {65},
   Number = {5},
   Pages = {3034-3067},
   Year = {2019},
   Month = {May},
   url = {http://dx.doi.org/10.1109/TIT.2018.2882819},
   Abstract = {We develop a methodology (referred to as kinetic prediction)
             for predicting time series undergoing unknown changes in
             their data generating distributions. Based on
             Kolmogorov-Tikhomirov's {\varepsilon } -entropy, we propose
             a concept called {\varepsilon } -predictability that
             quantifies the size of a model class (which can be
             parametric or nonparametric) and the maximal number of
             abrupt structural changes that guarantee the achievability
             of asymptotically optimal prediction. Moreover, for
             parametric distribution families, we extend the
             aforementioned kinetic prediction with discretized function
             spaces to its counterpart with continuous function spaces,
             and propose a sequential Monte Carlo-based implementation.
             We also extend our methodology for predicting smoothly
             varying data generating distributions. Under reasonable
             assumptions, we prove that the average predictive
             performance converges almost surely to the oracle bound,
             which corresponds to the case that the data generating
             distributions are known in advance. The results also shed
             some light on the so called 'prediction-inference dilemma.'
             Various examples and numerical results are provided to
             demonstrate the wide applicability of our
             methodology.},
   Doi = {10.1109/TIT.2018.2882819},
   Key = {fds339923}
}

@article{fds341252,
   Author = {Xiang, Y and Ding, J and Tarokh, V},
   Title = {Estimation of the evolutionary spectra with application to
             stationarity test},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {67},
   Number = {5},
   Pages = {1353-1365},
   Publisher = {IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS
             INC},
   Year = {2019},
   Month = {March},
   url = {http://dx.doi.org/10.1109/TSP.2018.2890369},
   Abstract = {In this paper, we propose a new inference procedure for
             understanding non-stationary processes, under the framework
             of evolutionary spectra developed by Priestley. Among
             various frameworks of modeling non-stationary processes, the
             distinguishing feature of the evolutionary spectra is its
             focus on the physical meaning of frequency. The classical
             estimate of the evolutionary spectral density is based on a
             double-window technique consisting of a short-time Fourier
             transform and a smoothing. However, smoothing is known to
             suffer from the so-called bias leakage problem. By
             incorporating Thomson's multitaper method that was
             originally designed for stationary processes, we propose an
             improved estimate of the evolutionary spectral density, and
             analyze its bias/variance/resolution tradeoff. As an
             application of the new estimate, we further propose a
             non-parametric rank-based stationarity test, and provide
             various experimental studies.},
   Doi = {10.1109/TSP.2018.2890369},
   Key = {fds341252}
}

@article{fds339989,
   Author = {Banerjee, T and Whipps, G and Gurram, P and Tarokh,
             V},
   Title = {Cyclostationary statistical models and algorithms for
             anomaly detection using multi-modal data},
   Journal = {2018 Ieee Global Conference on Signal and Information
             Processing, Globalsip 2018 Proceedings},
   Volume = {abs/1807.06945},
   Pages = {126-130},
   Year = {2019},
   Month = {February},
   url = {http://dx.doi.org/10.1109/GlobalSIP.2018.8646417},
   Abstract = {A framework is proposed to detect anomalies in multi-modal
             data. A deep neural network-based object detector is
             employed to extract counts of objects and sub-events from
             the data. A cyclostationary model is proposed to model
             regular patterns of behavior in the count sequences. The
             anomaly detection problem is formulated as a problem of
             detecting deviations from learned cyclostationary behavior.
             Sequential algorithms are proposed to detect anomalies using
             the proposed model. The proposed algorithms are shown to be
             asymptotically efficient in a well-defined sense. The
             developed algorithms are applied to a multi-modal data
             consisting of CCTV imagery and social media posts to detect
             a 5K run in New York City.},
   Doi = {10.1109/GlobalSIP.2018.8646417},
   Key = {fds339989}
}

@article{fds361404,
   Author = {Zhou, Y and Wang, Z and Ji, K and Liang, Y and Tarokh,
             V},
   Title = {Momentum Schemes with Stochastic Variance Reduction for
             Nonconvex Composite Optimization},
   Year = {2019},
   Month = {February},
   Abstract = {Two new stochastic variance-reduced algorithms named SARAH
             and SPIDER have been recently proposed, and SPIDER has been
             shown to achieve a near-optimal gradient oracle complexity
             for nonconvex optimization. However, the theoretical
             advantage of SPIDER does not lead to substantial improvement
             of practical performance over SVRG. To address this issue,
             momentum technique can be a good candidate to improve the
             performance of SPIDER. However, existing momentum schemes
             used in variance-reduced algorithms are designed
             specifically for convex optimization, and are not applicable
             to nonconvex scenarios. In this paper, we develop novel
             momentum schemes with flexible coefficient settings to
             accelerate SPIDER for nonconvex and nonsmooth composite
             optimization, and show that the resulting algorithms achieve
             the near-optimal gradient oracle complexity for achieving a
             generalized first-order stationary condition. Furthermore,
             we generalize our algorithm to online nonconvex and
             nonsmooth optimization, and establish an oracle complexity
             result that matches the state-of-the-art. Our extensive
             experiments demonstrate the superior performance of our
             proposed algorithm over other stochastic variance-reduced
             algorithms.},
   Key = {fds361404}
}

@article{fds349561,
   Author = {Zhou, Y and Yang, J and Zhang, H and Liang, Y and Tarokh,
             V},
   Title = {SGD converges to global minimum in deep learning via
             star-convex path},
   Journal = {7th International Conference on Learning Representations,
             Iclr 2019},
   Year = {2019},
   Month = {January},
   Abstract = {Stochastic gradient descent (SGD) has been found to be
             surprisingly effective in training a variety of deep neural
             networks. However, there is still a lack of understanding on
             how and why SGD can train these complex networks towards a
             global minimum. In this study, we establish the convergence
             of SGD to a global minimum for nonconvex optimization
             problems that are commonly encountered in neural network
             training. Our argument exploits the following two important
             properties: 1) the training loss can achieve zero value
             (approximately), which has been widely observed in deep
             learning; 2) SGD follows a star-convex path, which is
             verified by various experiments in this paper. In such a
             context, our analysis shows that SGD, although has long been
             considered as a randomized algorithm, converges in an
             intrinsically deterministic manner to a global
             minimum.},
   Key = {fds349561}
}

@article{fds345909,
   Author = {Zhou, Y and Yang, J and Zhang, H and Liang, Y and Tarokh,
             V},
   Title = {SGD converges to global minimum in deep learning via
             star-convex path},
   Journal = {7th International Conference on Learning Representations,
             Iclr 2019},
   Year = {2019},
   Month = {January},
   Abstract = {© 7th International Conference on Learning Representations,
             ICLR 2019. All Rights Reserved. Stochastic gradient descent
             (SGD) has been found to be surprisingly effective in
             training a variety of deep neural networks. However, there
             is still a lack of understanding on how and why SGD can
             train these complex networks towards a global minimum. In
             this study, we establish the convergence of SGD to a global
             minimum for nonconvex optimization problems that are
             commonly encountered in neural network training. Our
             argument exploits the following two important properties: 1)
             the training loss can achieve zero value (approximately),
             which has been widely observed in deep learning; 2) SGD
             follows a star-convex path, which is verified by various
             experiments in this paper. In such a context, our analysis
             shows that SGD, although has long been considered as a
             randomized algorithm, converges in an intrinsically
             deterministic manner to a global minimum.},
   Key = {fds345909}
}

@article{fds347667,
   Author = {Wang, Z and Ji, K and Zhou, Y and Liang, Y and Tarokh,
             V},
   Title = {Spiderboost and momentum: Faster stochastic variance
             reduction algorithms},
   Journal = {Advances in Neural Information Processing
             Systems},
   Volume = {32},
   Year = {2019},
   Month = {January},
   Abstract = {SARAH and SPIDER are two recently developed stochastic
             variance-reduced algorithms, and SPIDER has been shown to
             achieve a near-optimal first-order oracle complexity in
             smooth nonconvex optimization. However, SPIDER uses an
             accuracy-dependent stepsize that slows down the convergence
             in practice, and cannot handle objective functions that
             involve nonsmooth regularizers. In this paper, we propose
             SpiderBoost as an improved scheme, which allows to use a
             much larger constant-level stepsize while maintaining the
             same near-optimal oracle complexity, and can be extended
             with proximal mapping to handle composite optimization
             (which is nonsmooth and nonconvex) with provable convergence
             guarantee. In particular, we show that proximal SpiderBoost
             achieves an oracle complexity of O(Equation Presented) in
             composite nonconvex optimization, improving the
             state-of-the-art result by a factor of O(Equation
             Presented). We further develop a novel momentum scheme to
             accelerate SpiderBoost for composite optimization, which
             achieves the near-optimal oracle complexity in theory and
             substantial improvement in experiments.},
   Key = {fds347667}
}

@article{fds366450,
   Author = {Ding, J and Calderbank, R and Tarokh, V},
   Title = {Gradient information for representation and
             modeling},
   Journal = {Advances in Neural Information Processing
             Systems},
   Volume = {32},
   Year = {2019},
   Month = {January},
   Abstract = {Motivated by Fisher divergence, in this paper we present a
             new set of information quantities which we refer to as
             gradient information. These measures serve as surrogates for
             classical information measures such as those based on
             logarithmic loss, Kullback-Leibler divergence, directed
             Shannon information, etc. in many data-processing scenarios
             of interest, and often provide significant computational
             advantage, improved stability, and robustness. As an
             example, we apply these measures to the Chow-Liu tree
             algorithm, and demonstrate remarkable performance and
             significant computational reduction using both synthetic and
             real data.},
   Key = {fds366450}
}

@article{fds348862,
   Author = {Diao, E and Ding, J and Tarokh, V},
   Title = {Restricted Recurrent Neural Networks.},
   Journal = {Ieee Bigdata},
   Pages = {56-63},
   Publisher = {IEEE},
   Editor = {Baru, C and Huan, J and Khan, L and Hu, X and Ak, R and Tian, Y and Barga, RS and Zaniolo, C and Lee, K and Ye, YF},
   Year = {2019},
   ISBN = {978-1-7281-0858-2},
   Key = {fds348862}
}

@article{fds366451,
   Author = {Wang, Z and Ji, K and Zhou, Y and Liang, Y and Tarokh,
             V},
   Title = {SpiderBoost and Momentum: Faster Variance Reduction
             Algorithms.},
   Journal = {Neurips},
   Pages = {2403-2413},
   Editor = {Wallach, HM and Larochelle, H and Beygelzimer, A and d'Alché-Buc, F and Fox, EB and Garnett, R},
   Year = {2019},
   Key = {fds366451}
}

@article{fds339856,
   Author = {Ding, J and Tarokh, V and Yang, Y},
   Title = {Model Selection Techniques: An Overview},
   Journal = {Ieee Signal Processing Magazine},
   Volume = {35},
   Number = {6},
   Pages = {16-34},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {November},
   url = {http://dx.doi.org/10.1109/MSP.2018.2867638},
   Abstract = {In the era of big data, analysts usually explore various
             statistical models or machine-learning methods for observed
             data to facilitate scientific discoveries or gain predictive
             power. Whatever data and fitting procedures are employed, a
             crucial step is to select the most appropriate model or
             method from a set of candidates. Model selection is a key
             ingredient in data analysis for reliable and reproducible
             statistical inference or prediction, and thus it is central
             to scientific studies in such fields as ecology, economics,
             engineering, finance, political science, biology, and
             epidemiology. There has been a long history of model
             selection techniques that arise from researches in
             statistics, information theory, and signal processing. A
             considerable number of methods has been proposed, following
             different philosophies and exhibiting varying performances.
             The purpose of this article is to provide a comprehensive
             overview of them, in terms of their motivation, large sample
             performance, and applicability. We provide integrated and
             practically relevant discussions on theoretical properties
             of state-of-the-art model selection approaches. We also
             share our thoughts on some controversial views on the
             practice of model selection.},
   Doi = {10.1109/MSP.2018.2867638},
   Key = {fds339856}
}

@article{fds338599,
   Author = {Ding, J and Diao, E and Zhou, J and Tarokh, V},
   Title = {A Penalized Method for the Predictive Limit of
             Learning},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {2018-April},
   Pages = {4414-4418},
   Publisher = {IEEE},
   Year = {2018},
   Month = {September},
   ISBN = {9781538646588},
   url = {http://dx.doi.org/10.1109/ICASSP.2018.8461832},
   Abstract = {Machine learning systems learn from and make predictions by
             building models from observed data. Because large models
             tend to overfit while small models tend to underfit for a
             given fixed dataset, a critical challenge is to select an
             appropriate model (e.g. set of variables/features). Model
             selection aims to strike a balance between the goodness of
             fit and model complexity, and thus to gain reliable
             predictive power. In this paper, we study a penalized model
             selection technique that asymptotically achieves the optimal
             expected prediction loss (referred to as the limit of
             learning) offered by a set of candidate models. We prove
             that the proposed procedure is both statistically efficient
             in the sense that it asymptotically approaches the limit of
             learning, and computationally efficient in the sense that it
             can be much faster than cross validation methods. Our theory
             applies for a wide variety of model classes, loss functions,
             and high dimensions (in the sense that the models'
             complexity can grow with data size). We released a python
             package with our proposed method for general usage like
             logistic regression and neural networks.},
   Doi = {10.1109/ICASSP.2018.8461832},
   Key = {fds338599}
}

@article{fds339263,
   Author = {Banerjee, T and Choi, J and Pesaran, B and Ba, D and Tarokh,
             V},
   Title = {Wavelet Shrinkage and Thresholding Based Robust
             Classification for Brain-Computer Interface},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {2018-April},
   Pages = {836-840},
   Publisher = {IEEE},
   Year = {2018},
   Month = {September},
   url = {http://dx.doi.org/10.1109/ICASSP.2018.8462321},
   Abstract = {A macaque monkey is trained to perform two different kinds
             of tasks, memory aided and visually aided. In each task, the
             monkey saccades to eight possible target locations. A
             classifier is proposed for direction decoding and task
             decoding based on local field potentials (LFP) collected
             from the prefrontal cortex. The LFP time-series data is
             modeled in a nonparametric regression framework, as a
             function corrupted by Gaussian noise. It is shown that if
             the function belongs to Besov bodies, then the proposed
             wavelet shrinkage and thresholding based classifier is
             robust and consistent. The classifier is then applied to the
             LFP data to achieve high decoding performance. The proposed
             classifier is also quite general and can be applied for the
             classification of other types of time-series data as well,
             not necessarily brain data.},
   Doi = {10.1109/ICASSP.2018.8462321},
   Key = {fds339263}
}

@article{fds339264,
   Author = {Xiang, Y and Ding, J and Tarokh, V},
   Title = {Evolutionary Spectra Based on the Multitaper Method with
             Application to Stationarity Test},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {2018-April},
   Pages = {3994-3998},
   Publisher = {IEEE},
   Year = {2018},
   Month = {September},
   url = {http://dx.doi.org/10.1109/ICASSP.2018.8461443},
   Abstract = {In this work, we propose a new inference procedure for
             understanding non-stationary processes, under the framework
             of evolutionary spectra developed by Priestley. Among
             various frameworks of modeling non-stationary processes, the
             distinguishing feature of the evolutionary spectra is its
             focus on the physical meaning of frequency. The classical
             estimate of the evolutionary spectral density is based on a
             double-window technique consisting of a short-Fourier
             transform and a smoothing. However, smoothing is known to
             suffer from the so-called bias leakage problem. By
             incorporating Thomson's multitaper method that was
             originally designed for stationary processes, we propose an
             improved estimate of the evolutionary spectral density, and
             analyze its bias/variance/resolution tradeoff. As an
             application of the new estimate, we further propose a
             non-parametric rank-based stationarity test, and provide
             various experimental studies.},
   Doi = {10.1109/ICASSP.2018.8461443},
   Key = {fds339264}
}

@article{fds338434,
   Author = {Banerjee, T and Whipps, G and Gurram, P and Tarokh,
             V},
   Title = {Sequential Event Detection Using Multimodal Data in
             Nonstationary Environments},
   Journal = {2018 21st International Conference on Information Fusion,
             Fusion 2018},
   Pages = {1940-1947},
   Publisher = {IEEE},
   Year = {2018},
   Month = {September},
   url = {http://dx.doi.org/10.23919/ICIF.2018.8455835},
   Abstract = {The problem of sequential detection of anomalies in
             multimodal data is considered. The objective is to observe
             physical sensor data from CCTV cameras, and social media
             data from Twitter and Instagram to detect anomalous
             behaviors or events. Data from each modality is transformed
             to discrete time count data by using an artificial neural
             network to obtain counts of objects in CCTV images and by
             counting the number of tweets or Instagram posts in a
             geographical area. The anomaly detection problem is then
             formulated as a problem of quickest detection of changes in
             count statistics. The quickest detection problem is then
             solved using the framework of partially observable Markov
             decision processes (POMDP), and structural results on the
             optimal policy are obtained. The resulting optimal policy is
             then applied to real multimodal data collected from New York
             City around a 5K race to detect the race. The count data
             both before and after the change is found to be
             nonstationary in nature. The proposed mathematical approach
             to this problem provides a framework for event detection in
             such nonstationary environments and across multiple data
             modalities.},
   Doi = {10.23919/ICIF.2018.8455835},
   Key = {fds338434}
}

@article{fds361726,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Asymptotically Pseudo-Independent Matrices},
   Year = {2018},
   Month = {September},
   Abstract = {We show that the family of pseudo-random matrices recently
             discovered by Soloveychik, Xiang, and Tarokh in their work
             `Symmetric Pseudo-Random Matrices' exhibits asymptotic
             independence. More specifically, any two sequences of
             matrices of matching sizes from that construction generated
             using sequences of different non-reciprocal primitive
             polynomials are asymptotically independent.},
   Key = {fds361726}
}

@article{fds336659,
   Author = {Shahrampour, S and Noshad, M and Ding, J and Tarokh,
             V},
   Title = {Online Learning for Multimodal Data Fusion with Application
             to Object Recognition},
   Journal = {Ieee Transactions on Circuits and Systems Ii: Express
             Briefs},
   Volume = {65},
   Number = {9},
   Pages = {1259-1263},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {September},
   url = {http://dx.doi.org/10.1109/TCSII.2017.2754141},
   Abstract = {We consider online multimodal data fusion, where the goal is
             to combine information from multiple modes to identify an
             element in a large dictionary. We address this problem in
             the context of object recognition by focusing on tactile
             sensing as one of the modes. Using a tactile glove with
             seven sensors, various individuals grasp different objects
             to obtain 7-D time series, where each component represents
             the pressure sequence applied to one sensor. The pressure
             data of all objects is stored in a dictionary as a
             reference. The objective is to match a streaming vector time
             series from grasping an unknown object to a dictionary
             object. We propose an algorithm that may start with prior
             knowledge provided by other modes. Receiving pressure data
             sequentially, the algorithm uses a dissimilarity metric to
             modify the prior and form a probability distribution over
             the dictionary. When the dictionary objects are dissimilar
             in shape, we empirically show that our algorithm recognize
             the unknown object even with a uniform prior. If there
             exists a similar object to the unknown object in the
             dictionary, our algorithm needs the prior from other modes
             to detect the unknown object. Notably, our algorithm
             maintains a similar performance to standard offline
             classification techniques, such as support vector machine,
             with a significantly lower computational
             time.},
   Doi = {10.1109/TCSII.2017.2754141},
   Key = {fds336659}
}

@article{fds338435,
   Author = {Banerjee, T and Choi, J and Pesaran, B and Ba, D and Tarokh,
             V},
   Title = {Classification of Local Field Potentials using Gaussian
             Sequence Model},
   Journal = {2018 Ieee Statistical Signal Processing Workshop, Ssp
             2018},
   Pages = {218-222},
   Publisher = {IEEE},
   Year = {2018},
   Month = {August},
   url = {http://dx.doi.org/10.1109/SSP.2018.8450778},
   Abstract = {A problem of classification of local field potentials
             (LFPs), recorded from the prefrontal cortex of a macaque
             monkey, is considered. An adult macaque monkey is trained to
             perform a memory based saccade. The objective is to decode
             the eye movement goals from the LFP collected during a
             memory period. The LFP classification problem is modeled as
             that of classification of smooth functions embedded in
             Gaussian noise. It is then argued that using minimax
             function estimators as features would lead to consistent LFP
             classifiers. The theory of Gaussian sequence models allows
             us to represent minimax estimators as finite dimensional
             objects. The LFP classifier resulting from this mathematical
             endeavor is a spectrum based technique, where Fourier series
             coefficients of the LFP data, followed by appropriate
             shrinkage and thresholding, are used as features in a linear
             discriminant classifier. The classifier is then applied to
             the LFP data to achieve high decoding accuracy. The function
             classification approach taken in the paper also provides a
             systematic justification for using Fourier series, with
             shrinkage and thresholding, as features for the problem, as
             opposed to using the power spectrum. It also suggests that
             phase information is crucial to the decision
             making.},
   Doi = {10.1109/SSP.2018.8450778},
   Key = {fds338435}
}

@article{fds336646,
   Author = {Magnusson, S and Enyioha, C and Li, N and Fischione, C and Tarokh,
             V},
   Title = {Communication Complexity of Dual Decomposition Methods for
             Distributed Resource Allocation Optimization},
   Journal = {Ieee Journal of Selected Topics in Signal
             Processing},
   Volume = {12},
   Number = {4},
   Pages = {717-732},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {August},
   url = {http://dx.doi.org/10.1109/JSTSP.2018.2848718},
   Abstract = {Dual decomposition methods are among the most prominent
             approaches for finding primal/dual saddle point solutions of
             resource allocation optimization problems. To deploy these
             methods in the emerging Internet of things networks, which
             will often have limited data rates, it is important to
             understand the communication overhead they require.
             Motivated by this, we introduce and explore two measures of
             communication complexity of dual decomposition methods to
             identify the most efficient communication among these
             algorithms. The first measure is ϵ-complexity, which
             quantifies the minimal number of bits needed to find an
             ϵ-accurate solution. The second measure is b-complexity,
             which quantifies the best possible solution accuracy that
             can be achieved from communicating b bits. We find the exact
             ϵ-and b-complexity of a class of resource allocation
             problems where a single supplier allocates resources to
             multiple users. For both the primal and dual problems, the
             ϵ-complexity grows proportionally to 2(1ϵ) and the
             b-complexity proportionally to 1/2b. We also introduce a
             variant of the ϵ-and b-complexity measures where only
             algorithms that ensure primal feasibility of the iterates
             are allowed. Such algorithms are often desirable because
             overuse of the resources can overload the respective
             systems, e.g., by causing blackouts in power systems. We
             provide upper and lower bounds on the convergence rate of
             these primal feasible complexity measures. In particular, we
             show that the b-complexity cannot converge at a faster rate
             than O(1/b). Therefore, the results demonstrate a tradeoff
             between fast convergence and primal feasibility. We
             illustrate the result by numerical studies.},
   Doi = {10.1109/JSTSP.2018.2848718},
   Key = {fds336646}
}

@article{fds341924,
   Author = {Shahrampour, S and Beirami, A and Tarokh, V},
   Title = {Supervised Learning Using Data-dependent Random Features
             with Application to Seizure Detection},
   Journal = {Proceedings of the Ieee Conference on Decision and
             Control},
   Volume = {2018-December},
   Pages = {1168-1173},
   Year = {2018},
   Month = {July},
   ISBN = {9781538613955},
   url = {http://dx.doi.org/10.1109/CDC.2018.8619558},
   Abstract = {The randomized-feature technique has been successfully
             applied to large-scale supervised learning. Despite being
             significantly more efficient compared to kernel methods in
             terms of computational cost, random features can be improved
             from generalization (prediction accuracy) viewpoint.
             Recently, it has been shown that such improvement can be
             achieved using data-dependent randomization. We recently
             proposed an algorithm based on a data-dependent score
             function that explores the set of possible random features
             and exploits the promising regions. The method has shown
             promising empirical success (on various datasets) in terms
             of generalization error compared to the state-of-the-art in
             random features. Restricting our attention to cosine feature
             maps, in this work, we provide exact theoretical constraints
             under which the score function converges to the spectrum of
             the best model in the learning class. We further present
             another application of the method in Epileptic Seizure
             Recognition.},
   Doi = {10.1109/CDC.2018.8619558},
   Key = {fds341924}
}

@article{fds339987,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Stationary Geometric Graphical Model Selection},
   Volume = {abs/1806.03571},
   Year = {2018},
   Month = {June},
   Abstract = {We consider the problem of model selection in Gaussian
             Markov fields in the sample deficient scenario. In many
             practically important cases, the underlying networks are
             embedded into Euclidean spaces. Using the natural geometric
             structure, we introduce the notion of spatially stationary
             distributions over geometric graphs. This directly
             generalizes the notion of stationary time series to the
             multidimensional setting lacking time axis. We show that the
             idea of spatial stationarity leads to a dramatic decrease in
             the sample complexity of the model selection compared to
             abstract graphs with the same level of sparsity. For
             geometric graphs on randomly spread vertices and edges of
             bounded length, we develop tight information-theoretic
             bounds on sample complexity and show that a finite number of
             independent samples is sufficient for a consistent recovery.
             Finally, we develop an efficient technique capable of
             reliably and consistently reconstructing graphs with a
             bounded number of measurements.},
   Key = {fds339987}
}

@article{fds336637,
   Author = {Ding, J and Shahrampour, S and Heal, K and Tarokh,
             V},
   Title = {Analysis of Multistate Autoregressive Models},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {66},
   Number = {9},
   Pages = {2429-2440},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {May},
   url = {http://dx.doi.org/10.1109/TSP.2018.2811757},
   Abstract = {In this paper, we consider the inference problem for a wide
             class of time-series models, referred to as multistate
             autoregressive models. The time series that we consider are
             composed of multiple epochs, each modeled by an
             autoregressive process. The number of epochs is unknown, and
             the transitions of states follow a Markov process of an
             unknown order. We propose an inference strategy that enables
             reliable and efficient offline analysis of this class of
             time series. The inference is carried out through a
             three-step approach: detecting the structural changes of the
             time series using a recently proposed multiwindow algorithm,
             identifying each segment as a state and selecting the most
             appropriate number of states, and estimating the Markov
             source based upon the symbolic sequence obtained from
             previous steps. We provide theoretical results and
             algorithms in order to facilitate the inference procedure
             described above. We demonstrate the accuracy, efficiency,
             and wide applicability of the proposed algorithms via an
             array of experiments using synthetic and real-world
             data.},
   Doi = {10.1109/TSP.2018.2811757},
   Key = {fds336637}
}

@article{fds336660,
   Author = {Magnusson, S and Enyioha, C and Li, N and Fischione, C and Tarokh,
             V},
   Title = {Convergence of Limited Communication Gradient
             Methods},
   Journal = {Ieee Transactions on Automatic Control},
   Volume = {63},
   Number = {5},
   Pages = {1356-1371},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {May},
   url = {http://dx.doi.org/10.1109/TAC.2017.2743678},
   Abstract = {Distributed optimization increasingly plays a central role
             in economical and sustainable operation of cyber-physical
             systems. Nevertheless, the complete potential of the
             technology has not yet been fully exploited in practice due
             to communication limitations posed by the real-world
             infrastructures. This work investigates fundamental
             properties of distributed optimization based on gradient
             methods, where gradient information is communicated using a
             limited number of bits. In particular, a general class of
             quantized gradient methods are studied, where the gradient
             direction is approximated by a finite quantization set.
             Sufficient and necessary conditions are provided on such a
             quantization set to guarantee that the methods minimize any
             convex objective function with Lipschitz continuous gradient
             and a nonempty and bounded set of optimizers. A lower bound
             on the cardinality of the quantization set is provided,
             along with specific examples of minimal quantizations.
             Convergence rate results are established that connect the
             fineness of the quantization and the number of iterations
             needed to reach a predefined solution accuracy.
             Generalizations of the results to a relevant class of
             constrained problems using projections are considered.
             Finally, the results are illustrated by simulations of
             practical systems.},
   Doi = {10.1109/TAC.2017.2743678},
   Key = {fds336660}
}

@article{fds336638,
   Author = {Soloveychik, I and Xiang, Y and Tarokh, V},
   Title = {Pseudo-Wigner Matrices},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {64},
   Number = {4},
   Pages = {3170-3178},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TIT.2017.2777464},
   Abstract = {We consider the problem of generating pseudo-random matrices
             based on the similarity of their spectra to Wigner's
             semicircular law. We introduce the notion of an r
             -independent pseudo-Wigner matrix ensemble and prove the
             closeness of the spectra of its matrices to the semicircular
             density in the Kolmogorov distance. We give an explicit
             construction of a family of N × N pseudo-Wigner ensembles
             using dual BCH codes and show that the Kolmogorov complexity
             of the obtained matrices is of the order of log(N) bits for
             a fixed designed Kolmogorov distance precision. We compare
             our construction with the quasi-random graphs introduced by
             Chung et al. and demonstrate that the pseudo-Wigner matrices
             pass stronger randomness tests than the adjacency matrices
             of these graphs (lifted by the mapping 0 → 1 and 1 → -1
             ) do. Finally, we provide numerical simulations verifying
             our theoretical results.},
   Doi = {10.1109/TIT.2017.2777464},
   Key = {fds336638}
}

@article{fds336639,
   Author = {Soloveychik, I and Xiang, Y and Tarokh, V},
   Title = {Symmetric Pseudo-Random Matrices},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {64},
   Number = {4},
   Pages = {3179-3196},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TIT.2018.2800004},
   Abstract = {We consider the problem of generating symmetric
             pseudo-random sign (±1) matrices based on the similarity of
             their spectra to Wigner's semicircular law. Using binary
             m-sequences (Golomb sequences) of lengths n=2m-1 , we give a
             simple explicit construction of circulant n × n sign
             matrices and show that their spectra converge to the
             semicircular law when n grows. The Kolmogorov complexity of
             the proposed matrices equals to that of Golomb sequences and
             is at most 2log2(n) bits.},
   Doi = {10.1109/TIT.2018.2800004},
   Key = {fds336639}
}

@article{fds336640,
   Author = {Ding, J and Zhou, J and Tarokh, V},
   Title = {Optimal prediction of data with unknown abrupt change
             points},
   Journal = {2017 Ieee Global Conference on Signal and Information
             Processing, Globalsip 2017 Proceedings},
   Volume = {2018-January},
   Pages = {928-932},
   Publisher = {IEEE},
   Year = {2018},
   Month = {March},
   ISBN = {9781509059904},
   url = {http://dx.doi.org/10.1109/GlobalSIP.2017.8309096},
   Abstract = {We develop a novel methodology for predicting time series
             under unknown abrupt changes in data generating
             distributions. Based on Kolmogorov and Tikhomirov's e
             entropy, we propose a concept called e-predictability that
             quantifies the size of a model class and the maximal number
             of structural changes that allows the achievability of
             asymptotic optimal prediction. To predict under abrupt
             changes, our basic idea is to apply ϵ-net to discretize a
             nonparametric or parametric model class with an
             appropriately chosen e, and then apply a kinetic model
             averaging over the quantizers. Under reasonable assumptions,
             we prove that the average predictive performance is
             asymptotically as good as the oracle, i.e. when all the data
             generating distributions are known in advance. We show that
             the assumptions hold for a rather wide class of time
             variations. The results also address some puzzles related to
             the 'prediction-inference dilemma' in the context of change
             point analysis.},
   Doi = {10.1109/GlobalSIP.2017.8309096},
   Key = {fds336640}
}

@article{fds336641,
   Author = {DIng, J and Xiang, Y and Shen, L and Tarokh, V},
   Title = {Detecting structural changes in dependent
             data},
   Journal = {2017 Ieee Global Conference on Signal and Information
             Processing, Globalsip 2017 Proceedings},
   Volume = {2018-January},
   Pages = {750-754},
   Publisher = {IEEE},
   Year = {2018},
   Month = {March},
   ISBN = {9781509059904},
   url = {http://dx.doi.org/10.1109/GlobalSIP.2017.8309060},
   Abstract = {In the era of big data, a frequently encountered task is to
             model and identify structural changes in the data generating
             process. It is quite challenging especially when data are
             dependent and massive, requiring computationally efficient
             analysis. To address the challenge, we model the data
             generating process as a segment-wise autoregression, and
             propose a multi-window method that is both effective and
             efficient for discovering the structural changes. The
             proposed approach was motivated by transforming a
             segment-wise autoregression into a multivariate time series
             that is asymptotically segment-wise independent and
             identically distributed. We then derive theoretical
             guarantees for (almost surely) selecting the true number of
             change points of segment-wise independent multivariate time
             series. In particular, we prove that a wide variety of
             penalized selection procedure produces a strongly consistent
             selection of the optimal number of change points, under mild
             assumptions. We demonstrate the theory and strength of the
             proposed algorithms by experiments on both synthetic and
             real-world data.},
   Doi = {10.1109/GlobalSIP.2017.8309060},
   Key = {fds336641}
}

@article{fds336642,
   Author = {Han, Q and Ding, J and Airoldi, E and Tarokh, V},
   Title = {Modeling nonlinearity in multi-dimensional dependent
             data},
   Journal = {2017 Ieee Global Conference on Signal and Information
             Processing, Globalsip 2017 Proceedings},
   Volume = {2018-January},
   Pages = {206-210},
   Publisher = {IEEE},
   Year = {2018},
   Month = {March},
   ISBN = {9781509059904},
   url = {http://dx.doi.org/10.1109/GlobalSIP.2017.8308633},
   Abstract = {Given massive data that may be time dependent and
             multi-dimensional, how to efficiently explore the underlying
             functional relationships across different dimensions and
             time lags? In this work, we propose a methodology to
             sequentially and adaptively model nonlinear multivariate
             time series data. Data at each time step and dimension is
             modeled as a nonlinear function of past values corrupted by
             noise, and the underlying nonlinear function is assumed to
             be approximately expandable in a spline basis. We cast the
             modeling of data as finding a good fit representation in the
             linear span of multi-dimensional spline basis, and use a
             variant of h-penalty regularization in order to reduce the
             dimensionality of representation. Using adaptive filtering
             techniques, we design our online algorithm to automatically
             tune the underlying parameters based on the minimization of
             the regularized sequential prediction error. We demonstrate
             the generality and flexibility of the proposed approach on
             both synthetic and real-world datasets. Moreover, we
             analytically investigate the performance of our algorithm by
             obtaining bounds of the prediction errors.},
   Doi = {10.1109/GlobalSIP.2017.8308633},
   Key = {fds336642}
}

@article{fds361405,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Region Detection in Markov Random Fields: Gaussian
             Case},
   Year = {2018},
   Month = {February},
   Abstract = {We consider the problem of model selection in Gaussian
             Markov fields in the sample deficient scenario. The
             benchmark information-theoretic results in the case of
             d-regular graphs require the number of samples to be at
             least proportional to the logarithm of the number of
             vertices to allow consistent graph recovery. When the number
             of samples is less than this amount, reliable detection of
             all edges is impossible. In many applications, it is more
             important to learn the distribution of the edge (coupling)
             parameters over the network than the specific locations of
             the edges. Assuming that the entire graph can be partitioned
             into a number of spatial regions with similar edge
             parameters and reasonably regular boundaries, we develop new
             information-theoretic sample complexity bounds and show that
             a bounded number of samples can be sufficient to
             consistently recover these regions. Finally, we introduce
             and analyze an efficient region growing algorithm capable of
             recovering the regions with high accuracy. We show that it
             is consistent and demonstrate its performance benefits in
             synthetic simulations.},
   Key = {fds361405}
}

@article{fds361406,
   Author = {Soloveychik, I and Tarokh, V},
   Title = {Large Deviations of Convex Polyominoes},
   Year = {2018},
   Month = {February},
   Abstract = {Enumeration of various types of lattice polygons and in
             particular polyominoes is of primary importance in many
             machine learning, pattern recognition, and geometric
             analysis problems. In this work, we develop a large
             deviation principle for convex polyominoes under different
             restrictions, such as fixed area and/or perimeter.},
   Key = {fds361406}
}

@article{fds336643,
   Author = {Soloveychik, I and Xiang, Y and Tarokh, V},
   Title = {Explicit symmetric pseudo-random matrices},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Volume = {2018-January},
   Pages = {424-428},
   Publisher = {IEEE},
   Year = {2018},
   Month = {January},
   ISBN = {9781509030972},
   url = {http://dx.doi.org/10.1109/ITW.2017.8277999},
   Abstract = {We consider the problem of generating symmetric
             pseudo-random sign (±1) matrices based on the similarity of
             their spectra to Wigner's semicircular law. Using binary
             m-sequences (Golomb sequences) of lengths n = 2m - 1, we
             give a simple explicit construction of circulant n × n sign
             matrices and show that their spectra converge to the
             semicircular law when n grows. The Kolmogorov complexity of
             the proposed matrices equals to that of Golomb sequences and
             is at most 2log2(n) bits.},
   Doi = {10.1109/ITW.2017.8277999},
   Key = {fds336643}
}

@article{fds342381,
   Author = {Shahrampour, S and Tarokh, V},
   Title = {Learning bounds for greedy approximation with explicit
             feature maps from multiple kernels},
   Journal = {Advances in Neural Information Processing
             Systems},
   Volume = {2018-December},
   Pages = {4690-4701},
   Publisher = {NEURAL INFORMATION PROCESSING SYSTEMS (NIPS)},
   Editor = {Bengio, S and Wallach, H and Larochelle, H and Grauman, K and CesaBianchi, N and Garnett, R},
   Year = {2018},
   Month = {January},
   Abstract = {Nonlinear kernels can be approximated using
             finite-dimensional feature maps for efficient risk
             minimization. Due to the inherent trade-off between the
             dimension of the (mapped) feature space and the
             approximation accuracy, the key problem is to identify
             promising (explicit) features leading to a satisfactory
             out-of-sample performance. In this work, we tackle this
             problem by efficiently choosing such features from multiple
             kernels in a greedy fashion. Our method sequentially selects
             these explicit features from a set of candidate features
             using a correlation metric. We establish an out-of-sample
             error bound capturing the trade-off between the error in
             terms of explicit features (approximation error) and the
             error due to spectral properties of the best model in the
             Hilbert space associated to the combined kernel (spectral
             error). The result verifies that when the (best) underlying
             data model is sparse enough, i.e., the spectral error is
             negligible, one can control the test error with a small
             number of explicit features, that can scale
             poly-logarithmically with data. Our empirical results show
             that given a fixed number of explicit features, the method
             can achieve a lower test error with a smaller time cost,
             compared to the state-of-the-art in data-dependent random
             features.},
   Key = {fds342381}
}

@article{fds336662,
   Author = {Enyioha, C and Magnússon, S and Heal, K and Li, N and Fischione, C and Tarokh, V},
   Title = {On variability of renewable energy and online power
             allocation},
   Journal = {Ieee Transactions on Power Systems},
   Volume = {33},
   Number = {1},
   Pages = {451-462},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2018},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TPWRS.2017.2709544},
   Abstract = {As electric power system operators shift from conventional
             energy to renewable energy sources, power distribution
             systems will experience increasing fluctuations in supply.
             These fluctuations present the need to not only design
             online decentralized power allocation algorithms, but also
             characterize how effective they are given fast-changing
             consumer demand and generation. In this paper, we present an
             online decentralized dual descent (OD3) power allocation
             algorithm and determine (in the worst case) how much of
             observed social welfare can be explained by fluctuations in
             generation capacity and consumer demand. Convergence
             properties and performance guarantees of the OD3 algorithm
             are analyzed by characterizing the difference between the
             online decision and the optimal decision. We demonstrate
             validity and accuracy of the theoretical results in the
             paper through numerical experiments using real power
             generation data.},
   Doi = {10.1109/TPWRS.2017.2709544},
   Key = {fds336662}
}

@article{fds339996,
   Author = {Shahrampour, S and Beirami, A and Tarokh, V},
   Title = {On data-dependent random features for improved
             generalization in supervised learning},
   Journal = {32nd Aaai Conference on Artificial Intelligence, Aaai
             2018},
   Volume = {abs/1712.07102},
   Pages = {4026-4033},
   Year = {2018},
   Month = {January},
   Abstract = {The randomized-feature approach has been successfully
             employed in large-scale kernel approximation and supervised
             learning. The distribution from which the random features
             are drawn impacts the number of features required to
             efficiently perform a learning task. Recently, it has been
             shown that employing data-dependent randomization improves
             the performance in terms of the required number of random
             features. In this paper, we are concerned with the
             randomized-feature approach in supervised learning for good
             generalizability. We propose the Energy-based Exploration of
             Random Features (EERF) algorithm based on a data-dependent
             score function that explores the set of possible features
             and exploits the promising regions. We prove that the
             proposed score function with high probability recovers the
             spectrum of the best fit within the model class. Our
             empirical results on several benchmark datasets further
             verify that our method requires smaller number of random
             features to achieve a certain generalization error compared
             to the state-of-the-art while introducing negligible
             pre-processing overhead. EERF can be implemented in a few
             lines of code and requires no additional tuning
             parameters.},
   Key = {fds339996}
}

@article{fds339991,
   Author = {Banerjee, T and Choi, J and Pesaran, B and Ba, D and Tarokh,
             V},
   Title = {CLASSIFICATION OF LOCAL FIELD POTENTIALS USING GAUSSIAN
             SEQUENCE MODEL},
   Journal = {2018 Ieee Statistical Signal Processing Workshop
             (Ssp)},
   Pages = {683-687},
   Publisher = {IEEE},
   Year = {2018},
   ISBN = {978-1-5386-1571-3},
   Key = {fds339991}
}

@article{fds339992,
   Author = {Banerjee, T and Whipps, GT and Gurram, P and Tarokh,
             V},
   Title = {Sequential Event Detection Using Multimodal Data in
             Nonstationary Environments.},
   Journal = {Fusion},
   Pages = {1940-1947},
   Publisher = {IEEE},
   Year = {2018},
   ISBN = {978-0-9964527-6-2},
   Key = {fds339992}
}

@article{fds339986,
   Author = {Shahrampour, S and Beirami, A and Tarokh, V},
   Title = {On Data-Dependent Random Features for Improved
             Generalization in Supervised Learning.},
   Journal = {Aaai},
   Pages = {4026-4033},
   Publisher = {AAAI Press},
   Editor = {McIlraith, SA and Weinberger, KQ},
   Year = {2018},
   Key = {fds339986}
}

@article{fds348340,
   Author = {Shahrampour, S and Tarokh, V},
   Title = {Learning Bounds for Greedy Approximation with Explicit
             Feature Maps from Multiple Kernels.},
   Journal = {Neurips},
   Pages = {4695-4706},
   Editor = {Bengio, S and Wallach, HM and Larochelle, H and Grauman, K and Cesa-Bianchi, N and Garnett, R},
   Year = {2018},
   Key = {fds348340}
}

@article{fds348341,
   Author = {Banerjee, T and Whipps, GT and Gurram, P and Tarokh,
             V},
   Title = {Cyclostationary Statistical Models and Algorithms for
             Anomaly Detection Using Multi-Modal Data.},
   Journal = {Globalsip},
   Pages = {126-130},
   Publisher = {IEEE},
   Year = {2018},
   ISBN = {978-1-7281-1295-4},
   Key = {fds348341}
}

@article{fds348342,
   Author = {Ding, J and Tarokh, V and Yang, Y},
   Title = {Model Selection Techniques - An Overview.},
   Journal = {Corr},
   Volume = {abs/1810.09583},
   Year = {2018},
   Key = {fds348342}
}

@article{fds336647,
   Author = {Han, Q and Ding, J and Airoldi, EM and Tarokh, V},
   Title = {SLANTS: Sequential Adaptive Nonlinear Modeling of Time
             Series},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {65},
   Number = {19},
   Pages = {4994-5005},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2017},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TSP.2017.2716898},
   Abstract = {We propose a method for adaptive nonlinear sequential
             modeling of time series data. Data are modeled as a
             nonlinear function of past values corrupted by noise, and
             the underlying nonlinear function is assumed to be
             approximately expandable in a spline basis. We cast the
             modeling of data as finding a good fit representation in the
             linear span of multidimensional spline basis, and use a
             variant of $l-1$-penalty regularization in order to reduce
             the dimensionality of representation. Using adaptive
             filtering techniques, we design our online algorithm to
             automatically tune the underlying parameters based on the
             minimization of the regularized sequential prediction error.
             We demonstrate the generality and flexibility of the
             proposed approach on both synthetic and real-world datasets.
             Moreover, we analytically investigate the performance of our
             algorithm by obtaining both bounds on prediction errors and
             consistency in variable selection.},
   Doi = {10.1109/TSP.2017.2716898},
   Key = {fds336647}
}

@article{fds339993,
   Author = {Boyer, R and Babadi, B and Kalouptsidis, N and Tarokh,
             V},
   Title = {Corrections to “Asymptotic Achievability of the
             Cramér–Rao Bound for Noisy Compressive Sampling” [Mar
             09 1233-1236]},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {65},
   Number = {18},
   Pages = {4973-4974},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2017},
   Month = {September},
   url = {http://dx.doi.org/10.1109/tsp.2017.2723352},
   Doi = {10.1109/tsp.2017.2723352},
   Key = {fds339993}
}

@article{fds336648,
   Author = {Ding, J and Xiang, Y and Shen, L and Tarokh, V},
   Title = {Multiple Change Point Analysis: Fast Implementation and
             Strong Consistency},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {65},
   Number = {17},
   Pages = {4495-4510},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2017},
   Month = {September},
   url = {http://dx.doi.org/10.1109/TSP.2017.2711558},
   Abstract = {One of the main challenges in identifying structural changes
             in stochastic processes is to carry out analysis for time
             series with dependency structure in a computationally
             tractable way. Another challenge is that the number of true
             change points is usually unknown, requiring a suitable model
             selection criterion to arrive at informative conclusions. To
             address the first challenge, we model the data generating
             process as a segment-wise autoregression, which is composed
             of several segments (time epochs), each of which modeled by
             an autoregressive model. We propose a multiwindow method
             that is both effective and efficient for discovering the
             structural changes. The proposed approach was motivated by
             transforming a segment-wise autoregression into a
             multivariate time series that is asymptotically segment-wise
             independent and identically distributed. To address the
             second challenge, we derive theoretical guarantees for
             (almost surely) selecting the true number of change points
             of segment-wise independent multivariate time series.
             Specifically, under mild assumptions, we show that a
             Bayesian information criterion like criterion gives a
             strongly consistent selection of the optimal number of
             change points, while an Akaike information criterion like
             criterion cannot. Finally, we demonstrate the theory and
             strength of the proposed algorithms by experiments on both
             synthetic- and real-world data, including the Eastern U.S.
             temperature data and the El Nino data. The experiment leads
             to some interesting discoveries about temporal variability
             of the summer-time temperature over the Eastern U.S., and
             about the most dominant factor of ocean influence on
             climate, which were also discovered by environmental
             scientists.},
   Doi = {10.1109/TSP.2017.2711558},
   Key = {fds336648}
}

@article{fds336649,
   Author = {Shahrampour, S and Noshad, M and Tarokh, V},
   Title = {On Sequential Elimination Algorithms for Best-Arm
             Identification in Multi-Armed Bandits},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {65},
   Number = {16},
   Pages = {4281-4292},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2017},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TSP.2017.2706192},
   Abstract = {We consider the best-arm identification problem in
             multi-armed bandits, which focuses purely on exploration. A
             player is given a fixed budget to explore a finite set of
             arms, and the rewards of each arm are drawn independently
             from a fixed, unknown distribution. The player aims to
             identify the arm with the largest expected reward. We
             propose a general framework to unify sequential elimination
             algorithms, where the arms are dismissed iteratively until a
             unique arm is left. Our analysis reveals a novel performance
             measure expressed in terms of the sampling mechanism and
             number of eliminated arms at each round. Based on this
             result, we develop an algorithm that divides the budget
             according to a nonlinear function of remaining arms at each
             round. We provide theoretical guarantees for the algorithm,
             characterizing the suitable nonlinearity for different
             problem environments described by the number of competitive
             arms. Matching the theoretical results, our experiments show
             that the nonlinear algorithm outperforms the
             state-of-the-art. We finally study the side-observation
             model, where pulling an arm reveals the rewards of its
             related arms, and we establish improved theoretical
             guarantees in the pure-exploration setting.},
   Doi = {10.1109/TSP.2017.2706192},
   Key = {fds336649}
}

@article{fds336650,
   Author = {Deng, Z and Ding, J and Heal, K and Tarokh, V},
   Title = {The number of independent sets in hexagonal
             graphs},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {2910-2914},
   Publisher = {IEEE},
   Year = {2017},
   Month = {August},
   ISBN = {9781509040964},
   url = {http://dx.doi.org/10.1109/ISIT.2017.8007062},
   Abstract = {We derive the tightest known bounds on η = 2ν, where ν is
             the growth rate of the logarithm of the number of
             independent sets on a hexagonal lattice. To obtain these
             bounds, we generalize a method proposed by Calkin and Wilf.
             Their original strategy cannot immediately be used to derive
             bounds for η, due to the difference in symmetry between
             square and hexagonal lattices, so we propose a modified
             method and an algorithm to derive rigorous bounds on η. In
             particular, we prove that 1.546440708536001 ≤ η ≤
             1.5513, which improves upon the best known bounds of 1.5463
             ≤ η ≤ 1.5527 given by Nagy and Zeger. Our lower bound
             matches the numerical estimate of Baxter up to 9 digits
             after the decimal point, and our upper bound can be further
             improved by following our method.},
   Doi = {10.1109/ISIT.2017.8007062},
   Key = {fds336650}
}

@article{fds336651,
   Author = {Soloveychik, I and Xiang, Y and Tarokh, V},
   Title = {Pseudo-wigner matrices from dual BCH codes},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {1381-1385},
   Publisher = {IEEE},
   Year = {2017},
   Month = {August},
   ISBN = {9781509040964},
   url = {http://dx.doi.org/10.1109/ISIT.2017.8006755},
   Abstract = {We consider the problem of generating symmetric
             pseudo-random sign (±1) matrices based on the similarity of
             their spectra to Wigner's semicircular law. We introduce
             r-independent pseudo-Wigner ensembles and prove closeness of
             their spectra to the semicircular density in Kolmogorov
             distance. We give an explicit construction of a family of N
             × N pseudo-Wigner ensembles using dual BCH codes and show
             that the Kolmogorov complexity of the obtained matrices is
             of the order of log (N) bits for a fixed Kolmogorov distance
             precision. Finally, we provide numerical simulations
             verifying our theoretical results.},
   Doi = {10.1109/ISIT.2017.8006755},
   Key = {fds336651}
}

@article{fds336644,
   Author = {Shahrampour, S and Tarokh, V},
   Title = {Nonlinear sequential accepts and rejects for identification
             of top arms in stochastic bandits},
   Journal = {55th Annual Allerton Conference on Communication, Control,
             and Computing, Allerton 2017},
   Volume = {2018-January},
   Pages = {228-235},
   Publisher = {IEEE},
   Year = {2017},
   Month = {July},
   url = {http://dx.doi.org/10.1109/ALLERTON.2017.8262742},
   Abstract = {We address the M-best-Arm identification problem in
             multi-Armed bandits. A player has a limited budget to
             explore K arms (M < K), and once pulled, each arm yields a
             reward drawn (independently) from a fixed, unknown
             distribution. The goal is to find the top M arms in the
             sense of expected reward. We develop an algorithm which
             proceeds in rounds to deactivate arms iteratively. At each
             round, the budget is divided by a nonlinear function of
             remaining arms, and the arms are pulled correspondingly.
             Based on a decision rule, the deactivated arm at each round
             may be accepted or rejected. The algorithm outputs the
             accepted arms that should ideally be the top M arms. We
             characterize the decay rate of the misidentification
             probability and establish that the nonlinear budget
             allocation proves to be useful for different problem
             environments (described by the number of competitive arms).
             We provide comprehensive numerical experiments showing that
             our algorithm outperforms the state-of-The-Art using
             suitable nonlinearity.},
   Doi = {10.1109/ALLERTON.2017.8262742},
   Key = {fds336644}
}

@article{fds336645,
   Author = {Soloveychik, I and Tarokh, V and Paulson, JA},
   Title = {On the spectral norms of pseudo-wigner and related
             matrices},
   Journal = {55th Annual Allerton Conference on Communication, Control,
             and Computing, Allerton 2017},
   Volume = {2018-January},
   Pages = {61-66},
   Publisher = {IEEE},
   Year = {2017},
   Month = {July},
   url = {http://dx.doi.org/10.1109/ALLERTON.2017.8262719},
   Abstract = {We investigate the spectral norms of symmetric N × N
             matrices from two pseudo-random ensembles. The first is the
             pseudo-Wigner ensemble introduced in 'Pseudo-Wigner
             Matrices' by Soloveychik, Xiang and Tarokh and the second is
             its sample covariance-Type analog defined in this work. Both
             ensembles are defined through the concept of r-independence
             by controlling the amount of randomness in the underlying
             matrices, and can be constructed from dual BCH codes. We
             show that when the measure of randomness r grows as Np,
             where p (0,1] and ϵ > 0, the norm of the matrices is almost
             surely within o(log1 + ϵN/Nmin[ρ, 2/3]) distance from 1.
             Numerical simulations verifying the obtained results are
             provided.},
   Doi = {10.1109/ALLERTON.2017.8262719},
   Key = {fds336645}
}

@article{fds336652,
   Author = {Jeong, S and Kang, J and Pahlavan, K and Tarokh, V},
   Title = {Fundamental Limits of TOA/DOA and Inertial Measurement
             Unit-Based Wireless Capsule Endoscopy Hybrid
             Localization},
   Journal = {International Journal of Wireless Information
             Networks},
   Volume = {24},
   Number = {2},
   Pages = {169-179},
   Publisher = {Springer Nature},
   Year = {2017},
   Month = {June},
   url = {http://dx.doi.org/10.1007/s10776-017-0342-7},
   Abstract = {In this paper, performance analysis of hybrid localization
             based on radio-frequency (RF) and inertial measurement unit
             (IMU) measurements for a single wireless capsule endoscopy
             (WCE) traveling the gastrointestinal tract is studied.
             Specifically, the multiple body-mounted sensors are
             considered which are located on the front and back of a
             patient’s medical jacket and form the uniform rectangular
             arrays (URAs). With the aim of locating the WCE, two types
             of RF measurements, namely time-of-arrival (TOA) and
             direction-of-arrival (DOA), are estimated from the received
             signals at the URAs transmitted by the WCE, which are
             integrated with the IMU acceleration measurements via the
             standard extended Kalman filter. Here, a posterior
             Cramér–Rao Bound (PCRB) of the proposed TOA/DOA and
             IMU-based hybrid localization is derived as fundamental
             limits on squared position error, where the accuracies of
             TOA and DOA measurements are entailed by means of CRB to
             account for their dependency on the environmental
             parameters, while the accuracies of the IMU measurements are
             addressed with the acceleration measurement error standard
             deviation. Numerical results are provided, sustained by
             simulations which verify the millimeter accuracy of the
             TOA/DOA and IMU-based hybrid localization within the
             regulation of medical implant communication services and the
             exactness of the PCRB.},
   Doi = {10.1007/s10776-017-0342-7},
   Key = {fds336652}
}

@article{fds339994,
   Author = {Farhadi, H and Xiang, Y and Jeong, S and Li, X and Guo, N and Sepulcre, J and Tarokh, V and Li, Q},
   Title = {Inferring the causality network of Abeta and Tau
             accumulation in the aging brain: a statistical inference
             approach},
   Journal = {Journal of Nuclear Medicine : Official Publication, Society
             of Nuclear Medicine},
   Volume = {58},
   Pages = {2 pages},
   Publisher = {SOC NUCLEAR MEDICINE INC},
   Year = {2017},
   Month = {May},
   Key = {fds339994}
}

@article{fds336653,
   Author = {Wei, L and Sarwate, AD and Corander, J and Hero, A and Tarokh,
             V},
   Title = {Analysis of a privacy-preserving PCA algorithm using random
             matrix theory},
   Journal = {2016 Ieee Global Conference on Signal and Information
             Processing, Globalsip 2016 Proceedings},
   Pages = {1335-1339},
   Publisher = {IEEE},
   Year = {2017},
   Month = {April},
   ISBN = {9781509045457},
   url = {http://dx.doi.org/10.1109/GlobalSIP.2016.7906058},
   Abstract = {To generate useful summarization of data while maintaining
             privacy of sensitive information is a challenging task,
             especially in the big data era. The privacy-preserving
             principal component algorithm proposed in [1] is a promising
             approach when a low rank data summarization is desired.
             However, the analysis in [1] is limited to the case of a
             single principal component, which makes use of bounds on the
             vector-valued Bingham distribution in the unit sphere. By
             exploring the non-commutative structure of data matrices in
             the full Stiefel manifold, we extend the analysis to an
             arbitrary number of principal components. Our results are
             obtained by analyzing the asymptotic behavior of the
             matrix-variate Bingham distribution using tools from random
             matrix theory.},
   Doi = {10.1109/GlobalSIP.2016.7906058},
   Key = {fds336653}
}

@article{fds336654,
   Author = {Enyioha, C and Magnússon, S and Heal, K and Li, N and Fischione, C and Tarokh, V},
   Title = {Robustness analysis for an online decentralized descent
             power allocation algorithm},
   Journal = {2016 Information Theory and Applications Workshop, Ita
             2016},
   Publisher = {IEEE},
   Year = {2017},
   Month = {March},
   ISBN = {9781509025299},
   url = {http://dx.doi.org/10.1109/ITA.2016.7888135},
   Abstract = {As independent service providers shift from conventional
             energy to renewable energy sources, the power distribution
             system will likely experience increasingly significant
             fluctuation in supply, given the uncertain and intermittent
             nature of renewable sources like wind and solar energy.
             These fluctuations in power generation, coupled with
             time-varying consumer demands of electricity and the massive
             scale of power distribution networks present the need to not
             only design real-time decentralized power allocation
             algorithms, but also characterize how effective they are
             given fast-changing consumer demands and power generation
             capacities. In this paper, we present an Online
             Decentralized Dual Descent (OD3) power allocation algorithm
             and determine (in the worst case) how much of observed
             social welfare and price volatility can be explained by
             fluctuations in generation capacity and consumer demand.
             Convergence properties and performance guarantees of the OD3
             algorithm are analyzed by characterizing the difference
             between the online decision and the optimal decision. The
             theoretical results in the paper are validated and
             illustrated by numerical experiments using real
             data.},
   Doi = {10.1109/ITA.2016.7888135},
   Key = {fds336654}
}

@article{fds336656,
   Author = {Kurien, BG and Ashcom, JB and Shah, VN and Rachlin, Y and Tarokh,
             V},
   Title = {Robust interferometric imaging via prior-less phase
             recovery: Redundant spacing calibration with
             generalized-closure phases},
   Journal = {Monthly Notices of the Royal Astronomical
             Society},
   Volume = {464},
   Number = {2},
   Pages = {2356-2376},
   Publisher = {Oxford University Press (OUP)},
   Year = {2017},
   Month = {January},
   url = {http://dx.doi.org/10.1093/mnras/stw2323},
   Abstract = {Atmospheric turbulence presents a fundamental challenge to
             Fourier phase recovery in optical interferometry. Typical
             reconstruction algorithms employ Bayesian inference
             techniques which rely on prior knowledge of the scene under
             observation. In contrast, redundant spacing calibration
             (RSC) algorithms employ redundancy in the baselines of the
             interferometric array to directly expose the contribution of
             turbulence, thereby enabling phase recovery for targets of
             arbitrary and unknown complexity. Traditionally RSC
             algorithms have been applied directly to single-exposure
             measurements, which are reliable only at high photon flux in
             general. In scenarios of low photon flux, such as those
             arising in the observation of dim objects in space, one must
             instead rely on time-averaged, atmosphere-invariant
             quantities such as the bispectrum. In this paper, we develop
             a novel RSC-based algorithm for prior-less phase recovery in
             which we generalize the bispectrum to higher order
             atmosphere-invariants (nspectra) for improved sensitivity.We
             provide a strategy for selection of a high-signal-to-noise
             ratio set of n-spectra using the graph-theoretic notion of
             the minimum cycle basis. We also discuss a key property of
             this set (wrap-invariance), which then enables reliable
             application of standard linear estimation techniques to
             recover the Fourier phases from the 2π-wrapped n-spectra
             phases. For validation, we analyse the expected
             shot-noise-limited performance of our algorithm for both
             pairwise and Fizeau interferometric architectures, and
             corroborate this analysis with simulation results showing
             performance near an atmosphere-oracle Cramer-Rao bound.
             Lastly, we apply techniques from the field of compressed
             sensing to perform image reconstruction from the estimated
             complex visibilities.},
   Doi = {10.1093/mnras/stw2323},
   Key = {fds336656}
}

@article{fds336657,
   Author = {Jeong, S and Li, X and Yang, J and Li, Q and Tarokh,
             V},
   Title = {Dictionary learning and sparse coding-based denoising for
             high-resolution task functional connectivity MRI
             analysis},
   Journal = {Lecture Notes in Computer Science (Including Subseries
             Lecture Notes in Artificial Intelligence and Lecture Notes
             in Bioinformatics)},
   Volume = {10541 LNCS},
   Pages = {45-52},
   Publisher = {Springer International Publishing},
   Year = {2017},
   Month = {January},
   ISBN = {9783319673882},
   url = {http://dx.doi.org/10.1007/978-3-319-67389-9_6},
   Abstract = {We propose a novel denoising framework for task functional
             Magnetic Resonance Imaging (tfMRI) data to delineate the
             high-resolution spatial pattern of the brain functional
             connectivity via dictionary learning and sparse coding
             (DLSC). In order to address the limitations of the
             unsupervised DLSC-based fMRI studies, we utilize the prior
             knowledge of task paradigm in the learning step to train a
             data-driven dictionary and to model the sparse
             representation. We apply the proposed DLSC-based method to
             Human Connectome Project (HCP) motor tfMRI dataset. Studies
             on the functional connectivity of cerebrocerebellar circuits
             in somatomotor networks show that the DLSC-based denoising
             framework can significantly improve the prominent
             connectivity patterns, in comparison to the temporal
             non-local means (tNLM)-based denoising method as well as the
             case without denoising, which is consistent and
             neuroscientifically meaningful within motor area. The
             promising results show that the proposed method can provide
             an important foundation for the high-resolution functional
             connectivity analysis, and provide a better approach for
             fMRI preprocessing.},
   Doi = {10.1007/978-3-319-67389-9_6},
   Key = {fds336657}
}

@article{fds336658,
   Author = {Beirami, A and Razaviyayn, M and Shahrampour, S and Tarokh,
             V},
   Title = {On optimal generalizability in parametric
             learning},
   Journal = {Advances in Neural Information Processing
             Systems},
   Volume = {2017-December},
   Pages = {3456-3466},
   Year = {2017},
   Month = {January},
   Abstract = {We consider the parametric learning problem, where the
             objective of the learner is determined by a parametric loss
             function. Employing empirical risk minimization with
             possibly regularization, the inferred parameter vector will
             be biased toward the training samples. Such bias is measured
             by the cross validation procedure in practice where the data
             set is partitioned into a training set used for training and
             a validation set, which is not used in training and is left
             to measure the outof-sample performance. A classical cross
             validation strategy is the leave-one-out cross validation
             (LOOCV) where one sample is left out for validation and
             training is done on the rest of the samples that are
             presented to the learner, and this process is repeated on
             all of the samples. LOOCV is rarely used in practice due to
             the high computational complexity. In this paper, we first
             develop a computationally efficient approximate LOOCV
             (ALOOCV) and provide theoretical guarantees for its
             performance. Then we use ALOOCV to provide an optimization
             algorithm for finding the regularizer in the empirical risk
             minimization framework. In our numerical experiments, we
             illustrate the accuracy and efficiency of ALOOCV as well as
             our proposed framework for the optimization of the
             regularizer.},
   Key = {fds336658}
}

@article{fds339995,
   Author = {Beirami, A and Razaviyayn, M and Shahrampour, S and Tarokh,
             V},
   Title = {On Optimal Generalizability in Parametric
             Learning},
   Journal = {Advances in Neural Information Processing
             Systems},
   Volume = {30},
   Pages = {11 pages},
   Publisher = {NEURAL INFORMATION PROCESSING SYSTEMS (NIPS)},
   Editor = {Guyon, I and Luxburg, UV and Bengio, S and Wallach, H and Fergus, R and Vishwanathan, S and Garnett, R},
   Year = {2017},
   Month = {January},
   Key = {fds339995}
}

@article{fds339997,
   Author = {Soloveychik, I and Xiang, Y and Tarokh, V},
   Title = {Pseudo-Wigner Matrices from Dual BCH Codes.},
   Journal = {Corr},
   Volume = {abs/1701.05544},
   Year = {2017},
   Key = {fds339997}
}

@article{fds339998,
   Author = {Deng, Z and Ding, J and Heal, K and Tarokh, V},
   Title = {The number of independent sets in hexagonal
             graphs.},
   Journal = {Isit},
   Pages = {2910-2914},
   Publisher = {IEEE},
   Year = {2017},
   ISBN = {978-1-5090-4096-4},
   Key = {fds339998}
}

@article{fds339999,
   Author = {Jeong, S and Li, X and Yang, J and Li, Q and Tarokh,
             V},
   Title = {Dictionary Learning and Sparse Coding-Based Denoising for
             High-Resolution Task Functional Connectivity MRI
             Analysis.},
   Journal = {Mlmi@Miccai},
   Volume = {10541},
   Pages = {45-52},
   Publisher = {SPRINGER},
   Editor = {Wang, Q and Shi, Y and Suk, H-I and Suzuki, K},
   Year = {2017},
   ISBN = {978-3-319-67388-2},
   Key = {fds339999}
}

@article{fds340001,
   Author = {Shahrampour, S and Tarokh, V},
   Title = {Nonlinear Sequential Accepts and Rejects for Identification
             of Top Arms in Stochastic Bandits.},
   Journal = {Corr},
   Volume = {abs/1707.02649},
   Year = {2017},
   Key = {fds340001}
}

@article{fds336663,
   Author = {Wei, L and Zheng, Z and Hero, A and Tarokh, V},
   Title = {Scaling laws and phase transitions for target detection in
             MIMO radar},
   Journal = {2016 Ieee Information Theory Workshop, Itw
             2016},
   Pages = {345-348},
   Publisher = {IEEE},
   Year = {2016},
   Month = {October},
   ISBN = {9781509010905},
   url = {http://dx.doi.org/10.1109/ITW.2016.7606853},
   Abstract = {The performance of MIMO radar has been a subject of intense
             study in the past decades. For such a system, however, the
             important phenomenon of phase transition has received little
             attention in the literature. In this paper, we study the
             phase transition on the target detection probability of a
             SNR maximizing detector. Such a detector declares a target
             to be present when the largest eigenvalue of the observed
             data matrix exceeds a threshold. In particular, we identify
             a critical value below and above which the limiting
             detection performance is described by the Tracy-Widom law
             and the Gaussian law, respectively. Under both laws, the
             scaling limits and asymptotic expansions of misdetection
             probability at the vanishing regime are derived using tools
             from random matrix theory.},
   Doi = {10.1109/ITW.2016.7606853},
   Key = {fds336663}
}

@article{fds336664,
   Author = {Kurien, BG and Tarokh, V and Rachlin, Y and Shah, VN and Ashcom,
             JB},
   Title = {Resolving phase ambiguities in the calibration of redundant
             interferometric arrays: Implications for array
             design},
   Journal = {Monthly Notices of the Royal Astronomical
             Society},
   Volume = {461},
   Number = {4},
   Pages = {3585-3597},
   Publisher = {Oxford University Press (OUP)},
   Year = {2016},
   Month = {October},
   url = {http://dx.doi.org/10.1093/mnras/stw1507},
   Abstract = {We provide new results enabling robust interferometric image
             reconstruction in the presence of unknown aperture piston
             variation via the technique of redundant spacing calibration
             (RSC). The RSC technique uses redundant measurements of the
             same interferometric baseline with different pairs of
             apertures to reveal the piston variation among these pairs.
             In both optical and radio interferometry, the presence of
             phase-wrapping ambiguities in the measurements is a
             fundamental issue that needs to be addressed for reliable
             image reconstruction. In this paper, we show that these
             ambiguities affect recently developed RSC phasor-based
             reconstruction approaches operating on the complex
             visibilities, as well as traditional phase-based approaches
             operating on their logarithm. We also derive new sufficient
             conditions for an interferometric array to be immune to
             these ambiguities in the sense that their effect can be
             rendered benign in image reconstruction. This property,
             which we call wrap-invariance, has implications for the
             reliability of imaging via classical three-baseline phase
             closures as well as generalized closures.We show that
             wrap-invariance is conferred upon arrays whose
             interferometric graph satisfies a certain cycle-free
             condition. For cases in which this condition is not
             satisfied, a simple algorithm is provided for identifying
             those graph cycles which prevent its satisfaction. We apply
             this algorithm to diagnose and correct a member of a pattern
             family popular in the literature.},
   Doi = {10.1093/mnras/stw1507},
   Key = {fds336664}
}

@article{fds336665,
   Author = {Magnússon, S and Heal, K and Enyioha, C and Li, N and Fischione, C and Tarokh, V},
   Title = {Convergence of limited communications gradient
             methods},
   Journal = {Proceedings of the American Control Conference},
   Volume = {2016-July},
   Pages = {1421-1426},
   Publisher = {IEEE},
   Year = {2016},
   Month = {July},
   ISBN = {9781467386821},
   url = {http://dx.doi.org/10.1109/ACC.2016.7525116},
   Abstract = {Distributed control and decision making increasingly play a
             central role in economical and sustainable operation of
             cyber-physical systems. Nevertheless, the full potential of
             the technology has not yet been fully exploited in practice
             due to communication limitations of real-world
             infrastructures. This work investigates the fundamental
             properties of gradient methods for distributed optimization,
             where gradient information is communicated at every
             iteration, when using limited number of communicated bits.
             In particular, a general class of quantized gradient methods
             are studied where the gradient direction is approximated by
             a finite quantization set. Conditions on the quantization
             set are provided that are necessary and sufficient to
             guarantee the ability of these methods to minimize any
             convex objective function with Lipschitz continuous gradient
             and a nonempty, bounded set of optimizers. Moreover, a lower
             bound on the cardinality of the quantization set is
             provided, along with specific examples of minimal
             quantizations. Furthermore, convergence rate results are
             established that connect the fineness of the quantization
             and number of iterations needed to reach a predefined
             solution accuracy. The results provide a bound on the number
             of bits needed to achieve the desired accuracy. Finally, an
             application of the theory to resource allocation in power
             networks is demonstrated, and the theoretical results are
             substantiated by numerical simulations.},
   Doi = {10.1109/ACC.2016.7525116},
   Key = {fds336665}
}

@article{fds336666,
   Author = {Zheng, Z and Wei, L and Haas, ZJ and Tarokh, V},
   Title = {Transmit beamforming in Rayleigh product MIMO channels:
             Ergodic mutual information and symbol error
             rate},
   Journal = {2016 Ieee International Conference on Communications, Icc
             2016},
   Publisher = {IEEE},
   Year = {2016},
   Month = {July},
   ISBN = {9781479966646},
   url = {http://dx.doi.org/10.1109/ICC.2016.7511213},
   Abstract = {In this paper, we consider MIMO beamforming in the presence
             of Rayleigh product channels. Based on a derived largest
             eigenvalue distribution, the key performance metrics of the
             beamforming system are obtained, assuming perfect channel
             knowledge at the transmitter and receiver. Using the
             closed-form expressions, we gain insights into the behavior
             of MIMO beamforming systems in scenarios of practical
             interest.},
   Doi = {10.1109/ICC.2016.7511213},
   Key = {fds336666}
}

@article{fds336655,
   Author = {Kuiper, PK and Kolitz, SE and Tarokh, V},
   Title = {Base camp quality of life standardization and
             improvement},
   Journal = {Proceedings International Carnahan Conference on Security
             Technology},
   Publisher = {IEEE},
   Year = {2016},
   Month = {July},
   ISBN = {9781509010707},
   url = {http://dx.doi.org/10.1109/CCST.2016.7815688},
   Abstract = {The United States (US) Army has over 66,000 soldiers engaged
             in contingency operations across the world. Current
             budgetary constraints and an uncertain global security
             environment require these operations to be executed as
             efficiently as possible. Base camps are the secured areas
             where soldiers live when deployed to contingency operations.
             Base camps impose a significant financial and tactical
             burden during contingency operations and sub-optimal soldier
             quality of life decisions have significantly contributed to
             costs. Quality of life (QOL) refers to the non-security and
             non-mission related services that directly sustain the
             mission effectiveness of soldiers. Current US Army base camp
             tactics, techniques, and procedures (TTPs) do not
             sufficiently specify QOL services, and more detailed
             doctrine should be developed to support combat units
             executing contingency operations. In this investigation we
             employ quantitative methods to select decisions that improve
             QOL and inform doctrine. We leverage a QOL function and
             resource consumption data developed by US Army Natick
             Soldier Research, Development and Engineering Center's
             (Natick Labs) to build a model that improves QOL under the
             constraints of four fundamental resources: fuel, water,
             waste water, and solid waste. We employ a mixed integer
             linear program modeling approach and execute sensitivity
             analysis to evaluate the strength of our results. Our final
             model is formulated as a chance constraint optimization to
             address the uncertainty associated with resource
             availability in contingency operations. Our results provide
             QOL decisions that reduce resource consumption while
             maintaining an equivalent QOL level when compared to current
             TTPs. The model provides quantitative rigor, informing
             decision makers of specific base camp design principles for
             the development of doctrine.},
   Doi = {10.1109/CCST.2016.7815688},
   Key = {fds336655}
}

@article{fds336667,
   Author = {Farhadi, H and Atai, J and Skoglund, M and Nadimi, ES and Pahlavan, K and Tarokh, V},
   Title = {An adaptive localization technique for wireless capsule
             endoscopy},
   Journal = {International Symposium on Medical Information and
             Communication Technology, Ismict},
   Volume = {2016-June},
   Publisher = {IEEE},
   Year = {2016},
   Month = {June},
   ISBN = {9781509028498},
   url = {http://dx.doi.org/10.1109/ISMICT.2016.7498884},
   Abstract = {Wireless capsule endoscopy (WCE) is an emerging technique to
             enhance Gastroenterologists information about the patient's
             gastrointestinal (G.I.) tract. Localization of capsule
             inside human body in this case is an active area of
             research. This can be thought of as a sub-domain of micro
             and bio-robotics fields. If capsule and micro-robot
             localization problem in human body is solved, then it may
             potentially lead to less invasive treatments for G.I.
             diseases and other micro-robot assisted medical procedures.
             Several approaches have been investigated by the researchers
             to estimate capsule location. The proposed solutions are
             mainly static and thus prone to the changes in the
             propagation medium. We propose an adaptive algorithm based
             on expectation maximization technique for capsule
             localization. The proposed algorithm adaptively updates the
             estimated location based on the received radio frequency
             (RF) signal measurements.},
   Doi = {10.1109/ISMICT.2016.7498884},
   Key = {fds336667}
}

@article{fds336668,
   Author = {Ding, J and Noshad, M and Tarokh, V},
   Title = {Complementary lattice arrays for coded aperture
             imaging.},
   Journal = {Journal of the Optical Society of America
             A},
   Volume = {33},
   Number = {5},
   Pages = {863-881},
   Year = {2016},
   Month = {May},
   url = {http://dx.doi.org/10.1364/josaa.33.000863},
   Abstract = {In this work, we propose the concept of complementary
             lattice arrays in order to enable a broader range of designs
             for coded aperture imaging systems. We provide a general
             framework and methods that generate richer and more flexible
             designs compared to the existing techniques. Besides this,
             we review and interpret the state-of-the-art uniformly
             redundant array designs, broaden the related concepts, and
             propose new design methods.},
   Doi = {10.1364/josaa.33.000863},
   Key = {fds336668}
}

@article{fds336669,
   Author = {Magnusson, S and Enyioha, C and Heal, K and Li, N and Fischione, C and Tarokh, V},
   Title = {Distributed resource allocation using one-way communication
             with applications to power networks},
   Journal = {2016 50th Annual Conference on Information Systems and
             Sciences, Ciss 2016},
   Pages = {631-636},
   Publisher = {IEEE},
   Year = {2016},
   Month = {April},
   ISBN = {9781467394574},
   url = {http://dx.doi.org/10.1109/CISS.2016.7460576},
   Abstract = {Typical coordination schemes for future power grids require
             two-way communications. Since the number of end
             power-consuming devices is large, the bandwidth requirements
             for such two-way communication schemes may be prohibitive.
             Motivated by this observation, we study distributed
             coordination schemes that require only one-way limited
             communications. In particular, we investigate how dual
             descent distributed optimization algorithm can be employed
             in power networks using one-way communication. In this
             iterative algorithm, system coordinators broadcast
             coordinating (or pricing) signals to the users/devices who
             update power consumption based on the received signal. Then
             system coordinators update the coordinating signals based on
             the physical measurement of the aggregate power usage. We
             provide conditions to guarantee the feasibility of the
             aggregated power usage at each iteration so as to avoid
             blackout. Furthermore, we prove the convergence of
             algorithms under these conditions, and establish its rate of
             convergence. We illustrate the performance of our algorithms
             using numerical simulations. These results show that one-way
             limited communication may be viable for coordinating/operating
             the future smart grids.},
   Doi = {10.1109/CISS.2016.7460576},
   Key = {fds336669}
}

@article{fds336670,
   Author = {Ding, J and Noshad, M and Tarokh, V},
   Title = {Data-driven learning of the number of states in multi-state
             autoregressive models},
   Journal = {2015 53rd Annual Allerton Conference on Communication,
             Control, and Computing, Allerton 2015},
   Pages = {418-425},
   Year = {2016},
   Month = {April},
   ISBN = {9781509018239},
   url = {http://dx.doi.org/10.1109/ALLERTON.2015.7447034},
   Abstract = {In this work, we consider the class of multi-state
             autoregressive processes that can be used to model
             non-stationary time series of interest. In order to capture
             different autoregressive (AR) states underlying an observed
             time series, it is crucial to select the appropriate number
             of states. We propose a new and intuitive model selection
             technique based on the Gap statistics, which uses a null
             reference distribution on the stable AR filters to identify
             whether adding a new AR state significantly improves the
             performance of the model. To that end, we define a new
             distance measure between two AR filters based on the mean
             squared prediction error, and propose an efficient method to
             generate stable filters that are uniformly distributed in
             the coefficient space. Numerical results are provided to
             evaluate the performance of the proposed
             approach.},
   Doi = {10.1109/ALLERTON.2015.7447034},
   Key = {fds336670}
}

@article{fds336671,
   Author = {Ding, J and Bouabdallah, A and Tarokh, V},
   Title = {Key Pre-Distributions From Graph-Based Block
             Designs},
   Journal = {Ieee Sensors Journal},
   Volume = {16},
   Number = {6},
   Pages = {1842-1850},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2016},
   Month = {March},
   url = {http://dx.doi.org/10.1109/JSEN.2015.2501429},
   Abstract = {With the development of wireless communication technologies
             which considerably contributed to the development of
             wireless sensor networks (WSNs), we have witnessed
             ever-increasing WSN-based applications which induced a host
             of research activities in both academia and industry. Since
             most of the target WSN applications are very sensitive,
             security issue is one of the major challenges in the
             deployment of WSN. One of the important building blocks in
             securing WSN is key management. Traditional key management
             solutions developed for other networks are not suitable for
             WSN, since WSN networks are resource (e.g., memory,
             computation, and energy) limited. Key pre-distribution
             algorithms have recently evolved as efficient alternatives
             of key management in these networks. Secure communication is
             achieved between a pair of nodes either by the existence of
             a key allowing for direct communication or by a chain of
             keys forming a key path between the pair. In this paper, we
             consider prior knowledge of network characteristics and
             application constraints in terms of communication needs
             between sensor nodes, and we propose methods to design key
             pre-distribution schemes, in order to provide better
             security and connectivity while requiring less resources.
             Our methods are based on casting the prior information as a
             graph. Motivated by this idea, we also propose a class of
             quasi-symmetric designs referred here to as g-designs. Our
             proposed key pre-distribution schemes significantly improve
             upon the existing constructions based on the unital designs.
             We give some examples and point out open problems for future
             research.},
   Doi = {10.1109/JSEN.2015.2501429},
   Key = {fds336671}
}

@article{fds336672,
   Author = {Ding, J and Noshad, M and Tarokh, V},
   Title = {Order Selection of Autoregressive Processes Using Bridge
             Criterion},
   Journal = {Proceedings 15th Ieee International Conference on Data
             Mining Workshop, Icdmw 2015},
   Pages = {615-622},
   Publisher = {IEEE},
   Year = {2016},
   Month = {January},
   ISBN = {9781467384926},
   url = {http://dx.doi.org/10.1109/ICDMW.2015.216},
   Abstract = {A new criterion is introduced for determining the order of
             an autoregressive model fit to time series data. The
             proposed technique is shown to give a consistent and
             asymptotically efficient order estimation. It has the
             benefits of the two well-known model selection techniques,
             the Akaike information criterion and the Bayesian
             information criterion. When the true order of the
             autoregression is relatively large compared with the sample
             size, the Akaike information criterion is known to be
             efficient, and the new criterion behaves in a similar
             manner. When the true order is finite and small compared
             with the sample size, the Bayesian information criterion is
             known to be consistent, and so is the new criterion. Thus
             the new criterion builds a bridge between the two classical
             criteria automatically. In practice, where the observed time
             series is given without any prior information about the
             autoregression, the proposed order selection criterion is
             more flexible and robust compared with classical approaches.
             Numerical results are presented demonstrating the robustness
             of the proposed technique when applied to various
             datasets.},
   Doi = {10.1109/ICDMW.2015.216},
   Key = {fds336672}
}

@article{fds336673,
   Author = {Ding, J and Noshad, M and Tarokh, V},
   Title = {Learning the Number of Autoregressive Mixtures in Time
             Series Using the Gap Statistics},
   Journal = {Proceedings 15th Ieee International Conference on Data
             Mining Workshop, Icdmw 2015},
   Pages = {1441-1446},
   Publisher = {IEEE},
   Year = {2016},
   Month = {January},
   ISBN = {9781467384926},
   url = {http://dx.doi.org/10.1109/ICDMW.2015.209},
   Abstract = {Using a proper model to characterize a time series is
             crucial in making accurate predictions. In this work we use
             time-varying autoregressive process (TVAR) to describe
             non-stationary time series and model it as a mixture of
             multiple stable autoregressive (AR) processes. We introduce
             a new model selection technique based on Gap statistics to
             learn the appropriate number of AR filters needed to model a
             time series. We define a new distance measure between stable
             AR filters and draw a reference curve that is used to
             measure how much adding a new AR filter improves the
             performance of the model, and then choose the number of AR
             filters that has the maximum gap with the reference curve.
             To that end, we propose a new method in order to generate
             uniform random stable AR filters in root domain. Numerical
             results are provided demonstrating the performance of the
             proposed approach.},
   Doi = {10.1109/ICDMW.2015.209},
   Key = {fds336673}
}

@article{fds340003,
   Author = {Enyioha, C and Magnússon, S and Heal, K and Li, N and Fischione, C and Tarokh, V},
   Title = {Robustness analysis for an online decentralized descent
             power allocation algorithm.},
   Journal = {Ita},
   Pages = {1-8},
   Publisher = {IEEE},
   Year = {2016},
   ISBN = {978-1-5090-2529-9},
   Key = {fds340003}
}

@article{fds340002,
   Author = {Magnússon, S and Enyioha, C and Heal, K and Li, N and Fischione, C and Tarokh, V},
   Title = {Distributed resource allocation using one-way communication
             with applications to power networks.},
   Journal = {Ciss},
   Pages = {631-636},
   Publisher = {IEEE},
   Year = {2016},
   ISBN = {978-1-4673-9457-4},
   Key = {fds340002}
}

@article{fds340004,
   Author = {Shahrampour, S and Noshad, M and Tarokh, V},
   Title = {On Sequential Elimination Algorithms for Best-Arm
             Identification in Multi-Armed Bandits.},
   Journal = {Corr},
   Volume = {abs/1609.02606},
   Year = {2016},
   Key = {fds340004}
}

@article{fds340005,
   Author = {Kuiper, PK and Kolitz, SE and Tarokh, V},
   Title = {Base camp quality of life standardization and
             improvement.},
   Journal = {Iccst},
   Pages = {1-8},
   Publisher = {IEEE},
   Year = {2016},
   ISBN = {978-1-5090-1072-1},
   Key = {fds340005}
}

@article{fds336678,
   Author = {Pahlavan, K and Geng, Y and Cave, DR and Bao, G and Ml, L and Agu, E and Karellas, A and Sayrafian, K and Tarokh, V},
   Title = {A novel cyber physical system for 3-D imaging of the small
             intestine in vivo},
   Journal = {Ieee Access},
   Volume = {3},
   Pages = {2730-2742},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2015},
   Month = {December},
   url = {http://dx.doi.org/10.1109/ACCESS.2015.2508003},
   Abstract = {Small intestine is the longest organ in the gastrointestinal
             tract where much of the digestion and the food absorption
             take place. Wireless video capsule endoscope (VCE) is the
             first device taking 2-D pictures from the lesions and the
             abnormalities in the entire length of the small intestine.
             Since precise localization and mapping inside the small
             intestine is a very challenging problem, we cannot measure
             the distance traveled by the VCE to associate lesions and
             abnormalities to locations inside the small intestine, and
             we cannot use the 2-D pictures to reconstruct the 3-D image
             of interior of the entire small intestine in vivo. This
             paper presents the architectural concept of a novel cyber
             physical system (CPS), which can utilize the 2-D pictures of
             the small intestine taken by the VCE to reconstruct the 3-D
             image of the small intestine in vivo. Hybrid localization
             and mapping techniques with millimetric accuracy for inside
             the small intestine is presented as an enabling technology
             to facilitate the reconstruction of 3-D images from the 2-D
             pictures. The proposed CPS architecture provides for
             large-scale virtual experimentations inside the human body
             without intruding the body with a sizable equipment using
             reasonable clinical experiments for validation. The 3-D
             imaging of the small intestine in vivo allows a lesion to be
             pinpointed for follow-up diagnosis and/or treatment and the
             abnormalities may be observed from different angles in 3-D
             images for more thorough examination.},
   Doi = {10.1109/ACCESS.2015.2508003},
   Key = {fds336678}
}

@article{fds336674,
   Author = {Nadimi, ES and Blanes-Vidal, V and Harslund, JLF and Ramezani, MH and Kjeldsen, J and Johansen, PM and Thiel, D and Tarokh,
             V},
   Title = {In vivo and in situ measurement and modelling of intra-body
             effective complex permittivity.},
   Journal = {Healthcare Technology Letters},
   Volume = {2},
   Number = {6},
   Pages = {135-140},
   Year = {2015},
   Month = {December},
   url = {http://dx.doi.org/10.1049/htl.2015.0024},
   Abstract = {Radio frequency tracking of medical micro-robots in
             minimally invasive medicine is usually investigated upon the
             assumption that the human body is a homogeneous propagation
             medium. In this Letter, the authors conducted various trial
             programs to measure and model the effective complex
             permittivity ε in terms of refraction ε', absorption ε″
             and their variations in gastrointestinal (GI) tract organs
             (i.e. oesophagus, stomach, small intestine and large
             intestine) and the porcine abdominal wall under in vivo and
             in situ conditions. They further investigated the effects of
             irregular and unsynchronised contractions and simulated
             peristaltic movements of the GI tract organs inside the
             abdominal cavity and in the presence of the abdominal wall
             on the measurements and variations of ε' and ε''. They
             advanced the previous models of effective complex
             permittivity of a multilayer inhomogeneous medium, by
             estimating an analytical model that accounts for reflections
             between the layers and calculates the attenuation that the
             wave encounters as it traverses the GI tract and the
             abdominal wall. They observed that deviation from the
             specified nominal layer thicknesses due to non-geometric
             boundaries of GI tract morphometric variables has an impact
             on the performance of the authors' model. Therefore, they
             derived statistical-based models for ε' and ε'' using
             their experimental measurements.},
   Doi = {10.1049/htl.2015.0024},
   Key = {fds336674}
}

@article{fds336675,
   Author = {Noshad, M and Ding, J and Tarokh, V},
   Title = {Sequential learning of Multi-state autoregressive time
             series},
   Journal = {Proceeding of the 2015 Research in Adaptive and Convergent
             Systems, Racs 2015},
   Pages = {44-51},
   Publisher = {ACM Press},
   Year = {2015},
   Month = {October},
   ISBN = {9781450337380},
   url = {http://dx.doi.org/10.1145/2811411.2813523},
   Abstract = {Modeling and forecasting streaming data has fundamental
             importance in many real world applications. In this paper,
             we present an online model selection technique that can be
             used to model non-stationary time series in a sequential
             manner. Multi-state autoregressive (AR) model is used to
             describe non-stationary time series, and a dynamic algorithm
             is applied to learn the states at each time step. The
             proposed technique estimates a candidate AR filter from the
             most recent data points at every time step, and checks
             whether starting a new state significantly decreases
             prediction error or not. To that end, a time-varying
             threshold is compared with the reduction in the prediction
             error caused by postulating a new AR filter. The threshold
             is calculated by sampling and clustering uniformly
             distributed stable AR filters. Numerical simulations show
             that the proposed algorithm accurately estimates the state
             transitions with a small delay.},
   Doi = {10.1145/2811411.2813523},
   Key = {fds336675}
}

@article{fds340007,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {Comment on "Asymptotic Achievability of the Cramér-Rao
             Bound for Noisy Compressive Sampling"},
   Volume = {abs/1509.04375},
   Year = {2015},
   Month = {September},
   Abstract = {In [1], we proved the asymptotic achievability of the
             Cram\'{e}r-Rao bound in the compressive sensing setting in
             the linear sparsity regime. In the proof, we used an
             erroneous closed-form expression of $\alpha \sigma^2$ for
             the genie-aided Cram\'{e}r-Rao bound $\sigma^2 \textrm{Tr}
             (\mathbf{A}^*_\mathcal{I} \mathbf{A}_\mathcal{I})^{-1}$ from
             Lemma 3.5, which appears in Eqs. (20) and (29). The proof,
             however, holds if one avoids replacing $\sigma^2 \textrm{Tr}
             (\mathbf{A}^*_\mathcal{I} \mathbf{A}_\mathcal{I})^{-1}$ by
             the expression of Lemma 3.5, and hence the claim of the Main
             Theorem stands true. In Chapter 2 of the Ph. D. dissertation
             by Behtash Babadi [2], this error was fixed and a more
             detailed proof in the non-asymptotic regime was presented. A
             draft of Chapter 2 of [2] is included in this note,
             verbatim. We would like to refer the interested reader to
             the full dissertation, which is electronically archived in
             the ProQuest database [2], and a draft of which can be
             accessed through the author's homepage under:
             http://ece.umd.edu/~behtash/babadi_thesis_2011.pdf.},
   Key = {fds340007}
}

@article{fds336676,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Sparse Signal Recovery from a Mixture of Linear and
             Magnitude-Only Measurements.},
   Journal = {Ieee Signal Processing Letters},
   Volume = {22},
   Number = {9},
   Pages = {1220-1223},
   Year = {2015},
   Month = {September},
   url = {http://dx.doi.org/10.1109/lsp.2015.2393295},
   Abstract = {We consider the problem of exact sparse signal recovery from
             a combination of linear and magnitude-only (phaseless)
             measurements. A k-sparse signal x ∈ ℂ n is measured as r
             = Bx and y = |Cx|, where B ∈ ℂ m1×n and C ∈ ℂ m2×n
             are measurement matrices and | · | is the element-wise
             absolute value. We show that if max(2m1, 1) + m2 ≥ 4k - 1,
             then a set of generic measurements are sufficient to recover
             every k-sparse x exactly, establishing the trade-off between
             the number of linear and magnitude-only measurements.},
   Doi = {10.1109/lsp.2015.2393295},
   Key = {fds336676}
}

@article{fds336677,
   Author = {Krishnamurthy, S and Bliss, D and Richmond, C and Tarokh,
             V},
   Title = {Peak sidelobe level gumbel distribution for arrays of
             randomly placed antennas},
   Journal = {Ieee National Radar Conference Proceedings},
   Volume = {2015-June},
   Number = {June},
   Pages = {1671-1676},
   Publisher = {IEEE},
   Year = {2015},
   Month = {June},
   ISBN = {9781479982325},
   url = {http://dx.doi.org/10.1109/RADAR.2015.7131267},
   Abstract = {Extreme Value Theory (EVT) is used to analyze the peak
             sidelobe level distribution for array element positions with
             arbitrary probability distributions. Computations are
             discussed in the context of linear antenna arrays using
             electromagnetic energy. The results also apply to planar
             arrays of random elements that can be transformed into
             linear arrays. For sparse arrays with small number of
             elements, Gaussian approximations to the beampattern
             distribution at a particular angle introduce inaccuracies to
             the probability calculations. EVT is applied without making
             these Gaussian approximations. It is shown that the peak
             sidelobe level distribution converges weakly to a Gumbel
             distribution in the limit of a large number of beampattern
             samples. This result is for both sparse and dense arrays of
             randomly placed antennas over a large aperture. The
             definition of a large aperture in this context is ambiguous,
             but a possible rule-of-thumb is that it is at least a
             wavelength.},
   Doi = {10.1109/RADAR.2015.7131267},
   Key = {fds336677}
}

@article{fds356194,
   Author = {Deng, Z and Ding, J and Noshad, M and Tarokh, V},
   Title = {Capacity of Hexagonal Checkerboard Codes},
   Volume = {abs/1506.02163},
   Year = {2015},
   Month = {June},
   Abstract = {In this paper, we propose a new method to bound the capacity
             of checkerboard codes on the hexagonal lattice. This
             produces rigorous bounds that are tighter than those
             commonly known.},
   Key = {fds356194}
}

@article{fds340006,
   Author = {Ding, J and Noshad, M and Tarokh, V},
   Title = {Data-Driven Learning of the Number of States in Multi-State
             Autoregressive Models.},
   Journal = {Corr},
   Volume = {abs/1506.02107},
   Year = {2015},
   Key = {fds340006}
}

@article{fds340009,
   Author = {Yi, H and Shin, WY and Tarokh, V},
   Title = {An environmentally friendly approach to the relay-aided
             cellular network architecture},
   Journal = {2014 Ieee 11th Consumer Communications and Networking
             Conference, Ccnc 2014},
   Pages = {541-542},
   Publisher = {IEEE},
   Year = {2014},
   Month = {January},
   ISBN = {9781479923557},
   url = {http://dx.doi.org/10.1109/ccnc.2014.6994432},
   Abstract = {We solve the problem of environmentally friendly (i.e.,
             energy-efficient) base station and relay-station planning
             for a simplified cooperative cellular network. We assume a
             two-hop transmission model based on the time-division
             multiplexing operation. We propose a twostep iterative
             algorithm where each iteration consists of an assignment
             step and a positioning step. We use the energy-normalized
             throughput as a greenness measure, defined as the ratio of
             the sum-rate to the total energy consumptions. Numerical
             evaluation is performed to find 1) the optimal positions of
             base-stations and relay-stations and 2) the optimal numbers
             of base-stations and relay-stations in terms of maximizing
             the energy-normalized throughput in a one-dimensional
             network.},
   Doi = {10.1109/ccnc.2014.6994432},
   Key = {fds340009}
}

@article{fds336679,
   Author = {Kurien, BG and Rachlin, Y and Shah, VN and Ashcom, JB and Tarokh,
             V},
   Title = {Compressed sensing techniques for image reconstruction in
             optical interferometry},
   Journal = {Optics Infobase Conference Papers},
   Year = {2014},
   Month = {January},
   ISBN = {9781557523082},
   Abstract = {We develop a novel method of image reconstruction from
             bispectrum and magnitude observables of an optical
             interferometer using Compressed-Sensing techniques.We
             validate our method in simulation and with actual
             measurements from a Fizeau interferometer. © 2014
             OSA.},
   Key = {fds336679}
}

@article{fds336680,
   Author = {Nadimi, ES and Blanes-Vidal, V and Tarokh, V and Johansen,
             PM},
   Title = {Bayesian-based localization of wireless capsule endoscope
             using received signal strength.},
   Journal = {Annual International Conference of the Ieee Engineering in
             Medicine and Biology Society. Ieee Engineering in Medicine
             and Biology Society. Annual International
             Conference},
   Volume = {2014},
   Pages = {5988-5991},
   Year = {2014},
   Month = {January},
   url = {http://dx.doi.org/10.1109/embc.2014.6944993},
   Abstract = {In wireless body area sensor networking (WBASN) applications
             such as gastrointestinal (GI) tract monitoring using
             wireless video capsule endoscopy (WCE), the performance of
             out-of-body wireless link propagating through different body
             media (i.e. blood, fat, muscle and bone) is still under
             investigation. Most of the localization algorithms are
             vulnerable to the variations of path-loss coefficient
             resulting in unreliable location estimation. In this paper,
             we propose a novel robust probabilistic Bayesian-based
             approach using received-signal-strength (RSS) measurements
             that accounts for Rayleigh fading, variable path-loss
             exponent and uncertainty in location information received
             from the neighboring nodes and anchors. The results of this
             study showed that the localization root mean square error of
             our Bayesian-based method was 1.6 mm which was very close to
             the optimum Cramer-Rao lower bound (CRLB) and significantly
             smaller than that of other existing localization approaches
             (i.e. classical MDS (64.2mm), dwMDS (32.2mm), MLE (36.3mm)
             and POCS (2.3mm)).},
   Doi = {10.1109/embc.2014.6944993},
   Key = {fds336680}
}

@article{fds336681,
   Author = {Akçakaya, M and Nam, S and Basha, TA and Kawaji, K and Tarokh, V and Nezafat, R},
   Title = {An augmented Lagrangian based compressed sensing
             reconstruction for non-Cartesian magnetic resonance imaging
             without gridding and regridding at every
             iteration.},
   Journal = {Plos One},
   Volume = {9},
   Number = {9},
   Pages = {e107107},
   Year = {2014},
   Month = {January},
   url = {http://dx.doi.org/10.1371/journal.pone.0107107},
   Abstract = {<h4>Background</h4>Non-Cartesian trajectories are used in a
             variety of fast imaging applications, due to the incoherent
             image domain artifacts they create when undersampled. While
             the gridding technique is commonly utilized for
             reconstruction, the incoherent artifacts may be further
             removed using compressed sensing (CS). CS reconstruction is
             typically done using conjugate-gradient (CG) type
             algorithms, which require gridding and regridding to be
             performed at every iteration. This leads to a large
             computational overhead that hinders its applicability.<h4>Methods</h4>We
             sought to develop an alternative method for CS
             reconstruction that only requires two gridding and one
             regridding operation in total, irrespective of the number of
             iterations. This proposed technique is evaluated on phantom
             images and whole-heart coronary MRI acquired using 3D radial
             trajectories, and compared to conventional CS reconstruction
             using CG algorithms in terms of quantitative vessel
             sharpness, vessel length, computation time, and convergence
             rate.<h4>Results</h4>Both CS reconstructions result in
             similar vessel length (P = 0.30) and vessel sharpness
             (P = 0.62). The per-iteration complexity of the proposed
             technique is approximately 3-fold lower than the
             conventional CS reconstruction (17.55 vs. 52.48 seconds in
             C++). Furthermore, for in-vivo datasets, the convergence
             rate of the proposed technique is faster (60±13 vs.
             455±320 iterations) leading to a ∼23-fold reduction in
             reconstruction time.<h4>Conclusions</h4>The proposed
             reconstruction provides images of similar quality to the
             conventional CS technique in terms of removing artifacts,
             but at a much lower computational complexity.},
   Doi = {10.1371/journal.pone.0107107},
   Key = {fds336681}
}

@article{fds336682,
   Author = {Nam, S and Hong, SN and Akçakaya, M and Kwak, Y and Goddu, B and Kissinger, KV and Manning, WJ and Tarokh, V and Nezafat,
             R},
   Title = {Compressed sensing reconstruction for undersampled
             breath-hold radial cine imaging with auxiliary
             free-breathing data.},
   Journal = {Journal of Magnetic Resonance Imaging : Jmri},
   Volume = {39},
   Number = {1},
   Pages = {179-188},
   Year = {2014},
   Month = {January},
   url = {http://dx.doi.org/10.1002/jmri.24098},
   Abstract = {<h4>Purpose</h4>To improve compressed sensing (CS)
             reconstruction of accelerated breath-hold (BH) radial cine
             magnetic resonance imaging (MRI) by exploiting auxiliary
             data acquired between different BHs.<h4>Materials and
             methods</h4>Cardiac function is usually assessed using
             segmented cine acquisitions over multiple BHs to cover the
             entire left ventricle (LV). Subjects are given a resting
             period between adjacent BHs, when conventionally no data are
             acquired and subjects rest in the scanner. In this study the
             resting periods between BHs were used to acquire additional
             free-breathing (FB) data, which are subsequently used to
             generate a sparsity constraint for each cardiac phase.
             Images reconstructed using the proposed sparsity constraint
             were compared with conventional CS using a composite image
             generated by averaging different cardiac phases. The
             efficacy of the proposed reconstruction was compared using
             indices of LV function and blood-myocardium
             sharpness.<h4>Results</h4>The proposed method provided
             accurate LV ejection fraction measurements for 33% and 20%
             sampled datasets compared with fully sampled reference
             images, and showed 14% and 11% higher blood-myocardium
             border sharpness scores compared to the conventional
             CS.<h4>Conclusion</h4>The FB data acquired during resting
             periods can be efficiently used to improve the image quality
             of the undersampled BH data without increasing the total
             scan time.},
   Doi = {10.1002/jmri.24098},
   Key = {fds336682}
}

@article{fds350812,
   Author = {Kurien, BG and Rachlin, Y and Shah, VN and Ashcom, JB and Tarokh,
             V},
   Title = {Compressed sensing techniques for image reconstruction in
             optical interferometry},
   Journal = {Optics Infobase Conference Papers},
   Year = {2014},
   Month = {January},
   ISBN = {9781557523082},
   url = {http://dx.doi.org/10.1364/srs.2014.sm2f.3},
   Abstract = {We develop a novel method of image reconstruction from
             bispectrum and magnitude observables of an optical
             interferometer using Compressed-Sensing techniques.We
             validate our method in simulation and with actual
             measurements from a Fizeau interferometer. © 2014
             OSA.},
   Doi = {10.1364/srs.2014.sm2f.3},
   Key = {fds350812}
}

@article{fds340008,
   Author = {Yi, H and Shin, WY and Tarokh, V},
   Title = {The design of environmentally friendly networks using
             coordinated multi-point (CoMP) transmission},
   Journal = {2014 Ieee 11th Consumer Communications and Networking
             Conference, Ccnc 2014},
   Pages = {517-518},
   Publisher = {IEEE},
   Year = {2014},
   Month = {January},
   ISBN = {9781479923557},
   url = {http://dx.doi.org/10.1109/ccnc.2014.6994388},
   Doi = {10.1109/ccnc.2014.6994388},
   Key = {fds340008}
}

@article{fds336683,
   Author = {Akcakaya, M and Tarokh, V},
   Title = {Distortion-based achievability conditions for joint
             estimation of sparse signals and measurement parameters from
             undersampled acquisitions},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {291-295},
   Publisher = {IEEE},
   Year = {2013},
   Month = {December},
   ISBN = {9781479904464},
   url = {http://dx.doi.org/10.1109/ISIT.2013.6620234},
   Abstract = {In this paper, we consider an undersampling system model of
             the form y = A(T(x, θ)) + n, where x is a k-sparse signal,
             T(·, · is a (possibly non-linear) function specified by a
             parameter vector θ and acting on x, A is a sensing matrix,
             and n is additive measurement noise. We consider an
             information theoretic decoder that aims to recover the
             sparse signal and the transformation parameter vector
             jointly, and study the achievability conditions for
             estimating the underlying signal within a specified ℓ2
             distortion for Gaussian sensing matrices. We compare the
             achievable distortion of the joint estimation process to
             that of the standard noisy compressed sensing model, where
             the sparse signal is directly measured with a sensing matrix
             with the same number of measurements. We also provide a
             numerical example to illustrate potential applications. ©
             2013 IEEE.},
   Doi = {10.1109/ISIT.2013.6620234},
   Key = {fds336683}
}

@article{fds336684,
   Author = {Sabbaghian, M and Sulyman, AI and Tarokh, V},
   Title = {Analysis of the impact of nonlinearity on the capacity of
             communication channels},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {59},
   Number = {11},
   Pages = {7671-7683},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TIT.2013.2274268},
   Abstract = {We study the impact of nonlinearities on the transmission
             rate of a communication system by establishing lower and
             upper bounds on the channel capacity. Our analysis is based
             on a general transmission model that includes transmitter
             and receiver nonlinearities, environmental thermal noise,
             and receiver chain noise. Using this model, we derive lower
             and upper bounds for the channel capacity of additive white
             Gaussian noise channels, fading channels, and multiple input
             multiple output channels in various thermal noise and
             receiver noise regimes. © 1963-2012 IEEE.},
   Doi = {10.1109/TIT.2013.2274268},
   Key = {fds336684}
}

@article{fds340010,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {New Conditions for Sparse Phase Retrieval},
   Volume = {abs/1310.1351},
   Year = {2013},
   Month = {October},
   Abstract = {We consider the problem of sparse phase retrieval, where a
             $k$-sparse signal ${\bf x} \in {\mathbb R}^n \textrm{ (or }
             {\mathbb C}^n\textrm{)}$ is measured as ${\bf y} = |{\bf
             Ax}|,$ where ${\bf A} \in {\mathbb R}^{m \times n} \textrm{
             (or } {\mathbb C}^{m \times n}\textrm{ respectively)}$ is a
             measurement matrix and $|\cdot|$ is the element-wise
             absolute value. For a real signal and a real measurement
             matrix ${\bf A}$, we show that $m = 2k$ measurements are
             necessary and sufficient to recover ${\bf x}$ uniquely. For
             complex signal ${\bf x} \in {\mathbb C}^n$ and ${\bf A} \in
             {\mathbb C}^{m \times n}$, we show that $m = 4k-2$ phaseless
             measurements are sufficient to recover ${\bf x}$. It is
             known that the multiplying constant $4$ in $m = 4k-2$ cannot
             be improved.},
   Key = {fds340010}
}

@article{fds336685,
   Author = {Kwak, Y and Nam, S and Akçakaya, M and Basha, TA and Goddu, B and Manning,
             WJ and Tarokh, V and Nezafat, R},
   Title = {Accelerated aortic flow assessment with compressed sensing
             with and without use of the sparsity of the complex
             difference image.},
   Journal = {Magnetic Resonance in Medicine},
   Volume = {70},
   Number = {3},
   Pages = {851-858},
   Year = {2013},
   Month = {September},
   url = {http://dx.doi.org/10.1002/mrm.24514},
   Abstract = {Phase contrast (PC) cardiac MR is widely used for the
             clinical assessment of blood flow in cardiovascular disease.
             One of the challenges of PC cardiac MR is the long scan time
             which limits both spatial and temporal resolution.
             Compressed sensing reconstruction with accelerated PC
             acquisitions is a promising technique to increase the scan
             efficiency. In this study, we sought to use the sparsity of
             the complex difference of the two flow-encoded images as an
             additional constraint term to improve the compressed sensing
             reconstruction of the corresponding accelerated PC data
             acquisition. Using retrospectively under-sampled data, the
             proposed reconstruction technique was optimized and
             validated in vivo on 15 healthy subjects. Then,
             prospectively under-sampled data was acquired on 11 healthy
             subjects and reconstructed with the proposed technique. The
             results show that there is good agreement between the
             cardiac output measurements from the fully sampled data and
             the proposed compressed sensing reconstruction method using
             complex difference sparsity up to acceleration rate 5. In
             conclusion, we have developed and evaluated an improved
             reconstruction technique for accelerated PC cardiac MR that
             uses the sparsity of the complex difference of the two
             flow-encoded images.},
   Doi = {10.1002/mrm.24514},
   Key = {fds336685}
}

@article{fds336686,
   Author = {Shin, WY and Lucani, DE and Médard, M and Stojanovic, M and Tarokh,
             V},
   Title = {On the effects of frequency scaling over capacity scaling in
             underwater networks - Part I: Extended network
             model},
   Journal = {Wireless Personal Communications},
   Volume = {71},
   Number = {3},
   Pages = {1683-1700},
   Publisher = {Springer Nature},
   Year = {2013},
   Month = {August},
   url = {http://dx.doi.org/10.1007/s11277-012-0904-z},
   Abstract = {In this two-part paper, information-theoretic capacity
             scaling laws are analyzed in an underwater acoustic network
             with n regularly located nodes on a square, in which both
             bandwidth and received signal power can be limited
             significantly. Parts I and II deal with an extended network
             of unit node density and a dense network of unit area,
             respectively. In both cases, a narrow-band model is assumed
             where the carrier frequency is allowed to scale as a
             function of n, which is shown to be crucial for achieving
             the order optimality in multi-hop (MH) mechanisms. We first
             characterize an attenuation parameter that depends on the
             frequency scaling as well as the transmission distance.
             Upper and lower bounds on the capacity scaling are then
             derived. In Part I, we show that the upper bound on capacity
             for extended networks is inversely proportional to the
             attenuation parameter, thus resulting in a highly
             power-limited network. Interestingly, it is shown that the
             upper bound is intrinsically related to the attenuation
             parameter but not the spreading factor. Furthermore, we
             propose an achievable communication scheme based on the
             nearest-neighbor MH transmission, which is suitable due to
             the low propagation speed of acoustic channel, and show that
             it is order-optimal for all operating regimes of extended
             networks. Finally, these scaling results are extended to the
             case of random node deployments providing fundamental limits
             to more complex scenarios of extended underwater networks.
             © 2012 Springer Science+Business Media New
             York.},
   Doi = {10.1007/s11277-012-0904-z},
   Key = {fds336686}
}

@article{fds336687,
   Author = {Shin, WY and Lucani, DE and Médard, M and Stojanovic, M and Tarokh,
             V},
   Title = {On the effects of frequency scaling over capacity scaling in
             underwater networks - Part II: Dense network
             model},
   Journal = {Wireless Personal Communications},
   Volume = {71},
   Number = {3},
   Pages = {1701-1719},
   Publisher = {Springer Nature},
   Year = {2013},
   Month = {August},
   url = {http://dx.doi.org/10.1007/s11277-012-0982-y},
   Abstract = {This is the second in a two-part series of papers on
             information-theoretic capacity scaling laws for an
             underwater acoustic network. Part II focuses on a dense
             network scenario, where nodes are deployed in a unit area.
             By deriving a cut-set upper bound on the capacity scaling,
             we first show that there exists either a bandwidth or power
             limitation, or both, according to the operating regimes
             (i.e.; path-loss attenuation regimes), thus yielding the
             upper bound that follows three fundamentally different
             information transfer arguments. In addition, an
             achievability result based on the multi-hop (MH)
             transmission is presented for dense networks. MH is shown to
             guarantee the order optimality under certain operating
             regimes. More specifically, it turns out that scaling the
             carrier frequency faster than or as n{1/4} is instrumental
             towards achieving the order optimality of the MH protocol.
             © 2013 Springer Science+Business Media New
             York.},
   Doi = {10.1007/s11277-012-0982-y},
   Key = {fds336687}
}

@article{fds336690,
   Author = {Shin, WY and Yi, H and Tarokh, V},
   Title = {Energy-efficient base-station topologies for green cellular
             networks},
   Journal = {2013 Ieee 10th Consumer Communications and Networking
             Conference, Ccnc 2013},
   Pages = {91-96},
   Publisher = {IEEE},
   Year = {2013},
   Month = {April},
   ISBN = {9781467331333},
   url = {http://dx.doi.org/10.1109/CCNC.2013.6488431},
   Abstract = {We consider the problem of energy-efficient base-station
             (BS) planning for green cellular network design. There exist
             a number of criteria for greenness in the literature, but we
             focus only on the energy-normalized throughput. We first
             model energy consumption for a heterogeneous network,
             consisting of macro and micro base-stations, and a network
             topology. Then, we propose an iterative algorithm for the
             green BS planning problem in the one-dimensional case: 1) We
             find the positions of base-stations that maximize the
             energy-normalized throughput for a fixed number of
             base-stations, and 2) find the optimal number of
             base-stations which maximizes the energy-normalized
             throughput. In this work, we evaluate the energy-normalized
             throughput accounting for adaptive modulation rates with
             power control, which is a common feature of modern
             communications systems. The convergence to a local maximum
             for the proposed algorithm is shown using computer
             simulations, and the corresponding energy-normalized
             throughputs are evaluated for a number of system model
             parameters. © 2013 IEEE.},
   Doi = {10.1109/CCNC.2013.6488431},
   Key = {fds336690}
}

@article{fds336689,
   Author = {Ishibashi, K and Shin, WY and Ochiai, H and Tarokh,
             V},
   Title = {A peak power efficient cooperative diversity using star-QAM
             with coherent/noncoherent detection},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {12},
   Number = {5},
   Pages = {2137-2147},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TWC.2013.032013.120507},
   Abstract = {In this paper, we propose a new simple relaying strategy
             based on bit-interleaved convolutionally coded
             star-quadrature amplitude modulation (QAM) along with
             coherent/noncoherent detection. Star-QAM is composed of
             multiple concentric circles of phase-shift keying (PSK).
             Exploiting this property, a hard limiter is used to enhance
             power amplifier (PA) efficiency at the relay. Moreover, we
             show that the proposed approach retains differential
             detectability, which results in a significant reduction of
             receiver complexity with robustness against phase ambiguity.
             By analyzing our proposed cooperation with
             coherent/noncoherent detection in terms of asymptotic
             pairwise error probability (PEP), we show that the full
             diversity order can be achieved on the condition that the
             minimum free distance of the convolutional codes is larger
             than the predetermined value specified by the number of
             available relays. Furthermore, the effectiveness of the
             proposed scheme in terms of PA efficiency is confirmed by
             comparing the statistical distributions of the corresponding
             instantaneous signal powers. All the theoretical results
             agree with those obtained by computer simulations. ©
             2002-2012 IEEE.},
   Doi = {10.1109/TWC.2013.032013.120507},
   Key = {fds336689}
}

@article{fds336691,
   Author = {Cvetkovic, Z and Tarokh, V and Yoon, S},
   Title = {On frequency offset estimation for OFDM},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {12},
   Number = {3},
   Pages = {1062-1072},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {February},
   url = {http://dx.doi.org/10.1109/TWC.2013.012413.120087},
   Abstract = {This paper presents a comparative study of Schmidl-Cox (SC)
             and Morelli-Mengali (MM) algorithms for frequency offset
             estimation in OFDM, along with a new least squares (LS) and
             a new modified SC algorithm. All algorithms have comparable
             accuracy approaching asymptotically the Cramer-Rao bound.
             The complexity of the LS algorithm is between O(N) and O(N
             log N) operations, where N is the length of the training
             sequence, while the complexity of the SC algorithm is
             between O(N log N) and O(N2) operations, and the complexity
             of the MM algorithm is O(N2) operations. The modified
             version of the SC algorithm requires only one training
             sequence as opposed to two required by the original SC
             algorithm, and significantly reduced O(N log N) complexity.
             The sensitivity of the three algorithms to quantization of
             the arg function (the argument of a complex number) is
             analyzed and quantified. The analysis and simulation results
             demonstrate that while all considered algorithms can be used
             with coarse quantization of the \arg function, the LS
             algorithm is least affected and the SC algorithm is most
             affected by this quantization error. © 2002-2012
             IEEE.},
   Doi = {10.1109/TWC.2013.012413.120087},
   Key = {fds336691}
}

@article{fds336693,
   Author = {Babadi, B and Tarokh, V},
   Title = {Spectral distribution of product of pseudorandom matrices
             formed from binary block codes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {59},
   Number = {2},
   Pages = {970-978},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TIT.2012.2223812},
   Abstract = {Let {\bf A} \in \{-1,1\}^{N-{a} \times n} and {\bf B} \in
             \{-1,1\}^{N-{b} \times n} be two matrices whose rows are
             drawn i.i.d. from the codewords of the binary codes {\cal
             C}a and {\cal C}b of length n and dual distances
             {d^{\prime}}a and {d^{\prime}}b, respectively, under the
             mapping 0 \mapsto 1 and 1 \mapsto -1. It is proven that as n
             \rightarrow \infty with y-{a}:=n/N-{a} \in (0,\infty) and
             y-{b}:=n/N-{b} \in (0, \infty) fixed, the empirical spectral
             distribution of the matrix {\bf A} {\bf B}^{\ast }/\sqrt
             {N-{a} N-{b}} resembles a universal distribution (closely
             related to the distribution function of the free
             multiplicative convolution of two members of the
             Marchenko-Pastur family of densities) in the sense of the
             Lévy distance, if the asymptotic dual distances of the
             underlying binary codes are large enough. Moreover, an
             explicit upper bound on the Lévy distance of the two
             distributions in terms of ya, yb, {d^{\prime}}a , and
             {d^{\prime}}b is given. Under mild conditions, the upper
             bound is strengthened to the Kolmogorov distance of the
             underlying distributions. Numerical studies on the empirical
             spectral distribution of the product of random matrices from
             BCH and Gold codes are provided, which verify the validity
             of this result. © 1963-2012 IEEE.},
   Doi = {10.1109/TIT.2012.2223812},
   Key = {fds336693}
}

@article{fds336695,
   Author = {Bechkit, W and Challal, Y and Bouabdallah, A and Tarokh,
             V},
   Title = {A highly scalable key pre-distribution scheme for wireless
             sensor networks},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {12},
   Number = {2},
   Pages = {948-959},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TWC.2012.010413.120732},
   Abstract = {Given the sensitivity of the potential WSN applications and
             because of resource limitations, key management emerges as a
             challenging issue for WSNs. One of the main concerns when
             designing a key management scheme is the network
             scalability. Indeed, the protocol should support a large
             number of nodes to enable a large scale deployment of the
             network. In this paper, we propose a new scalable key
             management scheme for WSNs which provides a good secure
             connectivity coverage. For this purpose, we make use of the
             unital design theory. We show that the basic mapping from
             unitals to key pre-distribution allows us to achieve high
             network scalability. Nonetheless, this naive mapping does
             not guarantee a high key sharing probability. Therefore, we
             propose an enhanced unital-based key pre-distribution scheme
             providing high network scalability and good key sharing
             probability approximately lower bounded by 1-e{-1} ≈
             0.632. We conduct approximate analysis and simulations and
             compare our solution to those of existing methods for
             different criteria such as storage overhead, network
             scalability, network connectivity, average secure path
             length and network resiliency. Our results show that the
             proposed approach enhances the network scalability while
             providing high secure connectivity coverage and overall
             improved performance. Moreover, for an equal network size,
             our solution reduces significantly the storage overhead
             compared to those of existing solutions. © 2012
             IEEE.},
   Doi = {10.1109/TWC.2012.010413.120732},
   Key = {fds336695}
}

@article{fds336694,
   Author = {Larsson, P and Smida, B and Koike-Akino, T and Tarokh,
             V},
   Title = {Analysis of network coded HARQ for multiple unicast
             flows},
   Journal = {Ieee Transactions on Communications},
   Volume = {61},
   Number = {2},
   Pages = {722-732},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCOMM.2012.121112.110202},
   Abstract = {In this paper, we consider network coded (NCed) Hybrid-ARQ
             (HARQ) for multiple unicast flows. The main contribution of
             the paper is the derivation of throughput expressions for
             NCed HARQ with arbitrary number of users in identical i.i.d.
             channels amid packets for all users. We apply the result to
             Rayleigh fading channels and two packet combining schemes:
             incremental redundancy (IR) and chase combining (CC). We
             verify the analytical results with simulations and observe
             substantial SNR improvements over NCed ARQ and HARQ. The SNR
             gains in the moderate/high and low throughput regimes are
             mainly due to network coding and packet combining,
             respectively. For low/moderate SNRs, NCed HARQ with IR
             surpasses the CC performance. In addition, we introduce a
             novel re-transmission strategy that makes the network coding
             more efficient at low SNR. © 1972-2012 IEEE.},
   Doi = {10.1109/TCOMM.2012.121112.110202},
   Key = {fds336694}
}

@article{fds336688,
   Author = {Kim, SJ and Kwon, UK and Yoon, SK and Tarokh, V},
   Title = {Near field resonator isolation system: Theory to
             implementation},
   Journal = {Ieee Transactions on Circuits and Systems I: Regular
             Papers},
   Volume = {60},
   Number = {5},
   Pages = {1175-1187},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCSI.2013.2246252},
   Abstract = {The absence of electromagnetic wave motivates various
             studies of new communication channels in near field regime.
             An approach studied here is based on resonant inductive
             coupling and the use of Resonator Isolation (RI) system. The
             main concept of the RI system is to physically isolate two
             inductively coupled resonators from the signal input/output
             components. The resonators are charged with initial energy,
             and communicate by exchanging this energy according to the
             fundamental phenomenon of electromagnetic theory. Analyzing
             the energy exchange phenomenon, this paper presents two
             corresponding communication channel models for the RI
             system. Based on these channel models, the system
             architecture of the RI system is implemented at a chip level
             which consists of three components: resonator, analog
             switch, and digital process. © 2004-2012
             IEEE.},
   Doi = {10.1109/TCSI.2013.2246252},
   Key = {fds336688}
}

@article{fds336692,
   Author = {Jalaleddini, K and Moezzi, K and Aghdam, AG and Alasti, M and Tarokh,
             V},
   Title = {Rate assignment in wireless networks: Stability analysis and
             controller design},
   Journal = {Ieee Transactions on Control Systems Technology},
   Volume = {21},
   Number = {2},
   Pages = {521-529},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCST.2011.2181975},
   Abstract = {In this brief, data-rate assignment in IS-856 uplink
             (reverse link) is studied. The problem is first formulated
             using an interference model, and then a dynamic control
             strategy is developed for efficient rate assignment. In the
             first step, the controller is designed for the special case
             when the number of users in the network is fixed. Then, the
             designed controller is further developed for a dynamic
             network (where the number of users is subject to change) to
             achieve the desired performance. To this end, the network is
             formulated in the framework of switched systems, where any
             new activation or deactivation of users is considered as
             switching from one system to another. The controllers
             obtained are then modified properly to retain network
             stability and performance in the presence of time-delay.
             Simulation results are presented to elucidate the
             effectiveness of the proposed approach. © 2012
             IEEE.},
   Doi = {10.1109/TCST.2011.2181975},
   Key = {fds336692}
}

@article{fds336696,
   Author = {Sabbaghian, M and Sulyman, AI and Tarokh, V},
   Title = {Capacity analysis for Gaussian channels with memoryless
             nonlinear hardware},
   Journal = {Ieee International Conference on Communications},
   Pages = {3403-3407},
   Publisher = {IEEE},
   Year = {2013},
   Month = {January},
   ISBN = {9781467331227},
   url = {http://dx.doi.org/10.1109/ICC.2013.6655074},
   Abstract = {This paper presents the analysis of the impact of circuit
             nonlinearities on the transmission rate of a communication
             system. We consider a general transmission model that
             includes transmitter- and receiver-side nonlinearities,
             environmental thermal noise and receiver chain noise. Using
             this model we establish lower and upper bounds for the
             capacity of nonlinear additive white Gaussian noise channels
             in various thermal noise and receiver noise regimes. © 2013
             IEEE.},
   Doi = {10.1109/ICC.2013.6655074},
   Key = {fds336696}
}

@article{fds336697,
   Author = {Nam, S and Akçakaya, M and Basha, T and Stehning, C and Manning, WJ and Tarokh, V and Nezafat, R},
   Title = {Compressed sensing reconstruction for whole-heart imaging
             with 3D radial trajectories: a graphics processing unit
             implementation.},
   Journal = {Magnetic Resonance in Medicine},
   Volume = {69},
   Number = {1},
   Pages = {91-102},
   Year = {2013},
   Month = {January},
   url = {http://dx.doi.org/10.1002/mrm.24234},
   Abstract = {A disadvantage of three-dimensional (3D) isotropic
             acquisition in whole-heart coronary MRI is the prolonged
             data acquisition time. Isotropic 3D radial trajectories
             allow undersampling of k-space data in all three spatial
             dimensions, enabling accelerated acquisition of the
             volumetric data. Compressed sensing (CS) reconstruction can
             provide further acceleration in the acquisition by removing
             the incoherent artifacts due to undersampling and improving
             the image quality. However, the heavy computational overhead
             of the CS reconstruction has been a limiting factor for its
             application. In this article, a parallelized implementation
             of an iterative CS reconstruction method for 3D radial
             acquisitions using a commercial graphics processing unit is
             presented. The execution time of the graphics processing
             unit-implemented CS reconstruction was compared with that of
             the C++ implementation, and the efficacy of the undersampled
             3D radial acquisition with CS reconstruction was
             investigated in both phantom and whole-heart coronary data
             sets. Subsequently, the efficacy of CS in suppressing
             streaking artifacts in 3D whole-heart coronary MRI with 3D
             radial imaging and its convergence properties were studied.
             The CS reconstruction provides improved image quality (in
             terms of vessel sharpness and suppression of noise-like
             artifacts) compared with the conventional 3D gridding
             algorithm, and the graphics processing unit implementation
             greatly reduces the execution time of CS reconstruction
             yielding 34-54 times speed-up compared with C++
             implementation.},
   Doi = {10.1002/mrm.24234},
   Key = {fds336697}
}

@article{fds340011,
   Author = {Sulyman, AI and Al-Zahrani, Y and Al-Dosari, S and Tarokh, V and Al-Shebeili, S and Al-Sanie, A},
   Title = {Two-stage constellation partition algorithm for
             reduced-complexity multiple-input multiple-output–maximum-likelihood
             detection systems},
   Journal = {Iet Communications},
   Volume = {6},
   Number = {18},
   Pages = {3350-3357},
   Publisher = {Institution of Engineering and Technology
             (IET)},
   Year = {2012},
   Month = {December},
   url = {http://dx.doi.org/10.1049/iet-com.2012.0173},
   Doi = {10.1049/iet-com.2012.0173},
   Key = {fds340011}
}

@article{fds336698,
   Author = {Nadimi, ES and Blanes-Vidal, V and Tarokh, V},
   Title = {Semidefinite programming-based localization algorithm in
             networks with inhomogeneous media},
   Journal = {Proceeding of the 2012 Acm Research in Applied Computation
             Symposium, Racs 2012},
   Pages = {191-196},
   Publisher = {ACM Press},
   Year = {2012},
   Month = {December},
   ISBN = {9781450314923},
   url = {http://dx.doi.org/10.1145/2401603.2401647},
   Abstract = {In this paper, we study the asymptotic properties of a
             semidefinite programming (SDP) based localization algorithm
             in a network with inhomogeneous RF transmission medium given
             incomplete and inaccurate pairwise distance measurements
             between sensorssensors and sensors-anchors. We proposed a
             novel relaxed SDP approach based on a graph realization
             problem with noisy timeof- arrival (TOA) measurements with
             additive Gaussian noise and inaccurate transmission
             permittivity and permeability coefficients both with
             additive standard Gaussian noise (varying dielectric
             constant). Modeling the inhomogeneous RF transmission medium
             as a series of homogeneous transmission mediums between any
             two given points and given the true distances between a pair
             of sensors and the set of known pair-wise distances between
             sensorssensors and sensors-anchors, an upper bound for the
             expected value of the optimal objective relaxed SDP problem
             is obtained, showing that its asymptotic properties
             potentially grows as fast as the summation of true distances
             between the pair of sensorssensors and sensor-anchors and
             the TOA noisy measurements mean and standard deviation.
             Copyright 2012 ACM.},
   Doi = {10.1145/2401603.2401647},
   Key = {fds336698}
}

@article{fds336699,
   Author = {Ishibashi, K and Ochiai, H and Tarokh, V},
   Title = {Energy harvesting cooperative communications},
   Journal = {Ieee International Symposium on Personal, Indoor and Mobile
             Radio Communications, Pimrc},
   Pages = {1819-1823},
   Publisher = {IEEE},
   Year = {2012},
   Month = {December},
   ISBN = {9781467325691},
   url = {http://dx.doi.org/10.1109/PIMRC.2012.6362646},
   Abstract = {In this paper, we propose a new cooperative wireless
             transmission in a scenario where the source salvages the
             energy during the relay's transmission considering the fact
             that the source does not need to retrieve the transmitted
             message. We also evaluate a direct wireless transmission
             with wireless energy transfer as a reference. We analyze the
             performance of these transmission techniques in terms of
             outage probability. Our analytical results reveal the
             advantage of energy salvage in combination with spatial
             diversity over the direct transmission even if the energy
             transfer efficiency is considerably low. © 2012
             IEEE.},
   Doi = {10.1109/PIMRC.2012.6362646},
   Key = {fds336699}
}

@article{fds336700,
   Author = {Fan, P and Panayirci, E and Li, P and Wang, C and Tarokh,
             V},
   Title = {Guest editorial: Special issue on high mobility wireless
             communications},
   Journal = {Journal of Modern Transportation},
   Volume = {20},
   Number = {4},
   Pages = {197-198},
   Year = {2012},
   Month = {December},
   url = {http://dx.doi.org/10.3969/j.issn.2095-087X.2012.04.001},
   Doi = {10.3969/j.issn.2095-087X.2012.04.001},
   Key = {fds336700}
}

@article{fds336702,
   Author = {Nadimi, ES and Tarokh, V},
   Title = {Bayesian source localization in networks with heterogeneous
             transmission medium},
   Journal = {Navigation},
   Volume = {59},
   Number = {3},
   Pages = {163-175},
   Publisher = {WILEY},
   Year = {2012},
   Month = {September},
   url = {http://dx.doi.org/10.1002/navi.13},
   Abstract = {Precise positioning and tracking information in networks
             with a heterogeneous transmission medium presents a novel
             networking paradigm. Most of the localization algorithms are
             vulnerable to the variations of signal propagation speed,
             dielectric constant, and path-loss coefficient resulting in
             unreliable location estimation. In this paper, we propose a
             novel robust probabilistic Bayesian-based approach using
             received-signal-strength (RSS) measurements with varying
             path-loss exponent in wireless networks with heterogeneous
             medium. An application of such a localization method is
             relative positioning of nodes in a wireless network with a
             heterogeneous medium such as gastrointestinal tract
             monitoring using wireless video capsule endoscopy. The
             results of this study showed that the localization root mean
             square error (RMSE) of our Bayesian-based method when a
             sensor node was covered by four anchors was 1.0 mm which is
             smaller than that of other existing localization approaches
             under the same conditions such as classical MDS (43.1 mm),
             dwMDS (24.7 mm), MLE (21.8 mm) and POCS (1.7 mm). Copyright
             © 2012 Institute of Navigation.},
   Doi = {10.1002/navi.13},
   Key = {fds336702}
}

@article{fds336701,
   Author = {Chae, CB and Hwang, I and Heath, RW and Tarokh, V},
   Title = {Interference aware-coordinated beamforming in a multi-cell
             system},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {11},
   Number = {10},
   Pages = {3692-3703},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2012},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TWC.2012.081312.112119},
   Abstract = {In this paper, we propose jointly optimized linear
             transceiver algorithms called interference aware-coordinated
             beamforming (IA-CBF) for a two-cell system where each base
             station is equipped with multiple transmit antennas. To
             generalize IA-CBF to more than two-cell scenarios, a new
             beam-switching mechanism combined with IA-CBF is proposed.
             For a two-cell system, we derive a minimum-mean-square-error-type
             IA-CBF algorithm based on a lower bound on the achievable
             sum rate. We propose optimal (under an assumption of zero
             other-cell interference) and suboptimal transmit/receive
             beamforming vectors through zero-forcing IA-CBF algorithms.
             We also investigate the optimality of the proposed IA-CBF
             algorithms with respect to the number of receive antennas.
             Numerical results confirm that the proposed system with two
             transmit/receive antennas achieves the full degrees of
             freedom (a.k.a. multiplexing gain) of the two-cell
             multiple-input multiple-output channel while showing a
             better sum rate performance than competitive solutions such
             as non-cooperative eigen-beamforming and interference
             nulling. A three-dimensional ray tracing tool is also used
             to evaluate the proposed multi-cell IA-CBF algorithm. ©
             2002-2012 IEEE.},
   Doi = {10.1109/TWC.2012.081312.112119},
   Key = {fds336701}
}

@article{fds336703,
   Author = {Cho, S and Hwang, I and Tarokh, V and You, C},
   Title = {A practical transmit beamforming strategy for closed-loop
             MIMO communication},
   Journal = {International Journal of Communication Systems},
   Volume = {25},
   Number = {8},
   Pages = {1091-1099},
   Publisher = {WILEY},
   Year = {2012},
   Month = {August},
   url = {http://dx.doi.org/10.1002/dac.1310},
   Abstract = {A new beamforming strategy is proposed for multiuser systems
             with N transmit antennas at the transmitter and M ≤ N
             single antenna receivers. The proposed scheme remarkably
             improves on the classical spatial division multiple access,
             and achieves the same data rates as spatial multiplexing for
             all users but with significantly superior
             performance/diversity gain. When compared with the Bell labs
             layered space-time system, the symbol rate is the same and
             the performance is much superior because of the presence of
             diversity gain. In addition, unlike the Bell labs layered
             space-time system, the receivers do not need to know each
             other's vector channels. Finally, the proposed algorithm is
             based on dirty-paper coding, but does not require much
             complexity and is implementable. Copyright © 2011 John
             Wiley & Sons, Ltd.},
   Doi = {10.1002/dac.1310},
   Key = {fds336703}
}

@article{fds336704,
   Author = {Mercier, H and Tarokh, V and Labeau, F},
   Title = {Bounds on the capacity of discrete memoryless channels
             corrupted by synchronization and substitution
             errors},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {58},
   Number = {7},
   Pages = {4306-4330},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2012},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TIT.2012.2191682},
   Abstract = {We study the capacity of discrete memoryless channels with
             synchronization errors and additive noise. We first show
             that with very large alphabets, their capacity can be
             achieved by independent and identically distributed input
             sources, and establish proven tight lower and upper capacity
             bounds. We also derive tight numerical capacity bounds for
             channels where the synchronization between the input and
             output is partly preserved, for instance using incorruptible
             synchronization markers. Such channels include channels with
             duplication errors, channels that only insert or delete
             zeros, and channels with bitshift errors studied in magnetic
             recording. Channels with small alphabets and corrupted by
             synchronization errors have an infinite memory. Revisiting
             the theoretical work of Dobrushin and adapting techniques
             used to compute capacity bounds for finite-state
             source/channel models, we compute improved numerical
             capacity lower bounds for discrete memoryless channels with
             small alphabets, synchronization errors, and memoryless
             noise. An interesting and somewhat surprising result is that
             as long as the input sequences are not completely deleted,
             the capacity of channels corrupted by discrete timing errors
             is always nonzero even if all the symbols are corrupted. ©
             2012 IEEE.},
   Doi = {10.1109/TIT.2012.2191682},
   Key = {fds336704}
}

@article{fds336705,
   Author = {Babadi, B and Tarokh, V},
   Title = {Vertical spectrum sharing via distributed asynchronous
             interference avoidance in cognitive radio
             networks},
   Journal = {2012 Ieee Consumer Communications and Networking Conference,
             Ccnc'2012},
   Pages = {869-873},
   Publisher = {IEEE},
   Year = {2012},
   Month = {May},
   ISBN = {9781457720710},
   url = {http://dx.doi.org/10.1109/CCNC.2012.6181181},
   Abstract = {In this paper, we study the problem of distributed spectrum
             allocation under a vertical spectrum sharing scenario in a
             cognitive radio network. The secondary users share the
             spectrum licensed to the primary user by observing the
             activity statistics of the primary users, and regulate their
             transmission strategy in order to abide by the spectrum
             sharing etiquette. When the primary user is inactive in a
             subset of the available frequency bands, the secondary users
             share the spectrum using the recently proposed GADIA
             algorithm [1]. In this paper, we present analytical and
             numerical results on the performance of the GADIA algorithm
             in conjunction with the above-mentioned vertical spectrum
             sharing scenario. These results reveal near-optimal
             performance guarantees for the overall vertical spectrum
             sharing scenario. © 2012 IEEE.},
   Doi = {10.1109/CCNC.2012.6181181},
   Key = {fds336705}
}

@article{fds336706,
   Author = {Babadi, B and McKinney, SM and Tarokh, V and Ellenbogen,
             JM},
   Title = {DiBa: a data-driven Bayesian algorithm for sleep spindle
             detection.},
   Journal = {Ieee Transactions on Bio Medical Engineering},
   Volume = {59},
   Number = {2},
   Pages = {483-493},
   Year = {2012},
   Month = {February},
   url = {http://dx.doi.org/10.1109/tbme.2011.2175225},
   Abstract = {Although the spontaneous brain rhythms of sleep have
             commanded much recent interest, their detection and analysis
             remains suboptimal. In this paper, we develop a data-driven
             Bayesian algorithm for sleep spindle detection on the
             electroencephalography (EEG). The algorithm exploits the
             Karhunen-Loève transform and Bayesian hypothesis testing to
             produce the instantaneous probability of a spindle's
             presence with maximal resolution. In addition to possessing
             flexibility, transparency, and scalability, this algorithm
             could perform at levels superior to standard methods for EEG
             event detection.},
   Doi = {10.1109/tbme.2011.2175225},
   Key = {fds336706}
}

@article{fds340012,
   Author = {Babadi, B and McKinney, S and Tarokh, V and Ellenbogen,
             JM},
   Title = {A DATA-DRIVEN BAYESIAN ALGORITHM FOR SLEEP SPINDLE
             DETECTION},
   Journal = {Sleep},
   Volume = {35},
   Pages = {A134-A134},
   Publisher = {OXFORD UNIV PRESS INC},
   Year = {2012},
   Month = {January},
   Key = {fds340012}
}

@article{fds336707,
   Author = {Babadi, B and Tarokh, V},
   Title = {Distributed dynamic spectrum allocation for secondary users
             in a vertical spectrum sharing scenario},
   Journal = {Ieice Transactions on Communications},
   Volume = {E95-B},
   Number = {4},
   Pages = {1044-1055},
   Publisher = {Institute of Electronics, Information and Communications
             Engineers (IEICE)},
   Year = {2012},
   Month = {January},
   url = {http://dx.doi.org/10.1587/transcom.E95.B.1044},
   Abstract = {In this paper, we study the problem of distributed spectrum
             allocation under a vertical spectrum sharing scenario in a
             cognitive radio network. The secondary users share the
             spectrum licensed to the primary user by observing the
             activity statistics of the primary users, and regulate their
             transmission strategy in order to abide by the spectrum
             sharing etiquette. When the primary user is inactive in a
             subset of the available frequency bands, from the
             perspective of the secondary users the problem reduces to a
             distributed horizontal spectrum sharing. For a specific
             class of networks, the latter problem is addressed by the
             recently proposed GADIA algorithm [1]. In this paper, we
             present analytical and numerical results on the performance
             of the GADIA algorithm in conjunction with the
             abovementioned vertical spectrum sharing scenario. These
             results reveal nearoptimal performance guarantees for the
             overall vertical spectrum sharing scenario. © 2012 The
             Institute of Electronics, Information and Communication
             Engineers.},
   Doi = {10.1587/transcom.E95.B.1044},
   Key = {fds336707}
}

@article{fds340013,
   Author = {Sharma, A and Dey, S},
   Title = {A comparative study of feature selection and machine
             learning techniques for sentiment analysis.},
   Journal = {Racs},
   Pages = {1-7},
   Publisher = {ACM},
   Editor = {Cho, Y and Gantenbein, RE and Kuo, T-W and Tarokh,
             V},
   Year = {2012},
   ISBN = {978-1-4503-1492-3},
   Key = {fds340013}
}

@article{fds336713,
   Author = {Nadimi, ES and Blanes-Vidal, V and Tarokh, V},
   Title = {Localization of mobile nodes based on inaccurate
             round-trip-time measurements using Bayesian
             inference},
   Journal = {Proceedings of the 2011 Acm Research in Applied Computation
             Symposium, Racs 2011},
   Pages = {152-157},
   Publisher = {ACM Press},
   Year = {2011},
   Month = {December},
   ISBN = {9781450310871},
   url = {http://dx.doi.org/10.1145/2103380.2103412},
   Abstract = {In this paper, we present a Bayesian-based localization
             method to estimate the unknown location of a mobile station
             (MS) in a network given the known location of a set of base
             stations. In this study, the MS was covered by a base
             station if the signal to interference and noise ratio (SINR)
             was larger than a threshold. By assuming a priori knowledge
             of the location of the MS and a Gaussian distribution for
             the round-trip time (RTT) measurements, a posteriori
             estimation of the unknown location of the MS using Bayesian
             inference method was obtained. The impact of variation of
             various variables on the localization accuracy such as
             number of base stations covering the MS, number of base
             stations interfering with the communication between the MS
             and the covering base stations, fading factor between base
             stations and the MS, SINR threshold and the path-loss
             coefficient have been studied. In addition, the performance
             of the developed Bayesian-based method in terms of
             localization accuracy was evaluated when the MS was inside
             and outside the convex hull of the base stations. The
             results of this study showed an improvement in the mean
             localization error and the localization root mean square
             error (RMSE) compared to other similar studies. © 2011
             ACM.},
   Doi = {10.1145/2103380.2103412},
   Key = {fds336713}
}

@article{fds336714,
   Author = {Shin, WY and Lucani, DE and Médard, M and Stojanovic, M and Tarokh,
             V},
   Title = {Information-theoretic limits of dense underwater
             networks},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Pages = {1835-1839},
   Publisher = {IEEE},
   Year = {2011},
   Month = {December},
   ISBN = {9781467303231},
   url = {http://dx.doi.org/10.1109/ACSSC.2011.6190340},
   Abstract = {Information-theoretic throughput scaling laws are analyzed
             in an underwater acoustic network with n regularly located
             nodes on a unit square, in which both bandwidth and received
             signal power can be severely limited. A narrow-band model is
             assumed where the carrier frequency is allowed to scale as a
             function of n. We first characterize an attenuation
             parameter that depends on the frequency scaling as well as
             the transmission distance. In the dense network having unit
             area, a cut-set upper bound on the capacity scaling is then
             derived. We show that there exists either a bandwidth or a
             power limitation, or both, according to the path-loss
             attenuation regimes, thus yielding the upper bound that has
             three fundamentally different operating regimes. In the
             dense network, we also describe an achievable scheme based
             on the simple nearest-neighbor multi-hop transmission. The
             operating regimes that guarantee the order optimality are
             identified, where frequency scaling is instrumental towards
             achieving the order optimality in the regimes. © 2011
             IEEE.},
   Doi = {10.1109/ACSSC.2011.6190340},
   Key = {fds336714}
}

@article{fds336715,
   Author = {Sabbaghian, M and Kwak, Y and Tarokh, V},
   Title = {New codes from dual BCH codes with applications in Low PAPR
             OFDM},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {10},
   Number = {12},
   Pages = {3990-3994},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {December},
   url = {http://dx.doi.org/10.1109/TWC.2011.100611.101388},
   Abstract = {Dual Bose-Ray-Chaudhuri (BCH) codes, despite their favorable
             peak to average power ratio (PAPR) properties, have not been
             used in coded orthogonal frequency division multiplexing
             (OFDM) systems. This is due to unavailability of a practical
             decoder and large performance gap to the Shannon limit. In
             this paper, we propose an advanced approach to solve the
             aforementioned problems. We construct a new code with
             favorable PAPR properties based on dual BCH codes and
             develop the associated maximum a posteriori (MAP) decoding
             algorithm. By exploiting this code as the frequency domain
             constituent code in a time-frequency turbo structure, we
             reduce the gap between the performance and Shannon limit
             while the bounded PAPR of OFDM symbols is guaranteed. By
             comparative performance evaluation we illustrate that the
             performance of this system is comparable with that of
             capacity approaching codes while it has 7 dB lower PAPR. ©
             2011 IEEE.},
   Doi = {10.1109/TWC.2011.100611.101388},
   Key = {fds336715}
}

@article{fds336716,
   Author = {Moghari, MH and Akçakaya, M and O'Connor, A and Basha, TA and Casanova,
             M and Stanton, D and Goepfert, L and Kissinger, KV and Goddu, B and Chuang,
             ML and Tarokh, V and Manning, WJ and Nezafat, R},
   Title = {Compressed-sensing motion compensation (CosMo): a joint
             prospective-retrospective respiratory navigator for coronary
             MRI.},
   Journal = {Magnetic Resonance in Medicine},
   Volume = {66},
   Number = {6},
   Pages = {1674-1681},
   Year = {2011},
   Month = {December},
   url = {http://dx.doi.org/10.1002/mrm.22950},
   Abstract = {Prospective right hemidiaphragm navigator (NAV) is commonly
             used in free-breathing coronary MRI. The NAV results in an
             increase in acquisition time to allow for resampling of the
             motion-corrupted k-space data. In this study, we are
             presenting a joint prospective-retrospective NAV motion
             compensation algorithm called compressed-sensing motion
             compensation (CosMo). The inner k-space region is acquired
             using a prospective NAV; for the outer k-space, a NAV is
             only used to reject the motion-corrupted data without
             reacquiring them. Subsequently, those unfilled k-space lines
             are retrospectively estimated using compressed sensing
             reconstruction. We imaged right coronary artery in nine
             healthy adult subjects. An undersampling probability map and
             sidelobe-to-peak ratio were calculated to study the pattern
             of undersampling, generated by NAV. Right coronary artery
             images were then retrospectively reconstructed using
             compressed-sensing motion compensation for gating windows
             between 3 and 10 mm and compared with the ones fully
             acquired within the gating windows. Qualitative imaging
             score and quantitative vessel sharpness were calculated for
             each reconstruction. The probability map and
             sidelobe-to-peak ratio show that the NAV generates a random
             undersampling k-space pattern. There were no statistically
             significant differences between the vessel sharpness and
             subjective score of the two reconstructions.
             Compressed-sensing motion compensation could be an
             alternative motion compensation technique for free-breathing
             coronary MRI that can be used to reduce scan
             time.},
   Doi = {10.1002/mrm.22950},
   Key = {fds336716}
}

@article{fds336708,
   Author = {Babadi, B and Tarokh, V},
   Title = {Spectral distribution of the product of two random matrices
             based on binary block codes},
   Journal = {2011 49th Annual Allerton Conference on Communication,
             Control, and Computing, Allerton 2011},
   Pages = {917-919},
   Publisher = {IEEE},
   Year = {2011},
   Month = {December},
   ISBN = {9781457718168},
   url = {http://dx.doi.org/10.1109/Allerton.2011.6120264},
   Abstract = {In this paper, we study the spectral distribution of the
             product of two random matrices based on binary block codes,
             and prove that if the dual distances of the underlying codes
             are large enough, the asymptotic spectral distribution will
             be close to a deterministic limit in the sense of Lévy
             distance. These results extend our previous work on this
             topic, and strengthen its applications to joint randomness
             testing. © 2011 IEEE.},
   Doi = {10.1109/Allerton.2011.6120264},
   Key = {fds336708}
}

@article{fds336709,
   Author = {Chae, CB and Hwang, I and Heath, RW and Tarokh, V},
   Title = {Jointly optimized two-cell MIMO systems},
   Journal = {2011 Ieee Globecom Workshops, Gc Wkshps 2011},
   Pages = {421-425},
   Publisher = {IEEE},
   Year = {2011},
   Month = {December},
   ISBN = {9781467300407},
   url = {http://dx.doi.org/10.1109/GLOCOMW.2011.6162484},
   Abstract = {Jointly optimized interference aware coordinated beamforming
             (IA-CBF) algorithms for a two-cell system are investigated,
             where each base/mobile station is equipped with multiple
             transmit antennas. We first derive a minimum-mean-square-error
             IA-CBF algorithm based on a lower bound on the achievable
             sum rate. We next propose optimal (under an assumption of
             zero other-cell interference) and suboptimal
             transmit/receive beamforming vectors through zero-forcing
             IA-CBF algorithms. Numerical results confirm that the
             proposed system shows better sum rate performance than
             competitive solutions such as non-cooperative
             eigen-beamforming and interference nulling. © 2011
             IEEE.},
   Doi = {10.1109/GLOCOMW.2011.6162484},
   Key = {fds336709}
}

@article{fds336710,
   Author = {Babadi, B and Tarokh, V},
   Title = {Regularized recursive least squares for anomaly detection in
             sparse channel tracking applications},
   Journal = {Proceedings of the 2011 Acm Research in Applied Computation
             Symposium, Racs 2011},
   Pages = {277-281},
   Publisher = {ACM Press},
   Year = {2011},
   Month = {December},
   ISBN = {9781450310871},
   url = {http://dx.doi.org/10.1145/2103380.2103437},
   Abstract = {In this paper, we study the problem of anomaly detection in
             sparse channel tracking applications via the l 1-regularized
             least squares adaptive filter (SPARLS). Anomalies arise due
             to unexpected adversarial changes in the channel and quick
             detection of these anomalies is desired. We first prove
             analytically that the prediction error of the SPARLS
             algorithm can be substantially lower than that of the
             widely-used Recursive Least Squares (RLS) algorithm.
             Furthermore, we present Receiver Operating Characteristic
             (ROC) curves for the detection/false alarm trade-off of
             anomaly detection in a sparse multi-path fading channel
             tracking scenario. These curves reveal the considerable
             advantage of the SPARLS algorithm over the RLS algorithm. ©
             2011 ACM.},
   Doi = {10.1145/2103380.2103437},
   Key = {fds336710}
}

@article{fds336711,
   Author = {Krishnamurthy, S and Bliss, DW and Tarokh, V},
   Title = {Sidelobe level distribution computation for antenna arrays
             with arbitrary element distributions},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Pages = {2045-2050},
   Year = {2011},
   Month = {December},
   ISBN = {9781467303231},
   url = {http://dx.doi.org/10.1109/ACSSC.2011.6190386},
   Abstract = {This paper discusses the conditions in which the sidelobe
             level distribution can be calculated in closed form for
             arrays with randomly located antenna elements with arbitrary
             element probability distributions. By using the number of
             times a beampattern crosses a certain level in an upward
             direction, sidelobe level distributions are found for
             beampatterns with angle-dependent and angle-independent
             statistics. The evaluation of the probability of exceeding a
             given peak sidelobe is investigated as a function of the
             antenna array spatial position variance in the asymptotic
             limit of a large number of antennas. Examples are presented
             including a multi-input multi-output (MIMO) radar
             illustration. © 2011 IEEE.},
   Doi = {10.1109/ACSSC.2011.6190386},
   Key = {fds336711}
}

@article{fds336712,
   Author = {Kim, KT and Noh, W and Tarokh, V},
   Title = {Robust scalable physical layer network coding},
   Journal = {2011 49th Annual Allerton Conference on Communication,
             Control, and Computing, Allerton 2011},
   Pages = {1446-1453},
   Publisher = {IEEE},
   Year = {2011},
   Month = {December},
   ISBN = {9781457718168},
   url = {http://dx.doi.org/10.1109/Allerton.2011.6120338},
   Abstract = {We present a new method of physical layer network coding
             that transforms the received signal at a relay node before
             re-transmission by eliminating the unreliable components of
             the signal. This approach improves the physical layer
             network coding performance, since only reliable components
             of the signal are amplified and retransmitted. It also lends
             itself to a robust and scalable implementation. Simulation
             results show that the proposed robust scalable physical
             layer network coding can provide 1 - 2[dB] and 4 - 14 [dB]
             more coding gain than analog network coding and algebraic
             network coding schemes in a multilayer wireless network,
             respectively, and performs more reliably in a network where
             there is more noise to remove. © 2011 IEEE.},
   Doi = {10.1109/Allerton.2011.6120338},
   Key = {fds336712}
}

@article{fds336718,
   Author = {Akçakaya, M and Park, J and Tarokh, V},
   Title = {A coding theory approach to noisy compressive sensing using
             low density frames},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {59},
   Number = {11},
   Pages = {5369-5379},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TSP.2011.2163402},
   Abstract = {We consider the compressive sensing of a sparse or
             compressible signal x ∈ R M. We explicitly construct a
             class of measurement matrices inspired by coding theory,
             referred to as low density frames, and develop decoding
             algorithms that produce an accurate estimate x̂ even in the
             presence of additive noise. Low density frames are sparse
             matrices and have small storage requirements. Our decoding
             algorithms can be implemented in O(Md2u) complexity, where
             dv is the left degree of the underlying bipartite graph.
             Simulation results are provided, demonstrating that our
             approach outperforms state-of-the-art recovery algorithms
             for numerous cases of interest. In particular, for Gaussian
             sparse signals and Gaussian noise, we are within 2-dB range
             of the theoretical lower bound in most cases. © 2011
             IEEE.},
   Doi = {10.1109/TSP.2011.2163402},
   Key = {fds336718}
}

@article{fds336719,
   Author = {Bai, D and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Beam selection gain versus antenna selection
             gain},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {57},
   Number = {10},
   Pages = {6603-6618},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TIT.2011.2165814},
   Abstract = {We consider beam selection using a fixed beamforming network
             (FBN) at a base station with M array antennas. In our
             setting, a Butler matrix is deployed at the RF stage to form
             M beams, and then the best beam is selected for
             transmission. We introduce some properties of the noncentral
             chi-square distribution and prove the resulting properties
             of the beam selection gain verifying that beam selection is
             superior to antenna selection in Rician channels with any
             K-factors. Furthermore, we find asymptotically tight
             stochastic bounds of the beam selection gain, which yield
             approximate closed form expressions of the expected
             selection gain and the ergodic capacity. Beam selection has
             the order of growth of the ergodic capacity Θ (log (log M))
             regardless of user location in contrast to Θ (log (log M))
             for antenna selection. © 2011 IEEE.},
   Doi = {10.1109/TIT.2011.2165814},
   Key = {fds336719}
}

@article{fds336720,
   Author = {Kim, SJ and Devroye, N and Mitran, P and Tarokh, V},
   Title = {Achievable rate regions and performance comparison of half
             duplex bi-directional relaying protocols},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {57},
   Number = {10},
   Pages = {6405-6418},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TIT.2011.2165132},
   Abstract = {In a bi-directional relay channel, two nodes wish to
             exchange independent messages over a shared wireless
             half-duplex channel with the help of a relay. In this paper,
             we derive achievable rate regions for four new half-duplex
             protocols and compare these to four existing half-duplex
             protocols and outer bounds. In time, our protocols consist
             of either two or three phases. In the two phase protocols,
             both users simultaneously transmit during the first phase
             and the relay alone transmits during the second phase, while
             in the three phase protocol the two users sequentially
             transmit followed by a transmission from the relay. The
             relay may forward information in one of four manners; we
             outline existing amplify and forward (AF), decode and
             forward (DF), lattice based, and compress and forward (CF)
             relaying schemes and introduce the novel mixed forward
             scheme. The latter is a combination of CF in one direction
             and DF in the other. We derive achievable rate regions for
             the CF and Mixed relaying schemes for the two and three
             phase protocols. We provide a comprehensive treatment of
             eight possible half-duplex bi-directional relaying protocols
             in Gaussian noise, obtaining their relative performance
             under different SNR and relay geometries. © 2011
             IEEE.},
   Doi = {10.1109/TIT.2011.2165132},
   Key = {fds336720}
}

@article{fds336721,
   Author = {Mileounis, G and Kalouptsidis, N and Babadi, B and Tarokh,
             V},
   Title = {Blind identification of sparse channels and symbol detection
             via the em algorithm},
   Journal = {17th Dsp 2011 International Conference on Digital Signal
             Processing, Proceedings},
   Publisher = {IEEE},
   Year = {2011},
   Month = {September},
   ISBN = {9781457702747},
   url = {http://dx.doi.org/10.1109/ICDSP.2011.6004920},
   Abstract = {In this paper, we address the problem of blind
             identification of sparse channels. For this purpose, the
             Expectation-Maximization is modified to accommodate channel
             sparsity. The resulting algorithm is applicable for linear
             and nonlinear channels. Computer simulations on various
             channel set ups illustrate that the proposed algorithm
             achieves performance close to the genie-aided estimator. ©
             2011 IEEE.},
   Doi = {10.1109/ICDSP.2011.6004920},
   Key = {fds336721}
}

@article{fds336722,
   Author = {Akçakaya, M and Basha, TA and Goddu, B and Goepfert, LA and Kissinger,
             KV and Tarokh, V and Manning, WJ and Nezafat, R},
   Title = {Low-dimensional-structure self-learning and thresholding:
             regularization beyond compressed sensing for MRI
             reconstruction.},
   Journal = {Magnetic Resonance in Medicine},
   Volume = {66},
   Number = {3},
   Pages = {756-767},
   Year = {2011},
   Month = {September},
   url = {http://dx.doi.org/10.1002/mrm.22841},
   Abstract = {An improved image reconstruction method from undersampled
             k-space data, low-dimensional-structure self-learning and
             thresholding (LOST), which utilizes the structure from the
             underlying image is presented. A low-resolution image from
             the fully sampled k-space center is reconstructed to learn
             image patches of similar anatomical characteristics. These
             patches are arranged into "similarity clusters," which are
             subsequently processed for dealiasing and artifact removal,
             using underlying low-dimensional properties. The efficacy of
             the proposed method in scan time reduction was assessed in a
             pilot coronary MRI study. Initially, in a retrospective
             study on 10 healthy adult subjects, we evaluated
             retrospective undersampling and reconstruction using LOST,
             wavelet-based l(1)-norm minimization, and total variation
             compressed sensing. Quantitative measures of vessel
             sharpness and mean square error, and qualitative image
             scores were used to compare reconstruction for rates of 2,
             3, and 4. Subsequently, in a prospective study, coronary MRI
             data were acquired using these rates, and LOST-reconstructed
             images were compared with an accelerated data acquisition
             using uniform undersampling and sensitivity encoding
             reconstruction. Subjective image quality and sharpness data
             indicate that LOST outperforms the alternative techniques
             for all rates. The prospective LOST yields images with
             superior quality compared with sensitivity encoding or
             l(1)-minimization compressed sensing. The proposed LOST
             technique greatly improves image reconstruction for
             accelerated coronary MRI acquisitions.},
   Doi = {10.1002/mrm.22841},
   Key = {fds336722}
}

@article{fds336723,
   Author = {Kalouptsidis, N and Mileounis, G and Babadi, B and Tarokh,
             V},
   Title = {Adaptive algorithms for sparse system identification},
   Journal = {Signal Processing},
   Volume = {91},
   Number = {8},
   Pages = {1910-1919},
   Publisher = {Elsevier BV},
   Year = {2011},
   Month = {August},
   url = {http://dx.doi.org/10.1016/j.sigpro.2011.02.013},
   Abstract = {In this paper, identification of sparse linear and nonlinear
             systems is considered via compressive sensing methods.
             Efficient algorithms are developed based on Kalman filtering
             and Expectation-Maximization. The proposed algorithms are
             applied to linear and nonlinear channels which are
             represented by sparse Volterra models and incorporate the
             effect of power amplifiers. Simulation studies confirm
             significant performance gains in comparison to conventional
             non-sparse methods. © 2011 Elsevier B.V. All rights
             reserved.},
   Doi = {10.1016/j.sigpro.2011.02.013},
   Key = {fds336723}
}

@article{fds336724,
   Author = {Sabbaghian, M and Kwak, Y and Smida, B and Tarokh,
             V},
   Title = {Near shannon limit and low peak to average power ratio turbo
             block coded OFDM},
   Journal = {Ieee Transactions on Communications},
   Volume = {59},
   Number = {8},
   Pages = {2042-2045},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TCOMM.2011.080111.090356},
   Abstract = {In this paper, we present an advanced solution for the long
             standing problem of large peak to average power ratio (PAPR)
             in orthogonal frequency division multiplexing (OFDM)
             systems. Although the design of low PAPR codewords has been
             extensively studied and the existence of asymptotically good
             codes with low PAPR is also proven, still no code has been
             constructed to satisfy all requirements. The main goal of
             the paper is to develop a coding scheme that not only
             generates low PAPR codewords, but it also performs
             relatively close to the Shannon limit. We achieve this goal
             by implementing a time-frequency turbo block coded OFDM. In
             this scheme, we design the frequency domain component to
             have a tightly bounded PAPR. The time domain component code
             is designed to obtain good performance while the decoding
             algorithm has reasonable complexity. Through comparative
             performance evaluation we show that utilizing the proposed
             method, we achieve considerable improvement in terms of PAPR
             while we slightly loose the performance compared to capacity
             achieving codes with similar overall block length. © 2011
             IEEE.},
   Doi = {10.1109/TCOMM.2011.080111.090356},
   Key = {fds336724}
}

@article{fds336725,
   Author = {Jeon, SW and Devroye, N and Vu, M and Chung, SY and Tarokh,
             V},
   Title = {Cognitive networks achieve throughput scaling of a
             homogeneous network},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {57},
   Number = {8},
   Pages = {5103-5115},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TIT.2011.2158874},
   Abstract = {Two distinct, but overlapping, networks that operate at the
             same time, space, and frequency is considered. The first
             network consists of n randomly distributed primary users,
             which form an ad hoc network. The second network again
             consists of m randomly distributed ad hoc secondary users or
             cognitive users. The primary users have priority access to
             the spectrum and do not need to change their communication
             protocol in the presence of the secondary users. The
             secondary users, however, need to adjust their protocol
             based on knowledge about the locations of the primary users
             to bring little loss to the primary network's throughput. By
             introducing preservation regions around primary receivers, a
             modified multihop routing protocol is proposed for the
             cognitive users. Assuming m=nβ with β>1, it is shown that
             the secondary network achieves almost the same throughput
             scaling law as a stand-alone network while the primary
             network throughput is subject to only a vanishingly small
             fractional loss. Specifically, the primary network achieves
             the sum throughput of order n1/2 and, for any δ>0, the
             secondary network achieves the sum throughput of order
             m1/2-δ with an arbitrarily small fraction of outage. Thus,
             almost all secondary source-destination pairs can
             communicate at a rate of order m -1/2-δ. © 2011
             IEEE.},
   Doi = {10.1109/TIT.2011.2158874},
   Key = {fds336725}
}

@article{fds336726,
   Author = {Shin, WY and Jeon, SW and Devroye, N and Vu, MH and Chung, SY and Lee, YH and Tarokh, V},
   Title = {Improved capacity scaling in wireless networks with
             infrastructure},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {57},
   Number = {8},
   Pages = {5088-5102},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TIT.2011.2158881},
   Abstract = {This paper analyzes the impact and benefits of
             infrastructure support in improving the throughput scaling
             in networks of n randomly located wireless nodes. The
             infrastructure uses multiantenna base stations (BSs), in
             which the number of BSs and the number of antennas at each
             BS can scale at arbitrary rates relative to n. Under the
             model, capacity scaling laws are analyzed for both dense and
             extended networks. Two BS-based routing schemes are first
             introduced in this study: an infrastructure-supported
             single-hop (ISH) routing protocol with multiple-access
             uplink and broadcast downlink and an infrastructure-
             supported multihop (IMH) routing protocol. Then, their
             achievable throughput scalings are analyzed. These schemes
             are compared against two conventional schemes without BSs:
             the multihop (MH) transmission and hierarchical cooperation
             (HC) schemes. It is shown that a linear throughput scaling
             is achieved in dense networks, as in the case without help
             of BSs. In contrast, the proposed BS-based routing schemes
             can, under realistic network conditions, improve the
             throughput scaling significantly in extended networks. The
             gain comes from the following advantages of these BS-based
             protocols. First, more nodes can transmit simultaneously in
             the proposed scheme than in the MH scheme if the number of
             BSs and the number of antennas are large enough. Second, by
             improving the long-distance signal-to-noise ratio (SNR), the
             received signal power can be larger than that of the HC,
             enabling a better throughput scaling under extended
             networks. Furthermore, by deriving the corresponding
             information-theoretic cut-set upper bounds, it is shown
             under extended networks that a combination of four schemes
             IMH, ISH, MH, and HC is order-optimal in all operating
             regimes. © 2011 IEEE.},
   Doi = {10.1109/TIT.2011.2158881},
   Key = {fds336726}
}

@article{fds336727,
   Author = {Babadi, B and Ghassemzadeh, SS and Tarokh, V},
   Title = {Group randomness properties of pseudo-noise and gold
             sequences},
   Journal = {12th Canadian Workshop on Information Theory, Cwit
             2011},
   Pages = {42-46},
   Year = {2011},
   Month = {July},
   ISBN = {9781457707438},
   url = {http://dx.doi.org/10.1109/CWIT.2011.5872120},
   Abstract = {In this paper, we study the group randomness of
             pseudo-random sequences based on shortened first-order
             Reed-Muller codes and the Gold sequences. In particular, we
             characterize the empirical spectral distribution of random
             matrices from shortened first-order Reed-Muller codes. We
             show that although these sequences have very appealing
             randomness properties across individual codewords, they do
             not possess certain group randomness properties of i.i.d.
             sequences. In other words, the spectral distribution of
             random matrices from these sequences dramatically differs
             from that of the random i.i.d. generated matrices. In
             contrast, Gold sequences manifest the group randomness
             properties of random i.i.d. sequences. Upper bounds on the
             Kolmogorov complexity of these sequences are established,
             and it has been shown that these bounds are much lower than
             those of the random i.i.d. sequences, when the sequence
             length is large enough. We discuss the implications of these
             observations and motivate the need to develop novel
             randomness tests encompassing both individual and group
             randomness of sequences. © 2011 IEEE.},
   Doi = {10.1109/CWIT.2011.5872120},
   Key = {fds336727}
}

@article{fds336728,
   Author = {Kim, SJ and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Optimum cognitive radio transmission scheme for reducing
             average interference power},
   Journal = {12th Canadian Workshop on Information Theory, Cwit
             2011},
   Pages = {24-25},
   Publisher = {IEEE},
   Year = {2011},
   Month = {July},
   ISBN = {9781457707438},
   url = {http://dx.doi.org/10.1109/CWIT.2011.5872115},
   Abstract = {Reducing interference induced by secondary users is one of
             the most challenging problems in spectrum sharing. In this
             paper, we derive the optimum transmission strategy that
             minimizes the average interference power created by
             cognitive radios at a given point of space i.e. the location
             of a primary receiver. Surprisingly, this is not given by
             the water-filling solution. © 2011 IEEE.},
   Doi = {10.1109/CWIT.2011.5872115},
   Key = {fds336728}
}

@article{fds336729,
   Author = {Ku, ML and Chen, Q and Ghassemzadeh, SS and Tarokh, V and Wang,
             LC},
   Title = {Service coverage for cognitive radio networks with
             cooperative relays in shadowed hotspot areas},
   Journal = {2011 Ieee Wireless Communications and Networking Conference,
             Wcnc 2011},
   Pages = {1759-1764},
   Publisher = {IEEE},
   Year = {2011},
   Month = {June},
   ISBN = {9781612842547},
   url = {http://dx.doi.org/10.1109/WCNC.2011.5779428},
   Abstract = {In this paper, we investigate the service coverage for
             interweaving cognitive radio networks with cooperative
             relays in shadowed areas within the metropolitan region. We
             highlight the influence of relays on the primary and
             secondary systems in severe shadow fading channels. The
             outage probability is utilized as a comprehensive
             performance metric to characterize the coverage quality for
             the cognitive radio system with relays. We show that
             cooperative spectrum sensing among the secondary transmitter
             and relays can improve the vacant spectrum detection
             probability and the false alarm probability, thereby making
             the additionally introduced interference by relays to be
             constrained within a tolerable limit. Overall, our analysis
             unveils that both the spectrum utilization rate and the
             spatial coverage can be significantly improved through the
             use of the relays, and there exists the spatial selectivity
             phenomena for both the primary and secondary systems. ©
             2011 IEEE.},
   Doi = {10.1109/WCNC.2011.5779428},
   Key = {fds336729}
}

@article{fds336730,
   Author = {Kwak, Y and Sabbaghian, M and Smida, B and Tarokh,
             V},
   Title = {Low peak to average power ratio Turbo Block QPSK coded
             OFDM},
   Journal = {2011 Ieee Consumer Communications and Networking Conference,
             Ccnc'2011},
   Pages = {637-641},
   Publisher = {IEEE},
   Year = {2011},
   Month = {June},
   ISBN = {9781424487905},
   url = {http://dx.doi.org/10.1109/CCNC.2011.5766559},
   Abstract = {In this work, we propose a QPSK OFDM code that has both low
             peak to average power ratio and good bit error rate
             performance. We consider a Time-frequency Turbo Block code.
             This code is composed of the cosets of the first-order
             binary Reed-Muller (RM) code in the frequency domain, and
             Bose-Chaudhuri-Hocquenghem (BCH) code in the time domain.
             Our contributions are two-fold: 1) we introduce two encoding
             schemes that guarantee a PAPR of 3 dB for QPSK
             constellation, 2) we propose moderate complexity decoding
             procedures for these schemes. We evaluate the performance of
             the proposed schemes for the additive white Gaussian noise
             channel. Our code performs only slightly worse than the best
             known Turbo codes but has significantly lower PAPR. This
             gives a significant total power gain over the best known
             Turbo codes. © 2011 IEEE.},
   Doi = {10.1109/CCNC.2011.5766559},
   Key = {fds336730}
}

@article{fds336731,
   Author = {Babadi, B and Tarokh, V},
   Title = {Spectral distribution of random matrices from binary linear
             block codes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {57},
   Number = {6},
   Pages = {3955-3962},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TIT.2011.2137330},
   Abstract = {Let C be a binary linear block code of length n, dimension k
             and minimum Hamming distance d over GF(2)n. Let d⊥ denote
             the minimum Hamming distance of the dual code of C over
             GF(2)n. Let εGF(2)n {-1,1}n be the component-wise mapping
             ε(vi):=(-1)vi, for v=(v1,v 2,vn)∈GF(2)n. Finally, for
             p<n, let ΦC be a p × n random matrix whose rows are
             obtained by mapping a uniformly drawn set of size p of the
             codewords of C under ε. It is shown that for d⊥ large
             enough and y:=p/n ∈ (0,1) fixed, as n → ∞ the
             empirical spectral distribution of the Gram matrix of 1/√n
             ΦC resembles that of a random i.i.d. Rademacher matrix
             (i.e., the MarchenkoPastur distribution). Moreover, an
             explicit asymptotic uniform bound on the distance of the
             empirical spectral distribution of the Gram matrix of 1/√n
             ΦC to the MarchenkoPastur distribution as a function of y
             and d⊥ is presented. © 2011 IEEE.},
   Doi = {10.1109/TIT.2011.2137330},
   Key = {fds336731}
}

@article{fds336732,
   Author = {Kim, KT and Hwang, CS and Tarokh, V},
   Title = {Network error correction from matrix network
             coding},
   Journal = {2011 Information Theory and Applications Workshop, Ita 2011
             Conference Proceedings},
   Pages = {394-402},
   Publisher = {IEEE},
   Year = {2011},
   Month = {May},
   ISBN = {9781457703614},
   url = {http://dx.doi.org/10.1109/ITA.2011.5743611},
   Abstract = {We present matrix network coding methods that are naturally
             amenable to a distributed implementation method, i.e., do
             not require the knowledge of network topology, and that are
             suitable for network error correction. First, the Singleton
             bound can be K-fold increased by employing a KK matrix
             coefficient. Moreover, we prove that matrix network coding
             outperforms linear network coding, since it corrects more
             errors than linear network coding, while the amount of
             header overhead per packet can be kept the same by reducing
             the finite field size. This comes from the fact that the
             finite field size of matrix network coding required to
             guarantee the sufficient decoding probability is much
             smaller than linear network coding. Secondly, matrix network
             coding is refinable in the sense that, by receiving a larger
             number of network coded packets, larger error correction
             capabilities are achieved. Simulation results show that
             matrix network coding can provide 0.7-2[dB] more coding gain
             than the linear network coding schemes. © 2011
             IEEE.},
   Doi = {10.1109/ITA.2011.5743611},
   Key = {fds336732}
}

@article{fds336733,
   Author = {Smida, B and Efthymoglou, GP and Ghassemzadeh, SS and Tarokh,
             V},
   Title = {On effects of antenna pointing accuracy for on-the-move
             satellite networks},
   Journal = {Ieee Transactions on Vehicular Technology},
   Volume = {60},
   Number = {4},
   Pages = {1677-1686},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {May},
   url = {http://dx.doi.org/10.1109/TVT.2011.2128356},
   Abstract = {In this paper, we study the adjacent geostationary satellite
             interference to/from on-the-move platforms with
             motion-induced antenna pointing errors. First, using
             satellite geometry, we derive tight upper and lower bounds
             for the average uplink and downlink interferences. Then, we
             derive the exact distribution of the adjacent satellite
             interference, and using a Gaussian approximation, we compute
             bounds for the outage probability for both links. Finally,
             the outage performance is investigated by simulations and by
             evaluation of the derived expressions. The performance
             results show the accuracy of the analytical expressions and
             quantify the link degradation due to random antenna pointing
             errors in on-the-move satellite communication systems. ©
             2011 IEEE.},
   Doi = {10.1109/TVT.2011.2128356},
   Key = {fds336733}
}

@article{fds336734,
   Author = {Akçakaya, M and Nam, S and Hu, P and Moghari, MH and Ngo, LH and Tarokh,
             V and Manning, WJ and Nezafat, R},
   Title = {Compressed sensing with wavelet domain dependencies for
             coronary MRI: a retrospective study.},
   Journal = {Ieee Transactions on Medical Imaging},
   Volume = {30},
   Number = {5},
   Pages = {1090-1099},
   Year = {2011},
   Month = {May},
   url = {http://dx.doi.org/10.1109/tmi.2010.2089519},
   Abstract = {Coronary magnetic resonance imaging (MRI) is a noninvasive
             imaging modality for diagnosis of coronary artery disease.
             One of the limitations of coronary MRI is its long
             acquisition time due to the need of imaging with high
             spatial resolution and constraints on respiratory and
             cardiac motions. Compressed sensing (CS) has been recently
             utilized to accelerate image acquisition in MRI. In this
             paper, we develop an improved CS reconstruction method,
             Bayesian least squares-Gaussian scale mixture (BLS-GSM),
             that uses dependencies of wavelet domain coefficients to
             reduce the observed blurring and reconstruction artifacts in
             coronary MRI using traditional l(1) regularization. Images
             of left and right coronary MRI was acquired in 7 healthy
             subjects with fully-sampled k-space data. The data was
             retrospectively undersampled using acceleration rates of 2,
             4, 6, and 8 and reconstructed using l(1) thresholding, l(1)
             minimization and BLS-GSM thresholding. Reconstructed right
             and left coronary images were compared with fully-sampled
             reconstructions in vessel sharpness and subjective image
             quality (1-4 for poor-excellent). Mean square error (MSE)
             was also calculated for each reconstruction. There were no
             significant differences between the fully sampled image
             score versus rate 2, 4, or 6 for BLS-GSM for both right and
             left coronaries (=N.S.). However, for l(1) thresholding
             significant differences were observed for rates higher than
             2 and 4 for right and left coronaries respectively. l(1)
             minimization also yields images with lower scores compared
             to the reference for rates higher than 4 for both
             coronaries. These results were consistent with the
             quantitative vessel sharpness readings. BLS-GSM allows
             acceleration of coronary MRI with acceleration rates beyond
             what can be achieved with l(1) regularization.},
   Doi = {10.1109/tmi.2010.2089519},
   Key = {fds336734}
}

@article{fds336735,
   Author = {Akçakaya, M and Hu, P and Chuang, ML and Hauser, TH and Ngo, LH and Manning, WJ and Tarokh, V and Nezafat, R},
   Title = {Accelerated noncontrast-enhanced pulmonary vein MRA with
             distributed compressed sensing.},
   Journal = {Journal of Magnetic Resonance Imaging : Jmri},
   Volume = {33},
   Number = {5},
   Pages = {1248-1255},
   Year = {2011},
   Month = {May},
   url = {http://dx.doi.org/10.1002/jmri.22559},
   Abstract = {<h4>Purpose</h4>To investigate the efficacy of distributed
             compressed sensing (CS) to accelerate free-breathing,
             electrocardiogram (ECG)-triggered noncontrast pulmonary vein
             (PV) magnetic resonance angiography (MRA).<h4>Materials and
             methods</h4>Fully sampled ECG-triggered noncontrast PV MRA,
             using a spatially selective slab inversion preparation
             sequence, was acquired on seven healthy adult subjects (27
             ± 17 years, range: 19-65 years, 4 women). The k-space data
             were retrospectively randomly undersampled by factors of 2,
             4, 6, 8, and 10 and then reconstructed using distributed CS
             and coil-by-coil CS methods. The reconstructed images were
             evaluated by two blinded readers in consensus for assessment
             of major PV branches as well as the presence of artifacts in
             left atrium (LA) and elsewhere. Diameters of right inferior
             and right superior PV branches were measured. Additionally,
             mean square errors (MSE) of the reconstructions were
             calculated.<h4>Results</h4>Both CS methods resulted in image
             quality scores similar to the fully sampled reference images
             at undersampling factors up to 6-fold for distributed CS and
             4-fold for coil-by-coil CS reconstructions. There was no
             difference in the presence of artifacts in LA and freedom
             from important artifacts elsewhere between the two
             techniques up to undersampling factors of 10 compared to the
             fully sampled reconstruction. For the PV diameters, no
             systematic variation between the reference and the
             reconstructions were observed for either technique. There
             were no significant differences in MSE between the two
             methods when compared at a given rate, but the difference
             was significant when compared across all
             rates.<h4>Conclusion</h4>The sparsity of noncontrast PV MRA
             and the joint sparsity of different coil images allow
             imaging at high undersampling factors (up to 6-fold) when
             distributed CS is used.},
   Doi = {10.1002/jmri.22559},
   Key = {fds336735}
}

@article{fds340014,
   Author = {Shin, W-Y and Lucani, DE and Medard, M and Stojanovic, M and Tarokh,
             V},
   Title = {On the Order Optimality of Large-scale Underwater
             Networks},
   Volume = {abs/1103.0266},
   Year = {2011},
   Month = {March},
   Abstract = {Capacity scaling laws are analyzed in an underwater acoustic
             network with $n$ regularly located nodes on a square, in
             which both bandwidth and received signal power can be
             limited significantly. A narrow-band model is assumed where
             the carrier frequency is allowed to scale as a function of
             $n$. In the network, we characterize an attenuation
             parameter that depends on the frequency scaling as well as
             the transmission distance. Cut-set upper bounds on the
             throughput scaling are then derived in both extended and
             dense networks having unit node density and unit area,
             respectively. It is first analyzed that under extended
             networks, the upper bound is inversely proportional to the
             attenuation parameter, thus resulting in a highly
             power-limited network. Interestingly, it is seen that the
             upper bound for extended networks is intrinsically related
             to the attenuation parameter but not the spreading factor.
             On the other hand, in dense networks, we show that there
             exists either a bandwidth or power limitation, or both,
             according to the path-loss attenuation regimes, thus
             yielding the upper bound that has three fundamentally
             different operating regimes. Furthermore, we describe an
             achievable scheme based on the simple nearest-neighbor
             multi-hop (MH) transmission. We show that under extended
             networks, the MH scheme is order-optimal for all the
             operating regimes. An achievability result is also presented
             in dense networks, where the operating regimes that
             guarantee the order optimality are identified. It thus turns
             out that frequency scaling is instrumental towards achieving
             the order optimality in the regimes. Finally, these scaling
             results are extended to a random network realization. As a
             result, vital information for fundamental limits of a
             variety of underwater network scenarios is provided by
             showing capacity scaling laws.},
   Key = {fds340014}
}

@article{fds336736,
   Author = {Jia, P and Vu, M and Le-Ngoc, T and Hong, SC and Tarokh,
             V},
   Title = {Capacity- and Bayesian-based cognitive sensing with location
             side information},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {29},
   Number = {2},
   Pages = {276-289},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {February},
   url = {http://dx.doi.org/10.1109/JSAC.2011.110202},
   Abstract = {We investigate spectrum sensing by energy detection based on
             two different objective functions: a Bayesian sensing cost
             or the network weighted sum capacity. The Bayesian cost is a
             traditional detection measure which aims at minimizing a
             combination of the miss-detection and false-alarm
             probabilities, while the capacity objective is a
             communication measure which aims at maximizing the network
             throughput. Fading-dependent optimal sensing thresholds for
             each objective are derived in closed-form for different
             cases of location side information. To make sensing more
             robust to channel fading, we also propose fading-independent
             sub-optimal thresholds. Results show that location side
             information helps improve performance when using the
             threshold designed for that performance measure. However,
             the Bayesian-based threshold does not utilize the side
             information well in improving the network sum capacity. On
             the other hand, the capacity-based threshold captures the
             benefit of side information in both the capacity and
             Bayesian cost measures. Furthermore, it helps to
             significantly improve the network throughput. The proposed
             sensing schemes with location side information can also be
             generalized to a network with multiple cognitive users in a
             simple and distributed manner. © 2006 IEEE.},
   Doi = {10.1109/JSAC.2011.110202},
   Key = {fds336736}
}

@article{fds336737,
   Author = {Smida, B and Tarokh, V},
   Title = {Analysis of interference in air-to-ground CDMA cellular
             systems under idealized assumptions},
   Journal = {Ieee Transactions on Communications},
   Volume = {59},
   Number = {1},
   Pages = {258-267},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2011},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCOMM.2010.110310.080484},
   Abstract = {In this paper, we study the air-to-ground cellular systems
             with no frequency reuse. We provide an analysis of the
             inter-cell interference under idealized assumptions: 3D
             hexagonal cell planning, a line of sight channel model with
             no shadowing and idealized antenna patterns. Based on this
             model, we derive approximate bounds for the inter to
             intra-cell interference ratio for the air-to-ground link. In
             addition, we provide upper bounds on the interference and
             the outage probability for the ground-to-air link.
             Simulation results are provided to validate the accuracy of
             the analytical results. © 2011 IEEE.},
   Doi = {10.1109/TCOMM.2010.110310.080484},
   Key = {fds336737}
}

@article{fds336738,
   Author = {Chen, Q and Li, J and Fan, P and Tarokh, V},
   Title = {An exponential model for evaluating error performance of
             turbo codes},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Year = {2010},
   Month = {December},
   ISBN = {9781424456383},
   url = {http://dx.doi.org/10.1109/GLOCOM.2010.5683671},
   Abstract = {In this paper, an exponential model is proposed to
             approximate the error performance of Turbo codes within low
             and intermediate SNR region. Our analysis unveils that, the
             proposed exponential model offers a simple but effective
             method to approximate the waterfall region performance of
             Turbo codes, which is generally intricate for analytical
             bounding techniques. By combining the proposed exponential
             model with the well known union bound estimate, the paper
             derives a combined performance model to extend the
             performance estimate within moderate to high SNR region.
             Moreover, it is shown that, only the free distance term of
             the weight spectrum is not always enough for a reasonable
             estimate of the error floor region performance, especially
             when the free distance multiplicity is small. Numerical
             results are presented to validate the applicability of the
             proposed performance model. ©2010 IEEE.},
   Doi = {10.1109/GLOCOM.2010.5683671},
   Key = {fds336738}
}

@article{fds336739,
   Author = {Chen, Q and Li, J and Fan, P and Tarokh, V},
   Title = {On the performance estimate for Turbo codes},
   Journal = {2010 International Conference on Wireless Communications and
             Signal Processing, Wcsp 2010},
   Publisher = {IEEE},
   Year = {2010},
   Month = {December},
   ISBN = {9781424475551},
   url = {http://dx.doi.org/10.1109/WCSP.2010.5633812},
   Abstract = {Recently, the scaling law has been extended to approximate
             the waterfall performance for Turbo codes over the binary
             erasure channel. However, the waterfall approximation over
             other channels, such as the AWGN and Rayleigh fading
             channels, is still unknown for Turbo codes. In this paper,
             an exponential model was proposed to approximate the
             waterfall performance for Turbo codes. The relationship
             between the proposed exponential model and the scaling law
             will be highlighted at first. Our analysis unveils that the
             proposed exponential model could be regarded as a
             generalized scaling law model, which makes it possible to
             achieve better performance estimate. The results in this
             paper explicitly shows that, the exponential model offers
             reasonable waterfall approximation for both word error
             probability and bit error probability for all packet sizes
             over a diverse channel, such as the binary erasure channel,
             the additive white Gaussian noise channel as well as the
             Rayleigh fading channel. The complete performance model
             could be derived by combining the exponential model and the
             known union bound model. Finally, some further discussions
             are presented to highlight the performance estimate problem
             for Turbo codes. ©2010 IEEE.},
   Doi = {10.1109/WCSP.2010.5633812},
   Key = {fds336739}
}

@article{fds336740,
   Author = {Babadi, B and Tarokh, V},
   Title = {GADIA: A greedy asynchronous distributed interference
             avoidance algorithm},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {56},
   Number = {12},
   Pages = {6228-6252},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {December},
   url = {http://dx.doi.org/10.1109/TIT.2010.2081090},
   Abstract = {In this paper, the problem of distributed dynamic frequency
             allocation is considered for a canonical communication
             network, which spans several networks such as cognitive
             radio networks and digital subscriber lines (DSLs). A greedy
             asynchronous distributed interference avoidance (GADIA)
             algorithm for horizontal spectrum sharing has been proposed
             that achieves performance close to that of a centralized
             optimal algorithm. The convergence of the GADIA algorithm to
             a near-optimal frequency allocation strategy is proved and
             several asymptotic performance bounds have been established
             for various spatial configurations of the network nodes.
             Furthermore, the near-equilibrium dynamics of the GADIA
             algorithm has been studied using the Glauber dynamics, by
             identifying the problem with the antiferromagnetic
             inhomogeneous long-range Potts model. Using the
             near-equilibrium dynamics and methods from stochastic
             analysis, the robustness of the algorithm with respect to
             time variations in the activity of network nodes is studied.
             These analytic results along with simulation studies reveal
             that the performance is close to that of an optimum
             centralized frequency allocation algorithm. Further
             simulation studies confirm that our proposed algorithm
             outperforms the iterative water-filling algorithm in the low
             signal-to-interference-plus-noise ratio (SINR) regime, in
             terms of achieved sum rate, complexity, convergence rate,
             and robustness to time-varying node activities. © 2006
             IEEE.},
   Doi = {10.1109/TIT.2010.2081090},
   Key = {fds336740}
}

@article{fds336742,
   Author = {Shin, WY and Lucani, DE and Médard, M and Stojanovic, M and Tarokh,
             V},
   Title = {Multi-hop routing is order-optimal in underwater extended
             networks},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {510-514},
   Year = {2010},
   Month = {August},
   ISBN = {9781424469604},
   url = {http://dx.doi.org/10.1109/ISIT.2010.5513480},
   Abstract = {Capacity scaling laws are analyzed in an underwater acoustic
             network with n regularly located nodes. A narrowband model
             is assumed where the carrier frequency is allowed to scale
             as a function of n. In the network, we characterize an
             attenuation parameter that depends on the frequency scaling
             as well as the transmission distance. A cut-set upper bound
             on the throughput scaling is then derived in extended
             networks. Our result indicates that the upper bound is
             inversely proportional to the attenuation parameter, thus
             resulting in a highly power-limited network. Furthermore, we
             describe an achievable scheme based on the simple
             nearest-neighbor multi-hop (MH) transmission. It is shown
             under extended networks that the MH scheme is order-optimal
             as the attenuation parameter scales exponentially with √n
             (or faster). Finally, these scaling results are extended to
             a random network realization. © 2010 IEEE.},
   Doi = {10.1109/ISIT.2010.5513480},
   Key = {fds336742}
}

@article{fds336743,
   Author = {Larsson, P and Smida, B and Koike-Akino, T and Tarokh,
             V},
   Title = {Analysis of network coded HARQ for multiple unicast
             flows},
   Journal = {Ieee International Conference on Communications},
   Publisher = {IEEE},
   Year = {2010},
   Month = {August},
   ISBN = {9781424464043},
   url = {http://dx.doi.org/10.1109/ICC.2010.5502226},
   Abstract = {In this paper, we consider network coded (NCed) Hybrid-ARQ
             (HARQ) for multiple unicast flows. The main contribution of
             the paper is the derivation of throughput expression for
             NCed HARQ with arbitrary number of users in i.i.d. channels.
             We apply the result to Rayleigh fading channels for
             incremental redundancy (IR) and chase combining (CC) based
             NCed HARQ. We verify the analytical approach with
             simulations. We observe substantial SNR improvements over
             regular ARQ with network coding as well as classical (H)ARQ.
             The SNR gains in the high and low throughput regimes are
             mainly due to the network coding and HARQ aspects,
             respectively. For low SNRs, NCed HARQ with IR surpasses the
             CC performance. ©2010 IEEE.},
   Doi = {10.1109/ICC.2010.5502226},
   Key = {fds336743}
}

@article{fds336744,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {SPARLS: The sparse RLS algorithm},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {58},
   Number = {8},
   Pages = {4013-4025},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TSP.2010.2048103},
   Abstract = {We develop a recursive L1-regularized least squares (SPARLS)
             algorithm for the estimation of a sparse tap-weight vector
             in the adaptive filtering setting. The SPARLS algorithm
             exploits noisy observations of the tap-weight vector output
             stream and produces its estimate using an
             expectation-maximization type algorithm. We prove the
             convergence of the SPARLS algorithm to a near-optimal
             estimate in a stationary environment and present analytical
             results for the steady state error. Simulation studies in
             the context of channel estimation, employing multipath
             wireless channels, show that the SPARLS algorithm has
             significant improvement over the conventional widely used
             recursive least squares (RLS) algorithm in terms of mean
             squared error (MSE). Moreover, these simulation studies
             suggest that the SPARLS algorithm (with slight
             modifications) can operate with lower computational
             requirements than the RLS algorithm, when applied to
             tap-weight vectors with fixed support. © 2010
             IEEE.},
   Doi = {10.1109/TSP.2010.2048103},
   Key = {fds336744}
}

@article{fds340017,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {SPARLS: The Sparse RLS Algorithm},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {58},
   Number = {8},
   Pages = {4013-4025},
   Publisher = {IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS
             INC},
   Year = {2010},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TSP.2010.2048103},
   Doi = {10.1109/TSP.2010.2048103},
   Key = {fds340017}
}

@article{fds336745,
   Author = {Babadi, B and Tarokh, V},
   Title = {Random frames from binary linear block codes},
   Journal = {2010 44th Annual Conference on Information Sciences and
             Systems, Ciss 2010},
   Publisher = {IEEE},
   Year = {2010},
   Month = {June},
   ISBN = {9781424474172},
   url = {http://dx.doi.org/10.1109/CISS.2010.5464847},
   Abstract = {Let C be an [n, k, d] binary linear block code of length n,
             dimension k and minimum Hamming distance d over GF(2n). Let
             d⊥ denote the minimum Hamming distance of the dual code of
             Cover GF(2n). Let ε : GF(2n) → {-1, 1}n be the
             component-wise mapping ε(vi) := (-1)vi , for v = (vI, v2,
             v2, ⋯, vn) ∈ GF(2n). Finally, for p < n, let ΦC be a p
             x n random matrix whose rows are obtained by mapping a
             uniformly drawn set of size p of the codewords of C under
             ε. Recently, the authors have established that [3] for d
             ⊥ large enough and y := p/n ∈ (0,1) fixed, as n → ∞
             the empirical eigen-distribution of the Gram matrix of
             1/√n ΦC resembles that of a random i.i.d, Rademacher
             matrix (i.e., the Marchenko-Pastur distribution). In this
             paper, we overview this result and discuss its implications
             on the design of frames for compressed sensing applications.
             ©2010 IEEE.},
   Doi = {10.1109/CISS.2010.5464847},
   Key = {fds336745}
}

@article{fds336746,
   Author = {Mileounis, G and Babadi, B and Kalouptsidis, N and Tarokh,
             V},
   Title = {An adaptive greedy algorithm with application to nonlinear
             communications},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {58},
   Number = {6},
   Pages = {2998-3007},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TSP.2010.2044841},
   Abstract = {Greedy algorithms form an essential tool for compressed
             sensing. However, their inherent batch mode discourages
             their use in time-varying environments due to significant
             complexity and storage requirements. In this paper two
             existing powerful greedy schemes developed in the literature
             are converted into an adaptive algorithm which is applied to
             estimation of a class of nonlinear communication systems.
             Performance is assessed via computer simulations on a
             variety of linear and nonlinear channels; all confirm
             significant improvements over conventional methods. © 2010
             IEEE.},
   Doi = {10.1109/TSP.2010.2044841},
   Key = {fds336746}
}

@article{fds340019,
   Author = {Shin, W-Y and Lucani, DE and Medard, M and Stojanovic, M and Tarokh,
             V},
   Title = {On Capacity Scaling of Underwater Networks: An
             Information-Theoretic Perspective},
   Volume = {abs/1005.0855},
   Year = {2010},
   Month = {May},
   Abstract = {Capacity scaling laws are analyzed in an underwater acoustic
             network with $n$ regularly located nodes on a square. A
             narrow-band model is assumed where the carrier frequency is
             allowed to scale as a function of $n$. In the network, we
             characterize an attenuation parameter that depends on the
             frequency scaling as well as the transmission distance. A
             cut-set upper bound on the throughput scaling is then
             derived in extended networks. Our result indicates that the
             upper bound is inversely proportional to the attenuation
             parameter, thus resulting in a highly power-limited network.
             Interestingly, it is seen that unlike the case of wireless
             radio networks, our upper bound is intrinsically related to
             the attenuation parameter but not the spreading factor.
             Furthermore, we describe an achievable scheme based on the
             simple nearest neighbor multi-hop (MH) transmission. It is
             shown under extended networks that the MH scheme is
             order-optimal as the attenuation parameter scales
             exponentially with $\sqrt{n}$ (or faster). Finally, these
             scaling results are extended to a random network
             realization.},
   Key = {fds340019}
}

@article{fds336747,
   Author = {Zhao, H and Fan, P and Tarokh, V},
   Title = {On the equivalence of interleavers for turbo codes using
             quadratic permutation polynomials over integer
             rings},
   Journal = {Ieee Communications Letters},
   Volume = {14},
   Number = {3},
   Pages = {236-238},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {March},
   url = {http://dx.doi.org/10.1109/LCOMM.2010.03.091695},
   Abstract = {It is known that the equivalence of interleavers for turbo
             codes using quadratic permutation polynomials (QPPs) over
             integer rings can be exactly determined by the so-called
             quadratic null polynomials (QNPs) over integer rings. For
             generating QNPs or higher order null polynomials (NPs), some
             theoretical results have been obtained in previous
             literature. In this letter, it is proved that the
             coefficients of previously obtained QNPs are not only
             sufficient but also necessary for generating any QNPs. Based
             on the necessary and sufficient conditions for generating
             QNPs and QPPs, the enumeration of QPPs excluding their
             equivalence is presented. The obtained results are helpful
             to investigate the algebraic structure of QPP interleavers
             as well as to avoid the equivalence in the design of QPP
             interleavers. © 2010 IEEE.},
   Doi = {10.1109/LCOMM.2010.03.091695},
   Key = {fds336747}
}

@article{fds336749,
   Author = {Mercier, H and Bhargava, VK and Tarokh, V},
   Title = {A survey of error-correcting codes for channels with symbol
             synchronization errors},
   Journal = {Ieee Communications Surveys & Tutorials},
   Volume = {12},
   Number = {1},
   Pages = {87-96},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {March},
   url = {http://dx.doi.org/10.1109/SURV.2010.020110.00079},
   Abstract = {We present a comprehensive survey of errorcorrecting codes
             for channels corrupted by synchronization errors. We discuss
             potential applications as well as the obstacles that need to
             be overcome before such codes can be used in practical
             systems. © 2010 IEEE.},
   Doi = {10.1109/SURV.2010.020110.00079},
   Key = {fds336749}
}

@article{fds336741,
   Author = {Akçakaya, M and Park, J and Tarokh, V},
   Title = {Low density frames for compressive sensing},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Pages = {3642-3645},
   Publisher = {IEEE},
   Year = {2010},
   Month = {January},
   ISBN = {9781424442966},
   url = {http://dx.doi.org/10.1109/ICASSP.2010.5495898},
   Abstract = {We consider the compressive sensing of a sparse or
             compressible signal x ∈ ℝM. We explicitly construct a
             class of measurement matrices, referred to as the low
             density frames, and develop decoding algorithms that produce
             an accurate estimate x̂ even in the presence of additive
             noise. Low density frames are sparse matrices and have small
             storage requirements. Our decoding algorithms for these
             frames can be implemented in O(Mdvdc) complexity, where dc
             and dv are the row and column weight of the frame
             respectively. Simulation results are provided, demonstrating
             that our approach significantly outperforms state-of-the-art
             recovery algorithms for numerous cases of interest. ©2010
             IEEE.},
   Doi = {10.1109/ICASSP.2010.5495898},
   Key = {fds336741}
}

@article{fds336748,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Shannon-theoretic limits on noisy compressive
             sampling},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {56},
   Number = {1},
   Pages = {492-504},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2010},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TIT.2009.2034796},
   Abstract = {In this paper, we study the number of measurements required
             to recover a sparse signal in ℤM with L nonzero
             coefficients from compressed samples in the presence of
             noise. We consider a number of different recovery criteria,
             including the exact recovery of the support of the signal,
             which was previously considered in the literature, as well
             as new criteria for the recovery of a large fraction of the
             support of the signal, and the recovery of a large fraction
             of the energy of the signal. For these recovery criteria, we
             prove that O(L) (an asymptotically linear multiple of L)
             measurements are necessary and sufficient for signal
             recovery, whenever L grows linearly as a function of M. This
             improves on the existing literature that is mostly focused
             on variants of a specific recovery algorithm based on convex
             programming, for which O(L log(M - L)) measurements are
             required. In contrast, the implementation of our proof
             method would have a higher complexity. We also show that O(L
             log(M - L)) measurements are required in the sublinear
             regime (L = o(M)). For our sufficiency proofs, we introduce
             a Shannon-theoretic decoder based on joint typicality, which
             allows error events to be defined in terms of a single
             random variable in contrast to previous information-theoretic
             work, where comparison of random variables are required. We
             also prove concentration results for our error bounds
             implying that a randomly selected Gaussian matrix will
             suffice with high probability. For our necessity proofs, we
             rely on results from channel coding and rate-distortion
             theory. © 2009 IEEE.},
   Doi = {10.1109/TIT.2009.2034796},
   Key = {fds336748}
}

@article{fds340018,
   Author = {Mileounis, G and Babadi, B and Kalouptsidis, N and Tarokh,
             V},
   Title = {An Adaptive Greedy Algorithm with Application to Sparse
             Narma Identification.},
   Journal = {Icassp},
   Pages = {3810-3813},
   Publisher = {IEEE},
   Year = {2010},
   ISBN = {978-1-4244-4296-6},
   Key = {fds340018}
}

@article{fds336750,
   Author = {Kalouptsidis, N and Mileounis, G and Babadi, B and Tarokh,
             V},
   Title = {Adaptive algorithms for sparse nonlinear channel
             estimation},
   Journal = {Ieee Workshop on Statistical Signal Processing
             Proceedings},
   Pages = {221-224},
   Publisher = {IEEE},
   Year = {2009},
   Month = {December},
   ISBN = {9781424427109},
   url = {http://dx.doi.org/10.1109/SSP.2009.5278600},
   Abstract = {In this paper, we consider the estimation of sparse
             nonlinear communication channels. Transmission over the
             channels is represented by sparse Volterra models that
             incorporate the effect of Power Amplifiers. Channel
             estimation is performed by compressive sensing methods.
             Efficient algorithms are proposed based on Kalman filtering
             and Expectation Maximization. Simulation studies confirm
             that the proposed algorithms achieve significant performance
             gains in comparison to the conventional non-sparse methods.
             © 2009 IEEE.},
   Doi = {10.1109/SSP.2009.5278600},
   Key = {fds336750}
}

@article{fds336752,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Adaptive modulation and network coding with optimized
             precoding in two-way relaying},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Publisher = {IEEE},
   Year = {2009},
   Month = {December},
   ISBN = {9781424441488},
   url = {http://dx.doi.org/10.1109/GLOCOM.2009.5425565},
   Abstract = {We propose a precoding strategy which controls amplitude and
             phase of receiving signals to improve throughput for
             two-stage bidirectional relaying. We consider the case when
             the nodes know channel state information (CSI) and can adopt
             adaptive modulation techniques. We introduce a novel scheme
             termed adaptive modulation and network coding (AMNC), which
             jointly optimizes modulations and network coding based on
             the CSI. For dynamic bit loading and power allocation, we
             propose a practical time-sharing method called the segmented
             precoding, in which a packet is split into several
             sub-packets, and a set of modulation and network coding is
             optimized in conjunction with amplitude and phase controls
             for each sub-packet. It is demonstrated that our proposed
             scheme can offer a significant improvement of achievable
             throughput for two-way relaying.},
   Doi = {10.1109/GLOCOM.2009.5425565},
   Key = {fds336752}
}

@article{fds336753,
   Author = {Moezzi, K and Jalaleddini, K and Aghdam, AG and Alasti, M and Tarokh,
             V},
   Title = {An adaptive rate assignment strategy for CDMA2000 IS-856
             subject to RAB delay},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Publisher = {IEEE},
   Year = {2009},
   Month = {December},
   ISBN = {9781424441488},
   url = {http://dx.doi.org/10.1109/GLOCOM.2009.5426040},
   Abstract = {In this paper, the problem of resource allocation in IS-856
             uplink in the presence of time-delay is studied. A set of
             nonlinear adaptive controllers are designed to stabilize the
             wireless network and use the system resources efficiently.
             The controllers obtained are then modified properly to
             retain network stability and performance in the presence of
             time-delay. Simulation results are presented to show the
             effectiveness of the proposed approach.},
   Doi = {10.1109/GLOCOM.2009.5426040},
   Key = {fds336753}
}

@article{fds336755,
   Author = {Koike-Akino, T and Larsson, P and Popovski, P and Tarokh,
             V},
   Title = {Non-linear network coding in two-way relaying discrete
             channels},
   Journal = {2009 International Conference on Wireless Communications and
             Signal Processing, Wcsp 2009},
   Publisher = {IEEE},
   Year = {2009},
   Month = {December},
   ISBN = {9781424456680},
   url = {http://dx.doi.org/10.1109/WCSP.2009.5371759},
   Abstract = {In this paper, we present optimal network coding which can
             maximize achievable rate region in two-way relaying discrete
             channels, where there are two communicating nodes and one
             relaying node. We focus on a low-complexity relaying
             protocol termed the detect-and-forward (DtF) scheme, in
             which the relaying node does not require channel decoding
             but detection. We first analyze the achievable rate region
             of any digital network coding function including non-linear
             types. We then search for the optimal network code in favor
             of maximizing two kinds of performance measures: the sum
             rate and the product rate. For high SNR regimes, linear
             network codes like the exclusive-or (XOR) function can offer
             the maximum-achievable rate region. Whereas, for low SNR
             regimes, it is verified that non-linear network codes like
             the negate-or (NOR) function can outperform linear codes due
             to the effect of error occurrence at the intermediate
             relaying node. © 2009 IEEE.},
   Doi = {10.1109/WCSP.2009.5371759},
   Key = {fds336755}
}

@article{fds336756,
   Author = {Jeon, SW and Devroye, N and Vu, M and Chung, SY and Tarokh,
             V},
   Title = {Cognitive networks achieve throughput scaling of a
             homogeneous network},
   Journal = {Final Proceedings of the 2009 7th International Symposium on
             Modeling and Optimization in Mobile, Ad Hoc and Wireless
             Networks, Wiopt 2009},
   Year = {2009},
   Month = {December},
   ISBN = {9781424449200},
   url = {http://dx.doi.org/10.4108/ICST.WIOPT2009.6358},
   Abstract = {We study two distinct, but overlapping, networks which
             operate at the same time, space and frequency. The first
             network consists of n randomly distributed primary users,
             which form either an ad hoc network, or an infrastructure-
             supported ad hoc network in which l additional base stations
             support the primary users. The second network consists of m
             randomly distributed secondary or cognitive users. The
             primary users have priority access to the spectrum and do
             not change their communication protocol in the presence of
             secondary users. The secondary users, however, need to
             adjust their protocol based on knowledge about the locations
             of the primary users so as not to harm the primary network's
             scaling law. Base on percolation theory, we show that
             surprisingly, when the secondary network is denser than the
             primary network, both networks can simultaneously achieve
             the same throughput scaling as a standalone ad hoc
             network.},
   Doi = {10.4108/ICST.WIOPT2009.6358},
   Key = {fds336756}
}

@article{fds336751,
   Author = {Kim, SJ and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {TAS protocols of a PASD system with limited feedback
             information},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Publisher = {IEEE},
   Year = {2009},
   Month = {December},
   ISBN = {9781424441488},
   url = {http://dx.doi.org/10.1109/GLOCOM.2009.5426257},
   Abstract = {In a Protocol Assisted Switched Diversity (PASD) system, the
             time separated repetition blocks are accumulated in order to
             increase decoding reliability. In this paper, we consider
             transmit antenna selection (TAS) protocols in a PASD system.
             To minimize system complexity we assume the feedback
             information is limited to the SNR of the current pair of
             antennas. We propose three TAS protocols : the random TAS
             (R-TAS) protocol which selects antennas randomly, the
             threshold TAS (T-TAS) protocol which keeps the current
             selection if the predetermined SNR threshold level
             requirement is met and the minimum number of transmission
             TAS (MNT-TAS) protocol which determines the selection of a
             new antenna set or keeping the current set based on the
             evaluation of expectation of the number of necessary
             remaining transmissions. We analyze the average number of
             transmissions of three proposed protocols in a Rayleigh
             fading channel and compare numerical evaluations to
             simulation results under different system
             conditions.},
   Doi = {10.1109/GLOCOM.2009.5426257},
   Key = {fds336751}
}

@article{fds336757,
   Author = {Koike-Akino, T and Tarokh, V},
   Title = {Sphere packing optimization and EXIT chart analysis for
             multi-dimensional QAM signaling},
   Journal = {Ieee International Conference on Communications},
   Publisher = {IEEE},
   Year = {2009},
   Month = {November},
   ISBN = {9781424434350},
   url = {http://dx.doi.org/10.1109/ICC.2009.5199484},
   Abstract = {We investigate on multi-dimensional QAM constellations
             optimized by sphere packing with the known densest lattices.
             We propose a greedy design method assisted by the sphere
             detection. It is demonstrated that the optimized
             constellations can significantly increase the squared
             minimum distance in comparison to the conventional QAM
             constellations. In addition, we analyze the optimized QAMs
             through the use of an extrinsic information transfer (EXIT)
             chart for iterative decoding. ©2009 IEEE.},
   Doi = {10.1109/ICC.2009.5199484},
   Key = {fds336757}
}

@article{fds336758,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Denoising strategy for convolutionally-coded bidirectional
             relaying},
   Journal = {Ieee International Conference on Communications},
   Publisher = {IEEE},
   Year = {2009},
   Month = {November},
   ISBN = {9781424434350},
   url = {http://dx.doi.org/10.1109/ICC.2009.5198893},
   Abstract = {In this paper, we present a forwarding strategy for
             two-stage bidirectional relaying in which trellis-coded
             modulation (TCM) is employed. We reveal that adaptive
             network coding cannot resolve distance shortening occurred
             at specific channel conditions when a certain TCM is used.
             To overcome this issue, we introduce an improved
             amplify-and-forward (AF) scheme termed pseudo AF (PAF). The
             proposed strategy adaptively switches network coding and PAF
             according to the channel information. Computer simulations
             demonstrate that the proposed approach can improve
             throughput performance. ©2009 IEEE.},
   Doi = {10.1109/ICC.2009.5198893},
   Key = {fds336758}
}

@article{fds336759,
   Author = {Jalaleddini, K and Moezzi, K and Aghdam, AG and Alasti, M and Tarokh,
             V},
   Title = {Controller design for rate assignment in wireless
             networks},
   Journal = {Ieee International Conference on Communications},
   Publisher = {IEEE},
   Year = {2009},
   Month = {November},
   ISBN = {9781424434350},
   url = {http://dx.doi.org/10.1109/ICC.2009.5198854},
   Abstract = {In this paper, data-rate assignment in IS-856 uplink
             (reverse link) is studied. The problem is first formulated
             in an interference model framework, and then a dynamic
             control strategy is developed for efficient rate assignment.
             In the first step, the controller is designed for the
             special case when the number of users in the network is
             fixed. Then, the minimum time required for a dynamic network
             (where the number of users is subject to change) to achieve
             a desired performance is obtained. The simulation results
             are presented to elucidate the effectiveness of the proposed
             approach. ©2009 IEEE.},
   Doi = {10.1109/ICC.2009.5198854},
   Key = {fds336759}
}

@article{fds336760,
   Author = {Kim, SJ and Devroye, N and Tarokh, V},
   Title = {A class of Bi-directional multi-relay protocols},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {349-353},
   Publisher = {IEEE},
   Year = {2009},
   Month = {November},
   ISBN = {9781424443130},
   url = {http://dx.doi.org/10.1109/ISIT.2009.5205684},
   Abstract = {In a bi-directional relay channel, two nodes wish to
             exchange independent messages over a shared wireless
             halfduplex channel with the help of relays. Recent work has
             considered information theoretic limits of the
             bi-directional relay channel with a single relay. In this
             work we consider bidirectional relaying with multiple
             relays. We derive achievable rate regions and outer bounds
             for half-duplex protocols with multiple decode and forward
             relays and compare these to the same protocols with amplify
             and forward relays in an additive white Gaussian noise
             channel. We consider three novel classes of half-duplex
             protocols: the (m, 2) 2 phase protocol with m relays, the
             (m, 3) 3 phase protocol with m relays, and general (m, t)
             Multiple Hops and Multiple Relays (MHMR) protocols, where m
             is the total number of relays and 3 < t ≤ m + 2 is the
             number of temporal phases in the protocol. Finally, we
             provide a comprehensive treatment of the MHMR protocols with
             decode and forward relaying and amplify and forward relaying
             in Gaussian noise, obtaining their respective achievable
             rate regions, outer bounds and relative performance at
             different SNRs. The (m, m + 2) DF MHMR protocol achieves the
             largest rate region under simulated channel conditions. ©
             2009 IEEE.},
   Doi = {10.1109/ISIT.2009.5205684},
   Key = {fds336760}
}

@article{fds336762,
   Author = {Yiu, S and Vu, M and Tarokh, V},
   Title = {Interference and noise reduction by beamforming in cognitive
             networks},
   Journal = {Ieee Transactions on Communications},
   Volume = {57},
   Number = {10},
   Pages = {3144-3153},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TCOMM.2009.10.080501},
   Abstract = {We consider beamforming in a cognitive network with multiple
             primary users and a secondary user sharing the same
             spectrum. Each primary and secondary user consists of a
             transmitter and a receiver. In particular, we assume that
             the secondary transmitter has Nt antennas and transmits data
             to its single-antenna receiver using beamforming. The
             beamformer is designed to maximize the cognitive
             signal-to-interference ratio (CSIR). Using mathematical
             tools from random matrix theory, we derive both lower and
             upper bounds on the average interference created by the
             cognitive transmitter at the primary receivers and the
             average CSIR of the cognitive user. We further analyze and
             prove the convergence of these two performance measures
             asymptotically as the number of antennas Nt or primary users
             Np increases. Specifically, we show that the average
             interference per primary receiver converges to E[d-α], the
             expected value of the path loss in the network, whereas the
             average CSIR decays as 1/c when c = Np/Nt → ∞. In the
             special case of Nt ≥ Np, the lower bound of the average
             total interference approaches 0 and the upper bound of the
             average CSIR approaches NtE[d-α] /σC2c where σC2c is the
             noise variance at the cognitive receiver. © 2009
             IEEE.},
   Doi = {10.1109/TCOMM.2009.10.080501},
   Key = {fds336762}
}

@article{fds336761,
   Author = {Smida, B and Efthymoglou, GP and Ghassemzadeh, SS and Tarokh,
             V},
   Title = {Interference analysis between on-the-move users and GEO
             satellites},
   Journal = {Ieee Vehicular Technology Conference},
   Publisher = {IEEE},
   Year = {2009},
   Month = {October},
   ISBN = {9781424425174},
   url = {http://dx.doi.org/10.1109/VETECS.2009.5073607},
   Abstract = {We consider on the move satellite systems with geostationary
             satellites. Using the antenna pointing distribution of
             Weerackody and Gonzalez, we derive tight upper and lower
             bounds of the interference between adjacent satellites
             from/to the on-the-move platforms. We then compute the
             distribution of the interference and the outage probability
             of the system. Simulation results are provided demonstrating
             that the analytical estimates are accurate. © 2009
             IEEE.},
   Doi = {10.1109/VETECS.2009.5073607},
   Key = {fds336761}
}

@article{fds336764,
   Author = {Bai, D and Mitran, P and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Rate of channel hardening of antenna selection diversity
             schemes and its implication on scheduling},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {55},
   Number = {10},
   Pages = {4353-4365},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TIT.2009.2027529},
   Abstract = {For a multiple-antenna system, we find a simple and accurate
             expression for the asymptotic distribution of the antenna
             selection gain when the transmitter selects the transmit
             antenna with the strongest channel. We use this to estimate
             the underlying channel capacity distributions and obtain the
             approximate ergodic capacity. This estimate is compared with
             upper and lower bounds. This analysis demonstrates that
             unlike multiple-input/multiple-output (MIMO) systems, the
             channel for antenna selection systems hardens at a slower
             rate, and thus a significant multiuser scheduling gain can
             exist - Θ(1/log m) for channel selection as opposed to
             Θ(1/√ m) for MIMO, where m is the number of transmit
             antennas. © 2009 IEEE.},
   Doi = {10.1109/TIT.2009.2027529},
   Key = {fds336764}
}

@article{fds336763,
   Author = {Koike-Akino, T and Devroye, N and Tarokh, V},
   Title = {Frequency-domain bit-flipping equalizer for wideband MIMO
             channels},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {8},
   Number = {10},
   Pages = {4969-4973},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TWC.2009.081644},
   Abstract = {We propose a low-complexity equalizer whose performance
             approaches that of the optimal maximum-likelihood estimators
             in wideband multiple-input multiple-output (MIMO) channels.
             The proposed algorithm makes use of a bit-flipping
             refinement procedure preceded by a frequency-domain
             equalizer and is based on local-optima searching algorithms.
             Through performance evaluations, it is demonstrated that the
             proposed equalizer can perform well when a large number of
             diversity branches are available in severely dispersive
             fading channels. © 2009 IEEE.},
   Doi = {10.1109/TWC.2009.081644},
   Key = {fds336763}
}

@article{fds336766,
   Author = {Feng, L and Fan, P and Hao, L and Loo, KK and Tarokh,
             V},
   Title = {A new construction of signature waveforms for multi-rate
             multi-cell QS-CDMA systems},
   Journal = {Wireless Personal Communications},
   Volume = {50},
   Number = {4},
   Pages = {493-507},
   Publisher = {Springer Nature},
   Year = {2009},
   Month = {September},
   url = {http://dx.doi.org/10.1007/s11277-008-9620-0},
   Abstract = {In this paper, we propose a new construction of signature
             waveform sets based on Generalized Loosely Synchronization
             (GLS) sets and different chip waveforms. The new signature
             sets are applied into the multi-rate multi-cell
             quasi-synchronous CDMA (QS-CDMA) system where each cell is
             assigned with a GLS set; different users in the same cell
             are assigned with different GLS sequences in the same GLS
             set; user's different streams are assigned with the same GLS
             sequence but different chip waveforms. According to the
             properties of GLS sets, the inter-cell interference (ICI)
             and the multi-user interference (MUI) in the same cell can
             be reduced significantly. The interferences among different
             streams of the same user are handled by an optimal (or
             suboptimal) multi-stream detector(s), notice that the
             multi-stream detector mentioned here is also named as
             multi-user detector in other references. We compare the
             performance of the multi-rate multi-cell QS-CDMA system
             employing the proposed sets with that of multi-rate system
             employing well-known concatenated orthogonal/PN sets and
             that of single-rate system employing GLS sets. The results
             show that the multi-rate system employing the proposed sets
             can achieve significant interference reduction. Meanwhile
             the performance of multi-rate system is similar to that of
             single-rate system due to the inclusion of multi-user
             detection. © 2008 Springer Science+Business Media,
             LLC.},
   Doi = {10.1007/s11277-008-9620-0},
   Key = {fds336766}
}

@article{fds336774,
   Author = {You, C and Hwang, I and Kim, Y and Tarokh, V},
   Title = {Dual antenna selection algorithms and feedback strategies
             with reduced complexity for multiple-input multiple-output
             systems},
   Journal = {Iet Microwaves, Antennas & Propagation},
   Volume = {3},
   Number = {6},
   Pages = {906-916},
   Publisher = {Institution of Engineering and Technology
             (IET)},
   Year = {2009},
   Month = {August},
   url = {http://dx.doi.org/10.1049/iet-map.2008.0144},
   Abstract = {A simple antenna selection strategy for multiple-input
             multiple-output wireless systems with partial feedback is
             presented. In the proposed scheme, both transmit and receive
             antenna selection are done at the receiver, significantly
             reducing feedback information. In addition, this scheme uses
             row/column probability density function for antenna
             selection to reduce computational complexity without
             performance degradation. Unlike other schemes, two different
             antenna selection algorithms are used in high and low
             signal-to-noise ratio regimes, respectively, achieving
             additional performance gain in comparison to the single
             antenna selection algorithm. Simulation results show that
             the proposed scheme nearly approaches the optimal
             closed-loop capacity (known as water-filling capacity) as
             random selection round for antenna selection increases. ©
             2009 The Institution of Engineering and Technology.},
   Doi = {10.1049/iet-map.2008.0144},
   Key = {fds336774}
}

@article{fds336770,
   Author = {Sharif, M and Tarokh, V and Hassibi, B},
   Title = {Peak power reduction of OFDM signals with sign
             adjustment},
   Journal = {Ieee Transactions on Communications},
   Volume = {57},
   Number = {7},
   Pages = {2160-2166},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TCOMM.2009.07.080012},
   Abstract = {It has recently been shown that significant reduction in the
             peak to mean envelope power (PMEPR) can be obtained by
             altering the sign of each subcarrier in a multicarrier
             system with n subcarriers. However, finding the best sign
             not only requires a search over 2n possible signs but also
             may lead to a substantial rate loss for small size
             constellations. In this paper, we first propose a greedy
             algorithm to choose the signs based on p-norm minimization
             and prove that the resulting PMEPR is guaranteed to be less
             than c log n where c is a constant independent of n for any
             n. This approach has lower complexity in each iteration
             compared to the derandomization approach of [1] while
             achieving similar PMEPR reduction. We further improve the
             performance of the proposed algorithm by enlarging the
             search space using pruning. Simulation results show that
             PMEPR of a multicarrier signal with 128 subcarriers can be
             reduced to within 1.6 dB of the PMEPR of a single carrier
             system. In the second part of the paper, we address the rate
             loss by proposing a block coding scheme in which only one
             sign vector is chosen for K different modulating vectors.
             The sign vector can be computed using the greedy algorithm
             in n iterations. We show that the multi-symbol encoding
             approach can reduce the rate loss by a factor of K while
             achieving the PMEPR of c logKn, i.e., only logarithmic
             growth in K. Simulation results show that the rate loss can
             be made smaller than %10 at the cost of only 1db increase in
             the resulting PMEPR for a system with 128 subcarriers. ©
             2009 IEEE.},
   Doi = {10.1109/TCOMM.2009.07.080012},
   Key = {fds336770}
}

@article{fds336767,
   Author = {Vu, M and Tarokh, V},
   Title = {Scaling laws of single-hop cognitive networks},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {8},
   Number = {8},
   Pages = {4089-4097},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TWC.2009.080453},
   Abstract = {We consider a cognitive network consisting of n cognitive
             users uniformly distributed with constant density among
             primary users. Each user has a single transmitter and a
             single receiver, and the primary and cognitive users
             transmit concurrently. The cognitive users use single-hop
             transmission in two scenarios: (i) with constant transmit
             power, and (ii) with transmit power scaled according to the
             distance to a designated primary transmitter. We show that,
             in both cases, the cognitive users can achieve a throughput
             scaled linearly with the number of users n. The first
             scenario requires the cognitive users to have the
             transmitter-receiver (Tx-Rx) distance bounded, but it can be
             arbitrarily large. Then with high probability, any network
             realization has the throughput scaling linearly with n. The
             second scenario allows the cognitive Tx-Rx distance to grow
             with the network at a feasible exponent as a function of the
             path loss and the power scaling factors. In this case, the
             average network throughput grows at least linearly with n
             and at most as n log(n). These results suggest that
             single-hop transmission may be a suitable choice for
             cognitive transmission. © 2006 IEEE.},
   Doi = {10.1109/TWC.2009.080453},
   Key = {fds336767}
}

@article{fds336768,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {Comparison of SPARLS and RLS algorithms for adaptive
             filtering},
   Journal = {2009 Ieee Sarnoff Symposium, Sarnoff 2009 Conference
             Proceedings},
   Publisher = {IEEE},
   Year = {2009},
   Month = {July},
   ISBN = {9781424433827},
   url = {http://dx.doi.org/10.1109/SARNOF.2009.4850336},
   Abstract = {In this paper, we overview the Low Complexity Recursive
             ℒ1-Regularized Least Squares (SPARLS) algorithm proposed
             in [2], for the estimation of sparse signals in an adaptive
             filtering setting. The SPARLS algorithm is based on an
             Expectation-Maximization type algorithm adapted for online
             estimation. Simulation results for the estimation of
             multi-path wireless channels show that the SPARLS algorithm
             has significant improvement over the conventional
             widely-used Recursive Least Squares (RLS) algorithm, in
             terms of both mean squared error (MSE) and computational
             complexity.},
   Doi = {10.1109/SARNOF.2009.4850336},
   Key = {fds336768}
}

@article{fds336769,
   Author = {Vu, M and Devroye, N and Tarokh, V},
   Title = {On the primary exclusive region of cognitive
             networks},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {8},
   Number = {7},
   Pages = {3380-3385},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {July},
   url = {http://dx.doi.org/10.1109/TWC.2009.080454},
   Abstract = {We study a cognitive network consisting of a single primary
             transmitter and multiple secondary, or cognitive, users. The
             primary transmitter, located at the center of the network,
             communicates with primary receivers within a disc called the
             primary exclusive region (PER). Inside the PER, no cognitive
             users may transmit, in order to guarantee an outage
             probability for the primary receivers within. Outside the
             PER, uniformly distributed cognitive users may transmit,
             provided they are at a certain protected radius from a
             primary receiver. We analyze the aggregated interference
             from the cognitive transmitters to a primary receiver within
             the PER. Based on this interference and the outage
             guarantee, we derive bounds on the radius of the PER,
             showing its interdependence on the receiver protected
             distance and other system parameters. We also extend the
             analysis to allowing the cognitive users to scale their
             power according to the distance from the primary
             transmitter. These studies provide a closed-form,
             theoretical analysis of such a network geometry with PER,
             which may be relevant in the upcoming spectrum sharing
             actions. © 2009 IEEE.},
   Doi = {10.1109/TWC.2009.080454},
   Key = {fds336769}
}

@article{fds336771,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Optimized constellations for two-way wireless relaying with
             physical network coding},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {27},
   Number = {5},
   Pages = {773-787},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {June},
   url = {http://dx.doi.org/10.1109/JSAC.2009.090617},
   Abstract = {We investigate modulation schemes optimized for two-way
             wireless relaying systems, for which network coding is
             employed at the physical layer. We consider network coding
             based on denoise-and-forward (DNF) protocol, which consists
             of two stages: multiple access (MA) stage, where two
             terminals transmit simultaneously towards a relay, and
             broadcast (BC) stage, where the relay transmits towards the
             both terminals. We introduce a design principle of
             modulation and network coding, considering the superposed
             constellations during the MA stage. For the case of QPSK
             modulations at the MA stage, we show that QPSK
             constellations with an exclusive-or (XOR) network coding do
             not always offer the best transmission for the BC stage, and
             that there are several channel conditions in which
             unconventional 5-ary constellations lead to a better
             throughput performance. Through the use of sphere packing,
             we optimize the constellation for such an irregular network
             coding. We further discuss the design issue of the
             modulation in the case when the relay exploits diversity
             receptions such as multiple-antenna diversity and path
             diversity in frequency-selective fading. In addition, we
             apply our design strategy to a relaying system using
             higher-level modulations of 16QAM in the MA stage.
             Performance evaluations confirm that the proposed scheme can
             significantly improve end-to-end throughput for two-way
             relaying systems. © 2006 IEEE.},
   Doi = {10.1109/JSAC.2009.090617},
   Key = {fds336771}
}

@article{fds336773,
   Author = {Hwang, I and You, C and Kim, Y and Tarokh, V},
   Title = {Downlink transmission rate-control strategies for
             closed-loop multiple-input multiple-output
             systems},
   Journal = {Iet Communications},
   Volume = {3},
   Number = {4},
   Pages = {620-629},
   Publisher = {Institution of Engineering and Technology
             (IET)},
   Year = {2009},
   Month = {April},
   url = {http://dx.doi.org/10.1049/iet-com.2008.0456},
   Abstract = {A novel downlink transmission rate-control and feedback
             reduction strategy for closed-loop multiple-input
             multiple-output (MIMO) multiple-input multiple-output
             wireless systems is presented. Unlike conventional systems
             that use signal to interference plus noise ratio at the
             receiver as an indicator of channel quality, we propose
             using instantaneous MIMO capacity as an indicator for the
             downlink transmission rate-control. A set of instantaneous
             capacity thresholds is first chosen such that the expected
             weighted capacity loss because of thresholding effects are
             minimised. While computing the thresholds, we also consider
             the quality of service and weight function to meet different
             traffics and user needs. Then a set of codebooks can be
             constructed minimising the overall capacity loss with given
             quality of service constraint. Simulation results show that,
             with only four data rate-control bits, our algorithm gives
             only 12 capacity loss in 4×4 MIMO systems and almost twice
             better than the current IS-856 standard in single-input
             single-output systems. In case of 5-bit feedback scenario,
             the proposed algorithm outperforms conventional systems by
             minimising instantaneous capacity loss. © 2009 The
             Institution of Engineering and Technology.},
   Doi = {10.1049/iet-com.2008.0456},
   Key = {fds336773}
}

@article{fds340028,
   Author = {Akçakaya, M and Park, J and Tarokh, V},
   Title = {Compressive Sensing Using Low Density Frames},
   Volume = {abs/0903.0650},
   Year = {2009},
   Month = {March},
   Abstract = {We consider the compressive sensing of a sparse or
             compressible signal ${\bf x} \in {\mathbb R}^M$. We
             explicitly construct a class of measurement matrices,
             referred to as the low density frames, and develop decoding
             algorithms that produce an accurate estimate $\hat{\bf x}$
             even in the presence of additive noise. Low density frames
             are sparse matrices and have small storage requirements. Our
             decoding algorithms for these frames have $O(M)$ complexity.
             Simulation results are provided, demonstrating that our
             approach significantly outperforms state-of-the-art recovery
             algorithms for numerous cases of interest. In particular,
             for Gaussian sparse signals and Gaussian noise, we are
             within 2 dB range of the theoretical lower bound in most
             cases.},
   Key = {fds340028}
}

@article{fds340027,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {SPARLS: A Low Complexity Recursive $\mathcal{L}_1$-Regularized
             Least Squares Algorithm},
   Volume = {abs/0901.0734},
   Year = {2009},
   Month = {January},
   Abstract = {We develop a Recursive $\mathcal{L}_1$-Regularized Least
             Squares (SPARLS) algorithm for the estimation of a sparse
             tap-weight vector in the adaptive filtering setting. The
             SPARLS algorithm exploits noisy observations of the
             tap-weight vector output stream and produces its estimate
             using an Expectation-Maximization type algorithm. Simulation
             studies in the context of channel estimation, employing
             multi-path wireless channels, show that the SPARLS algorithm
             has significant improvement over the conventional
             widely-used Recursive Least Squares (RLS) algorithm, in
             terms of both mean squared error (MSE) and computational
             complexity.},
   Key = {fds340027}
}

@article{fds340020,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Denoising Strategy for Convolutionally-Coded Bidirectional
             Relaying},
   Journal = {Ieee International Conference on Communications},
   Pages = {3306-+},
   Publisher = {IEEE},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-3434-3},
   Key = {fds340020}
}

@article{fds340021,
   Author = {Kim, SJ and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {TAS Protocols of a PASD system with limited feedback
             information},
   Journal = {Globecom 2009 2009 Ieee Global Telecommunications
             Conference, Vols 1 8},
   Pages = {6173-+},
   Publisher = {IEEE},
   Editor = {Ulema, M},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-4147-1},
   Key = {fds340021}
}

@article{fds336765,
   Author = {Kim, SJ and Devroye, N and Tarokh, V},
   Title = {Bi-directional half-duplex relaying protocols},
   Journal = {Journal of Communications and Networks},
   Volume = {11},
   Number = {5},
   Pages = {433-444},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {January},
   url = {http://dx.doi.org/10.1109/JCN.2009.6388387},
   Abstract = {The bi-directional relay channel is the natural extension of
             a three-terminal relay channel where node a transmits to
             node b with the help of a relay r to allow for two-way
             communication between nodes a and b. That is, in a
             bi-directional relay channel, a and b wish to exchange
             independent messages over a shared channel with the help of
             a relay r. The rates at which this communication may
             reliably take place depend on the assumptions made on the
             relay processing abilities. We overview information
             theoretic limits of the bi-directional relay channel under a
             variety of conditions, before focusing on half-duplex nodes
             in which communication takes place in a number of temporal
             phases (resulting in protocols), and nodes may forward
             messages in four manners. The relay-forwarding considered
             are: Amplify and forward (AF), decode and forward (DF),
             compress and forward (CF), and mixed forward. The last
             scheme is a combination of CF in one direction and DF in the
             other. We derive inner and outer bounds to the capacity
             region of the bi-directional relay channel for three
             temporal protocols under these four relaying schemes. The
             first protocol is a two phase protocol where a and b
             simultaneously transmit during the first phase and the relay
             r alone transmits during the second. The second protocol
             considers sequential transmissions from a and b followed by
             a transmission from the relay while the third protocol is a
             hybrid of the first two protocols and has four phases. We
             provide a comprehensive treatment of protocols in Gaussian
             noise, obtaining their respective achievable rate regions,
             outer bounds, and their relative performance under different
             SNR and relay geometries. © 2009 KICS.},
   Doi = {10.1109/JCN.2009.6388387},
   Key = {fds336765}
}

@article{fds336772,
   Author = {Babadi, B and Kalouptsidis, N and Tarokh, V},
   Title = {Asymptotic achievability of the Cramér-Rao bound for noisy
             compressive sampling},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {57},
   Number = {3},
   Pages = {1233-1236},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2009},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TSP.2008.2010379},
   Abstract = {We consider a model of the form =Ax + n, where x ε CM is
             sparse with at most L nonzero coefficients in unknown
             locations, y ε CN is the observation vector, A CN×M is the
             measurement matrix and n ε CN is the Gaussian noise. We
             develop a Cramér-Rao bound on the mean squared estimation
             error of the nonzero elements of x, corresponding to the
             genie-aided estimator (GAE) which is provided with the
             locations of the nonzero elements of x. Intuitively, the
             mean squared estimation error of any estimator without the
             knowledge of the locations of the nonzero elements of x is
             no less than that of the GAE. Assuming that L/N is fixed, we
             establish the existence of an estimator that asymptotically
             achieves the Cramér-Rao bound without any knowledge of the
             locations of the nonzero elements of x as N → infinite;,
             for Aa random Gaussian matrix whose elements are drawn
             i.i.d. according to N (0,1). © 2009 IEEE.},
   Doi = {10.1109/TSP.2008.2010379},
   Key = {fds336772}
}

@article{fds340025,
   Author = {Moezzi, K and Jalaleddini, K and Aghdam, AG and Alasti, M and Tarokh,
             V},
   Title = {An Adaptive Rate Assignment Strategy for CDMA2000 IS-856
             Subject to RAB Delay},
   Journal = {Globecom 2009 2009 Ieee Global Telecommunications
             Conference, Vols 1 8},
   Pages = {5989-+},
   Publisher = {IEEE},
   Editor = {Ulema, M},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-4147-1},
   Key = {fds340025}
}

@article{fds340022,
   Author = {Jalaleddini, K and Moezzi, K and Aghdam, AG and Alasti, M and Tarokh,
             V},
   Title = {Controller Design for Rate Assignment in Wireless
             Networks},
   Journal = {Ieee International Conference on Communications},
   Pages = {4025-+},
   Publisher = {IEEE},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-3434-3},
   Key = {fds340022}
}

@article{fds340023,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Adaptive Modulation and Network Coding with Optimized
             Precoding in Two-Way Relaying},
   Journal = {Globecom 2009 2009 Ieee Global Telecommunications
             Conference, Vols 1 8},
   Pages = {5400-+},
   Publisher = {IEEE},
   Editor = {Ulema, M},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-4147-1},
   Key = {fds340023}
}

@article{fds340024,
   Author = {Koike-Akino, T and Tarokh, V},
   Title = {Sphere Packing Optimization and EXIT Chart Analysis for
             Multi-Dimensional QAM Signaling},
   Journal = {Ieee International Conference on Communications},
   Pages = {3888-3892},
   Publisher = {IEEE},
   Year = {2009},
   Month = {January},
   ISBN = {978-1-4244-3434-3},
   Key = {fds340024}
}

@article{fds340026,
   Author = {Bai, D and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Beam Selection Gain Versus Antenna Selection
             Gain},
   Journal = {Corr},
   Volume = {abs/0902.0966},
   Year = {2009},
   Key = {fds340026}
}

@article{fds340029,
   Author = {Jeon, S-W and Devroye, N and Vu, M and Chung, S-Y and Tarokh,
             V},
   Title = {Cognitive networks achieve throughput scaling of a
             homogeneous network.},
   Journal = {Wiopt},
   Pages = {1-5},
   Publisher = {IEEE},
   Editor = {Chong, S and Choi, W},
   Year = {2009},
   ISBN = {978-1-4244-4919-4},
   Key = {fds340029}
}

@article{fds336775,
   Author = {Babadi, B and Tarokh, V},
   Title = {The impact of spectrum sensing time on the performance of
             the GADIA algorithm},
   Journal = {2008 Ieee Symposium on New Frontiers in Dynamic Spectrum
             Access Networks, Dyspan 2008},
   Pages = {472-478},
   Publisher = {IEEE},
   Year = {2008},
   Month = {December},
   ISBN = {9781424420179},
   url = {http://dx.doi.org/10.1109/DYSPAN.2008.56},
   Abstract = {In this paper, we analyze the performance of the GADIA
             (Greedy Asynchronous Distributed Interference Avoidance)
             algorithm ([1], [2]) given the spectral sensing time of the
             various active agents. Under the assumption that the sensing
             time is small compared to the update intervals, it is shown
             that the algorithm converges to an equilibrium point. We
             also derive the steady state variance of the error due to
             spectrum sensing collisions by different clusters. Moreover,
             we propose a heuristic adaptive rate scheme that reduces the
             number of frequency band switchings required to reach the
             equilibrium. Simulation studies show that the algorithm
             achieves more than 96% of the aggregate Shannon capacity
             corresponding to optimal/near-optimal strategies. Additional
             simulations are provided, verify our analytic results on the
             performance of the algorithm. ©2008 IEEE.},
   Doi = {10.1109/DYSPAN.2008.56},
   Key = {fds336775}
}

@article{fds336776,
   Author = {Bai, D and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Beam selection gain from butler matrices},
   Journal = {Ieee Vehicular Technology Conference},
   Publisher = {IEEE},
   Year = {2008},
   Month = {December},
   ISBN = {9781424417223},
   url = {http://dx.doi.org/10.1109/VETECF.2008.107},
   Abstract = {We consider a wireless transmission scenario, when a base
             station is endowed with a fixed beamforming network, where M
             antennas are employed at the base station to point beams to
             predetermined azimuthal angles. In our setting, a Butler
             matrix is deployed at the RF stage to form M beams, and then
             the best beam is selected for transmission. We derive the
             distribution of the beam selection gain for this scenario
             under a Rician channel assumption as a function of both the
             azimuthal location of the remote unit and the Rician
             K-factor. Using some key properties of the noncentral
             chi-square distribution, we prove that beam selection
             outperforms antenna selection. ©2008 IEEE.},
   Doi = {10.1109/VETECF.2008.107},
   Key = {fds336776}
}

@article{fds336777,
   Author = {Yiu, S and Vu, M and Tarokh, V},
   Title = {Interference reduction by beamforming in cognitive
             networks},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Pages = {4406-4411},
   Publisher = {IEEE},
   Year = {2008},
   Month = {December},
   ISBN = {9781424423248},
   url = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.845},
   Abstract = {We consider beamforming in a cognitive network with multiple
             primary users and secondary users sharing the same spectrum.
             In particular, we assume that each secondary transmitter has
             Nt antennas and transmits data to its single- antenna
             receiver using beamforming. The beamformer is designed to
             maximize the cognitive user's signal-to-interference ratio
             (SIR), defined as the ratio of the received signal power at
             the desired cognitive receiver to the total interference
             created at all the primary receivers. Using mathematical
             tools from random matrix theory, we derive both lower and
             upper bounds on the average interference at the primary
             receivers and the average SIR of the cognitive user. We
             further analyze and prove the convergence of these two
             performance measures asymptotically as the number of
             antennas Nt or primary users Np increases. Specifically, the
             average interference per primary receiver converges to the
             expected value of the path loss in the network whereas the
             average SIR of the secondary user decays as 1/c when c =
             Np/Nt - ∞. In the special case of Nt = Np,the average
             total interference approaches 0 and the average SIR
             approaches ∞. © 2008 IEEE.},
   Doi = {10.1109/GLOCOM.2008.ECP.845},
   Key = {fds336777}
}

@article{fds336778,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Denoising maps and constellations for wireless network
             coding in two-way relaying systems},
   Journal = {Globecom Ieee Global Telecommunications Conference},
   Pages = {3790-3794},
   Year = {2008},
   Month = {December},
   ISBN = {9781424423248},
   url = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.727},
   Abstract = {We investigate on the design of modulation schemes suited
             for two-way wireless relaying systems that apply network
             coding at the physical layer. We consider network coding
             based on denoise-and-forward (DNF), which consists of two
             stages: multiple access (MA) stage and broadcast (BC) stage.
             For the case of QPSK constellation in the MA stage, we
             introduce the modulation-related problems in DNF. We propose
             two approaches to solve those issues. One uses only QPSK
             constellations at the BC stage. The other allows the use of
             unconventional 5-ary modulations, optimized according to the
             channel condition. The performance evaluation shows that a
             significant improvement in end-to-end throughput can be
             achieved, in particular for Nakagami-Rice fading channels.
             © 2008 IEEE.},
   Doi = {10.1109/GLOCOM.2008.ECP.727},
   Key = {fds336778}
}

@article{fds336779,
   Author = {Entekhabi, AH and Sharif, M and Tarokh, V},
   Title = {On the peak to average power reduction of OFDM signals using
             reserved subcarriers},
   Journal = {Ieee International Symposium on Personal, Indoor and Mobile
             Radio Communications, Pimrc},
   Publisher = {IEEE},
   Year = {2008},
   Month = {December},
   ISBN = {9781424426447},
   url = {http://dx.doi.org/10.1109/PIMRC.2008.4699707},
   Abstract = {Orthogonal Frequency Division Multiplexing (OFDM) is an
             attractive technique for high data rate transmissions in
             wireless and wireline systems. However OFDM signals suffer
             from high peak-to-mean envelope power (PMEPR). In this paper
             we consider the problem of reducing this high PMEPR using
             reserved peak reduction subcarriers as considered by Tellado
             and Cioffi [9]. We analyze the fundamental tradeoff between
             PMEPR reduction and the rate loss due to reserved
             subcarriers. We first provide a lower bound on the
             complementary cumulative distribution of PMEPR using
             infinitely many reserved subcarriers. We then show that the
             problem of minimizing the maximum of the absolute value of
             the signal using reserved subcarriers can be stated as a
             convex linear matrix inequality problem. While the problem
             is proved to be convex, its complexity is cubic in the
             number of OFDM subcarriers n which can be prohibitive when n
             is large. We then propose a suboptimal Greedy algorithm
             based on p-norm minimization that chooses only bipolar
             values for each subcarrier that has less complexity and more
             PMEPR reduction than the previously proposed algorithm in
             [8]. Our results provide the best tradeoff possible between
             PMEPR reduction and the associated rate loss and also leads
             to a practical algorithm to approach those limits1. © 2008
             IEEE.},
   Doi = {10.1109/PIMRC.2008.4699707},
   Key = {fds336779}
}

@article{fds336781,
   Author = {Koike-Akino, T and Popovski, P and Tarokh, V},
   Title = {Two-way relaying with network coding for frequency-selective
             fading channels},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Pages = {2221-2225},
   Publisher = {IEEE},
   Year = {2008},
   Month = {December},
   ISBN = {9781424429417},
   url = {http://dx.doi.org/10.1109/ACSSC.2008.5074830},
   Abstract = {In this paper, we present a design method of physical layer
             network coding for reliable two-way relaying in frequency-
             selective fading channels. We consider a two-stage protocol:
             At the first stage, two terminals simultaneously transmit
             data packets towards a relaying node. The relay maps the
             received signal into a discrete constellation using
             appropriate network coding, after which it is broadcasted to
             the terminals at the second stage. In our previous work, it
             has been revealed that network coding should be adaptively
             changed according to the channel state information, and
             unconventional signalling such as 5QAM can improve
             throughput for some channel conditions. In this paper, our
             design method of network coding is improved for the case of
             frequency-selective fading channels. © 2008
             IEEE.},
   Doi = {10.1109/ACSSC.2008.5074830},
   Key = {fds336781}
}

@article{fds336782,
   Author = {Kim, SJ and Mitran, P and Tarokh, V},
   Title = {Performance bounds for bidirectional coded cooperation
             protocols},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {54},
   Number = {11},
   Pages = {5235-5241},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TIT.2008.929913},
   Abstract = {In coded bidirectional cooperation, two nodes wish to
             exchange messages over a shared half-duplex channel with the
             help of a relay. In this correspondence, we derive
             performance bounds for this problem for each of three
             decode-and-forward protocols. The first protocol is a two
             phase protocol where both users simultaneously transmit
             during the first phase and the relay alone transmits during
             the second. In this protocol, our bounds are tight. The
             second protocol considers sequential transmissions from the
             two users followed by a transmission from the relay while
             the third protocol is a hybrid of the first two protocols
             and has four phases. In the latter two protocols the bounds
             are not identical. Numerical evaluation shows that in some
             cases of interest our bounds do not differ significantly.
             Finally, in the Gaussian case with path loss, we derive
             achievable rates and compare the relative merits of each
             protocol. This case is of interest in cellular systems.
             Surprisingly, we find that in some cases, the achievable
             rate region of the four phase protocol contains points that
             are outside the outer bounds of the other two protocols. ©
             2008 IEEE.},
   Doi = {10.1109/TIT.2008.929913},
   Key = {fds336782}
}

@article{fds340033,
   Author = {Kim, SJ and Devroye, N and Tarokh, V},
   Title = {Bi-directional half-duplex protocols with multiple
             relays},
   Volume = {abs/0810.1268},
   Year = {2008},
   Month = {October},
   Abstract = {In a bi-directional relay channel, two nodes wish to
             exchange independent messages over a shared wireless
             half-duplex channel with the help of relays. Recent work has
             considered information theoretic limits of the
             bi-directional relay channel with a single relay. In this
             work we consider bi-directional relaying with multiple
             relays. We derive achievable rate regions and outer bounds
             for half-duplex protocols with multiple decode and forward
             relays and compare these to the same protocols with amplify
             and forward relays in an additive white Gaussian noise
             channel. We consider three novel classes of half-duplex
             protocols: the (m,2) 2 phase protocol with m relays, the
             (m,3) 3 phase protocol with m relays, and general (m, t)
             Multiple Hops and Multiple Relays (MHMR) protocols, where m
             is the total number of relays and 3<t< m+3 is the number of
             temporal phases in the protocol. The (m,2) and (m,3)
             protocols extend previous bi-directional relaying protocols
             for a single m=1 relay, while the new (m,t) protocol
             efficiently combines multi-hop routing with message-level
             network coding. Finally, we provide a comprehensive
             treatment of the MHMR protocols with decode and forward
             relaying and amplify and forward relaying in the Gaussian
             noise, obtaining their respective achievable rate regions,
             outer bounds and relative performance under different SNRs
             and relay geometries, including an analytical comparison on
             the protocols at low and high SNR.},
   Key = {fds340033}
}

@article{fds336783,
   Author = {Shin, WY and Jeon, SW and Devroye, N and Vu, MH and Chung, SY and Lee, YH and Tarokh, V},
   Title = {Improved throughput scaling in wireless ad hoc networks with
             infrastructure},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {1118-1122},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422579},
   url = {http://dx.doi.org/10.1109/ISIT.2008.4595161},
   Abstract = {We analyze the benefits of infrastructure support in
             improving the throughput scaling in networks of n randomly
             located wireless nodes. The infrastructure uses
             multi-antenna base stations (BSs), in which the number of
             BSs and the number of antennas at each BS can scale at
             arbtrary rates relative to n. We introduce two multi-antenna
             BS-based routing protocols and analyze their throughput
             scaling laws. Two conventional schemes not using BSs are
             also shown for comparison. In dense networks, we show that
             the BS-based routing schemes do not improve the throughput
             scaling. In contrast, in extended networks, we show what our
             BS-based routing schemes can, under certain network
             conditions, improve the throughput scaling significantly. ©
             2008 IEEE.},
   Doi = {10.1109/ISIT.2008.4595161},
   Key = {fds336783}
}

@article{fds336784,
   Author = {Vu, M and Devroye, N and Tarokh, V},
   Title = {The primary exclusive region in cognitive
             networks},
   Journal = {2008 5th Ieee Consumer Communications and Networking
             Conference, Ccnc 2008},
   Pages = {1014-1019},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {1424414571},
   url = {http://dx.doi.org/10.1109/ccnc08.2007.232},
   Abstract = {In this paper, we consider a cognitive network in which a
             single primary transmitter communicates with primary
             receivers within an area of radius R 0, called the primary
             exclusive region (PER). Inside this region, no cognitive
             users may transmit. Outside the PER, provided that the
             cognitive transmitters are at a minimal distance εp from a
             primary receiver, they may transmit concurrently with the
             primary user. We determine bounds on the primary exclusive
             radius R0 and the guard band εp to guarantee an outage
             performance for the primary user. Specifically, for a
             desired rate C0 and an outage probability β, the
             probability that the primary user's rate falls below C0 is
             less than β. This performance guarantee holds even with an
             arbitrarily large number of cognitive users uniformly
             distributed with constant density outside the primary
             exclusive region. © IEEE.},
   Doi = {10.1109/ccnc08.2007.232},
   Key = {fds336784}
}

@article{fds336785,
   Author = {Smida, B and Tarokh, V},
   Title = {Ground-to-air interference analysis in cellular ATG
             systems},
   Journal = {Ciss 2008, the 42nd Annual Conference on Information
             Sciences and Systems},
   Pages = {225-228},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422470},
   url = {http://dx.doi.org/10.1109/CISS.2008.4558525},
   Abstract = {For air-to-ground cellular systems with no frequency reuse,
             we provide an analysis of the inter-cell interference under
             3D hexagonal cell planning and a line of sight channel model
             with no shadowing and no fading assumptions. Based on this
             model, we provide upper bounds on the interference and the
             outage probability for the ground-to-air link. Simulation
             results demonstrate that our upper bounds are tight. © 2008
             IEEE.},
   Doi = {10.1109/CISS.2008.4558525},
   Key = {fds336785}
}

@article{fds336786,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Noisy compressive sampling limits in linear and sublinear
             regimes},
   Journal = {Ciss 2008, the 42nd Annual Conference on Information
             Sciences and Systems},
   Pages = {1-4},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422470},
   url = {http://dx.doi.org/10.1109/CISS.2008.4558484},
   Abstract = {The authors have recently established a set of results that
             characterize the number of measurements required to recover
             a sparse signal in ℂM with L non-zero coefficients from
             compressed samples in the presence of noise. These results
             indicate that for a number of different recovery criteria,
             O(L) (an asymptotically linear multiple of L) measurements
             are necessary and sufficient for signal recovery, whenever L
             grows linearly as a function of M. We review these results
             that improve on the existing literature, which are mostly
             derived for a specific recovery algorithm based on convex
             programming, where O(L log(M-L)) measurements are required.
             The results discussed here also show that O(L log(M-L))
             measurements are required in the sublinear regime (L =
             o(M)). © 2008 IEEE.},
   Doi = {10.1109/CISS.2008.4558484},
   Key = {fds336786}
}

@article{fds336787,
   Author = {Babadi, B and Tarokh, V},
   Title = {A distributed asynchronous algorithm for spectrum sharing in
             wireless ad hoc networks},
   Journal = {Ciss 2008, the 42nd Annual Conference on Information
             Sciences and Systems},
   Pages = {831-835},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422470},
   url = {http://dx.doi.org/10.1109/CISS.2008.4558635},
   Abstract = {We propose a distributed asynchronous spectrum allocation
             algorithm that achieves performance close to that of a
             centralized optimal algorithm. In our network model, nodes
             are grouped into a number of clusters. Each cluster chooses
             its transmission frequency band based on its knowledge of
             the interference that it experiences. The convergence of the
             proposed distributed algorithm to a sub-optimal spectrum
             assignment strategy is proved. Moreover, asymptotic bounds
             on the performance of the algorithm are derived for one
             dimensional spatial distribution of the clusters in the
             network. These analytic results and additional simulation
             studies verify performance close to that of an optimum
             centralized frequency allocation algorithm. It is
             demonstrated that the algorithm achieves about 90% of the
             Shannon capacities corresponding to the optimum centralized
             frequency band assignments. © 2008 IEEE.},
   Doi = {10.1109/CISS.2008.4558635},
   Key = {fds336787}
}

@article{fds336788,
   Author = {Parker, PA and Bliss, DW and Tarokh, V},
   Title = {On the degrees-of-freedom of the MIMO interference
             channel},
   Journal = {Ciss 2008, the 42nd Annual Conference on Information
             Sciences and Systems},
   Pages = {62-67},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422470},
   url = {http://dx.doi.org/10.1109/CISS.2008.4558496},
   Abstract = {The high signal-to-noise ratio capacity of the symmetric
             MIMO interference channel is characterized as a function of
             the interference-to-noise ratio. This work is a multiple
             antenna extension of the degrees of freedom expressions
             derived by Etkin et al. for the single antenna case. This
             characterization considers the case where the number of
             receive antennas is greater than or equal to the number of
             transmit antennas and shows the number of degrees of freedom
             available for communication as a function of
             log(INR)/log(SNR). © 2008 IEEE.},
   Doi = {10.1109/CISS.2008.4558496},
   Key = {fds336788}
}

@article{fds336789,
   Author = {Nam, S and Vu, M and Tarokh, V},
   Title = {Relay selection methods for wireless cooperative
             communications},
   Journal = {Ciss 2008, the 42nd Annual Conference on Information
             Sciences and Systems},
   Pages = {859-864},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424422470},
   url = {http://dx.doi.org/10.1109/CISS.2008.4558640},
   Abstract = {We study the problem of relay selection in a wireless
             cooperative network. Assuming a single source, a single
             destination, and N uniformly distributed candidate relays,
             we seek to select a set of cooperating relays to minimize
             the total transmission time of a fixed amount of data. We
             propose two selection methods: Best expectation, which
             adaptively selects the relays, and Best-m, which selects an
             optimally pre-determined number of relays. Each method is
             implemented with a simple and optimal algorithm. We further
             provide closed-form, analytical approximations of these
             algorithms' performance, which help simplify the process of
             finding the optimal number of cooperating relays.
             Simulations illustrate the performance of the proposed relay
             selection methods and show a close match between the
             analytical approximations and the numerical values. Through
             some initial studies, we also observe a simple and
             intriguing connection between the Best-m selection method
             and the network geometry. Provided that the relays are
             uniformly distributed, the source can simply cooperate with
             all the relays within a radius of a fixed proportion of the
             source-destination distance. © 2008 IEEE.},
   Doi = {10.1109/CISS.2008.4558640},
   Key = {fds336789}
}

@article{fds336792,
   Author = {Smida, B and Tarokh, V},
   Title = {Interference in air-to-ground cellular systems},
   Journal = {Ieee International Conference on Communications},
   Pages = {1077-1081},
   Publisher = {IEEE},
   Year = {2008},
   Month = {September},
   ISBN = {9781424420742},
   url = {http://dx.doi.org/10.1109/ICC.2008.210},
   Abstract = {Interference in cellular terrestrial systems has been
             extensively studied in the literature mainly through the use
             of simulations. The interference for CDMA cellular
             air-to-ground systems has been similarly evaluated through
             extensive simulations. However, the air-to-ground systems
             are simpler to analyze than terrestrial systems. In this
             note, we provide analytic bounds for inter-cell interference
             in air-to-ground cellular systems with no frequency reuse.
             We consider the standard 3D hexagonal cell plan and a line
             of sight channel model with no shadowing and no fading.
             Simulation results demonstrate that our approximations are
             extremely tight. ©2008 IEEE.},
   Doi = {10.1109/ICC.2008.210},
   Key = {fds336792}
}

@article{fds336793,
   Author = {Hong, SC and Vu, MH and Tarokh, V},
   Title = {Cognitive sensing based on side information},
   Journal = {Proceedings of the 2008 Ieee Sarnoff Symposium,
             Sarnoff},
   Publisher = {IEEE},
   Year = {2008},
   Month = {August},
   ISBN = {1424418437},
   url = {http://dx.doi.org/10.1109/SARNOF.2008.4520040},
   Abstract = {We study a sensing algorithm for cognitive radios based on
             Bayesian energy detection while utilizing available side
             information. The side information available to the cognitive
             user can consist of: (i) spatial locations of the cognitive
             and primary receivers, (ii) received power of the
             primary-signal at the cognitive user, and (iii) a priori
             transmission probability of the primary user. Considering
             several scenarios with different combinations of side
             information, we derive the respective, optimal detection
             thresholds for the cognitive user. Numerical results using
             these thresholds show significant performance improvement
             based on the side information. Specifically, information on
             spatial locations can help stabilize the performance for a
             wide range of the primary activity factor. Highly skewed a
             priori primarytransmission probability further helps improve
             the performance dramatically.},
   Doi = {10.1109/SARNOF.2008.4520040},
   Key = {fds336793}
}

@article{fds336794,
   Author = {Kim, SJ and Devroye, N and Mitran, P and Tarokh, V},
   Title = {Comparison of bi-directional relaying protocols},
   Journal = {Proceedings of the 2008 Ieee Sarnoff Symposium,
             Sarnoff},
   Publisher = {IEEE},
   Year = {2008},
   Month = {August},
   ISBN = {1424418437},
   url = {http://dx.doi.org/10.1109/SARNOF.2008.4520117},
   Abstract = {In a bi-directional relay channel, two nodes wish to
             exchange independent messages over a shared wireless channel
             with the help of a relay. In this paper, we derive
             achievable rate regions for four new half-duplex protocols
             and compare these to four existing half-duplex protocols and
             outer bounds. In time, our protocols consist of either two
             or three phases. In the two phase protocols, both users
             simultaneously transmit during the first phase and the relay
             alone transmits during the second phase, while in the three
             phase protocol the two users sequentially transmit followed
             by a transmission from the relay. The relay may forward
             information in one of four manners; we outline existing
             Amplify and Forward (AF) and Decode and Forward (DF)
             relaying schemes and introduce novel Compress and Forward
             (CF), and Mixed Forward schemes. We derive achievable rate
             regions for the CF and Mixed relaying schemes for the two
             and three phase protocols. Finally, we provide a
             comprehensive treatment of 8 possible half-duplex
             bi-directional relaying protocols in Gaussian noise,
             obtaining their respective achievable rate regions, outer
             bounds, and their relative performance under different SNR
             and relay geometries.},
   Doi = {10.1109/SARNOF.2008.4520117},
   Key = {fds336794}
}

@article{fds336795,
   Author = {Babadi, B and Tarokh, V},
   Title = {Distributed dynamic frequency allocation in wireless
             networks under time-varying user activities},
   Journal = {Proceedings of the 2008 Ieee Sarnoff Symposium,
             Sarnoff},
   Publisher = {IEEE},
   Year = {2008},
   Month = {August},
   ISBN = {1424418437},
   url = {http://dx.doi.org/10.1109/SARNOF.2008.4520043},
   Abstract = {We propose a framework to analyze the performance of the
             distributed dynamic frequency allocation algorithm
             introduced in [1] in the presence of time-varying activity
             of clusters. In our network model, nodes are grouped into a
             number of clusters. Each cluster chooses its transmission
             frequency band based on its knowledge of the interference
             that it experiences. Furthermore, each cluster can be in
             active or inactive mode according to a two-state Markov
             model. We derive conditions on the convergence of the
             algorithm in mean and variance using stochastic analysis.
             Additional simulation studies verify the results of
             stochastic modeling and the performance of the
             algorithm.},
   Doi = {10.1109/SARNOF.2008.4520043},
   Key = {fds336795}
}

@article{fds336796,
   Author = {Babadi, B and Tarokh, V},
   Title = {Iterative approach to base station positioning in cellular
             networks},
   Journal = {Proceedings of the 2008 Ieee Sarnoff Symposium,
             Sarnoff},
   Publisher = {IEEE},
   Year = {2008},
   Month = {August},
   ISBN = {1424418437},
   url = {http://dx.doi.org/10.1109/SARNOF.2008.4520067},
   Abstract = {We consider the problem of finding the optimal spatial
             configuration of a number of base stations in a cellular
             network. We propose a framework to approximately maximize
             the average Signal to Interference plus Noise Ratio (SINR),
             with respect to the positions of a fixed number of base
             stations. An iterative algorithm is proposed in the
             one-dimensional case and the convergence of the algorithm is
             proved. The generalization to higher dimensions is
             straightforward. Additional simulation studies verify the
             convergence and satisfactory performance of the proposed
             algorithm for a variety of scenarios.},
   Doi = {10.1109/SARNOF.2008.4520067},
   Key = {fds336796}
}

@article{fds340032,
   Author = {Kim, SJ and Devroye, N and Mitran, P and Tarokh, V},
   Title = {Achievable rate regions for bi-directional
             relaying},
   Volume = {abs/0808.0954},
   Year = {2008},
   Month = {August},
   Abstract = {In a bi-directional relay channel, two nodes wish to
             exchange independent messages over a shared wireless
             half-duplex channel with the help of a relay. In this paper,
             we derive achievable rate regions for four new half-duplex
             protocols and compare these to four existing half-duplex
             protocols and outer bounds. In time, our protocols consist
             of either two or three phases. In the two phase protocols,
             both users simultaneously transmit during the first phase
             and the relay alone transmits during the second phase, while
             in the three phase protocol the two users sequentially
             transmit followed by a transmission from the relay. The
             relay may forward information in one of four manners; we
             outline existing Amplify and Forward (AF), Decode and
             Forward (DF) and Compress and Forward (CF) relaying schemes
             and introduce the novel Mixed Forward scheme. The latter is
             a combination of CF in one direction and DF in the other. We
             derive achievable rate regions for the CF and Mixed relaying
             schemes for the two and three phase protocols. In the last
             part of this work we provide a comprehensive treatment of 8
             possible half-duplex bi-directional relaying protocols in
             Gaussian noise, obtaining their respective achievable rate
             regions, outer bounds, and their relative performance under
             different SNR and relay geometries.},
   Key = {fds340032}
}

@article{fds336797,
   Author = {Parker, PA and Mitran, P and Bliss, DW and Tarokh,
             V},
   Title = {On bounds and algorithms for frequency synchronization for
             collaborative communication systems},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {56},
   Number = {8 I},
   Pages = {3742-3752},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {August},
   url = {http://dx.doi.org/10.1109/TSP.2008.924799},
   Abstract = {Cooperative diversity systems are wireless communication
             systems designed to exploit cooperation among users to
             mitigate the effects of multipath fading. In fairly general
             conditions, it has been shown that these systems can achieve
             the diversity order of an equivalent multiple-input
             multiple-output (MIMO) channel and, if the node geometry
             permits, virtually the same outage probability can be
             achieved as that of the equivalent MIMO channel for a wide
             range of applicable signal-to-noise ratio (SNR). However,
             much of the prior analysis has been performed under the
             assumption of perfect timing and frequency offset
             synchronization. In this paper, we derive the estimation
             bounds and associated maximum a posteriori estimators for
             frequency offset estimation in a cooperative communication
             system. We show the benefit of adaptively tuning the
             frequency of the relay node in order to reduce estimation
             error at the destination. We also derive an efficient
             estimation algorithm, based on the correlation sequence of
             the data, which has mean squared error close to the
             Cramér-Rao Bound (CRB). © 2008 IEEE.},
   Doi = {10.1109/TSP.2008.924799},
   Key = {fds336797}
}

@article{fds336798,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {A frame construction and a universal distortion bound for
             sparse representations},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {56},
   Number = {6},
   Pages = {2443-2450},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TSP.2007.914344},
   Abstract = {We consider approximations of signals by the elements of a
             frame in a complex vector space of dimension N and formulate
             both the noiseless and the noisy sparse representation
             problems. The noiseless representation problem is to find
             sparse representations of a signal r given that such
             representations exist. In this case, we explicitly construct
             a frame, referred to as the Vandermonde frame, for which the
             noiseless sparse representation problem can be solved
             uniquely using O(N2 operations, as long as the number of
             non-zero coefficients in the sparse representation of r is
             ∈N for some 0 ≤ ∈ 0.5. It is known that ∈ ≤ 0.5
             cannot be relaxed without violating uniqueness. The noisy
             sparse representation problem is to find sparse
             representations of a signal r satisfying a distortion
             criterion. In this case, we establish a lower bound on the
             tradeoff between the sparsity of the representation, the
             underlying distortion and the redundancy of any given frame.
             © 2008 IEEE.},
   Doi = {10.1109/TSP.2007.914344},
   Key = {fds336798}
}

@article{fds336799,
   Author = {Vu, M and Devroye, N and Tarokh, V},
   Title = {An overview of scaling laws in ad hoc and cognitive radio
             networks},
   Journal = {Wireless Personal Communications},
   Volume = {45},
   Number = {3},
   Pages = {343-354},
   Publisher = {Springer Nature},
   Year = {2008},
   Month = {May},
   url = {http://dx.doi.org/10.1007/s11277-008-9479-0},
   Abstract = {Currently, wireless communications are changing along the
             lines of three main thrusts. The first is the introduction
             of secondary spectrum licensing (SSL). Regulations on the
             usage of licensed spectra are being loosened, encouraging
             unused primary spectrum to be licensed, often in an
             opportunistic manner, to secondary devices. The second is
             the introduction of cognitive radios. These wireless devices
             are able to sense and adapt in a "smart" manner to their
             wireless environment, making them prime candidates to
             becoming secondary users in SSL initiatives. Finally, as we
             approach the communication limits of point-to-point
             channels, and as wireless devices become cheap and
             ubiquitous, the focus is shifting from single to multiple
             communication links, or networks. In this paper, we provide
             an overview of the recently established theoretical limits,
             in the form of sum-rates, or throughput, of two main types
             of networks: ad hoc networks, in which the devices are
             homogeneous, and cognitive networks, in which a mixture of
             primary and secondary (or cognitive) devices are present. We
             summarize and provide intuition on how the throughput of a
             network scales with its number of nodes n, as n → ∞,
             under different network and node capability assumptions. ©
             2008 Springer Science+Business Media, LLC.},
   Doi = {10.1007/s11277-008-9479-0},
   Key = {fds336799}
}

@article{fds336804,
   Author = {Devroye, N and Vu, M and Tarokh, V},
   Title = {Achievable rates and scaling laws for cognitive radio
             channels},
   Journal = {Eurasip Journal on Wireless Communications and
             Networking},
   Volume = {2008},
   Pages = {1-12},
   Publisher = {Springer Nature},
   Year = {2008},
   Month = {February},
   url = {http://dx.doi.org/10.1155/2008/896246},
   Abstract = {Cognitive radios have the potential to vastly improve
             communication over wireless channels. We outline recent
             information theoretic results on the limits of primary and
             cognitive user communication in single and multiple
             cognitive user scenarios. We first examine the achievable
             rate and capacity regions of single user cognitive channels.
             Results indicate that at medium SNR (0-20 dB), the use of
             cognition improves rates significantly compared to the
             currently suggested spectral gap-filling methods of
             secondary spectrum access. We then study another information
             theoretic measure, the multiplexing gain. This measure
             captures the number of point-to-point Gaussian channels
             contained in a cognitive channel as the SNR tends to
             infinity. Next, we consider a cognitive network with a
             single primary user and multiple cognitive users. We show
             that with single-hop transmission, the sum capacity of the
             cognitive users scales linearly with the number of users. We
             further introduce and analyze the primary exclusive radius,
             inside of which primary receivers are guaranteed a desired
             outage performance. These results provide guidelines when
             designing a network with secondary spectrum users. Copyright
             © 2008 Natasha Devroye et al.},
   Doi = {10.1155/2008/896246},
   Key = {fds336804}
}

@article{fds336801,
   Author = {Swami, A and Berry, RA and Sayeed, AM and Tarokh, V and Zhao,
             Q},
   Title = {Introduction to the issue on signal processing and
             networking for dynamic spectrum access},
   Journal = {Ieee Journal of Selected Topics in Signal
             Processing},
   Volume = {2},
   Number = {1},
   Pages = {1-3},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {February},
   url = {http://dx.doi.org/10.1109/JSTSP.2008.917511},
   Doi = {10.1109/JSTSP.2008.917511},
   Key = {fds336801}
}

@article{fds336790,
   Author = {Bai, D and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Performance analysis of a PASD antenna system in Rayleigh
             fading channels},
   Journal = {Ieee Wireless Communications and Networking Conference,
             Wcnc},
   Pages = {1014-1019},
   Year = {2008},
   Month = {January},
   ISBN = {9781424419968},
   url = {http://dx.doi.org/10.1109/wcnc.2008.184},
   Abstract = {In this paper, we analyze the performance of a communication
             system that employs Protocol Assisted Switched Diversity
             (PASD) antennas under Rayleigh fading channel conditions.
             The PASD system accumulates time-displaced blocks, each with
             the same information but using different antennas, and then
             combines their symbols using maximal ratio combining (MRC).
             In the PASD system, quality of service (QoS) is ensured by
             comparing the available signal-to-noise ratio (SNR) at the
             output of the combiner against a preset threshold value. Our
             analysis shows that this method reduces the number of
             transmissions significantly as the channel deteriorates as
             compared with ARQ without memory while it can satisfy the
             symbol error rate (SER) requirement for most of blocks. It
             is also shown that deploying more than one antenna is
             important to stabilize the system when the channel becomes
             static. © 2008 IEEE.},
   Doi = {10.1109/wcnc.2008.184},
   Key = {fds336790}
}

@article{fds336791,
   Author = {Vu, M and Ghassemzadeh, SS and Tarokh, V},
   Title = {Interference in a cognitive network with
             beacon},
   Journal = {Ieee Wireless Communications and Networking Conference,
             Wcnc},
   Pages = {876-881},
   Year = {2008},
   Month = {January},
   ISBN = {9781424419968},
   url = {http://dx.doi.org/10.1109/wcnc.2008.160},
   Abstract = {We study a cognitive network consisting of multiple
             cognitive users communicating in the presence of a single
             primary user. The primary user is located at the center of
             the network, and the cognitive users are uniformly
             distributed within a circle around the primary user.
             Assuming a constant cognitive user density, the radius of
             this circle will increase with the number of users. We
             consider a scheme in which the primary transmitter sends a
             beacon signaling its own transmission. The cognitive users,
             upon receiving this beacon, stay silent. Because of channel
             fading, however, there is a non-zero probability that a
             cognitive user misses the beacon and hence, with a certain
             activity factor, transmits concurrently with the primary
             user. Given the location of the primary receiver, we are
             interested in the total interference caused by the cognitive
             users to this receiver. In particular, we provide
             closed-form bounds on the mean and variance of the
             interference, and relate them to the outage probability on
             the primary user. These analytical results can help in the
             design of a cognitive network with beacon. © 2008
             IEEE.},
   Doi = {10.1109/wcnc.2008.160},
   Key = {fds336791}
}

@article{fds336800,
   Author = {Hwang, I and You, C and Kim, D and Kim, Y and Tarokh,
             V},
   Title = {A broadcast scheme for MIMO systems with channel state
             information at the transmitter},
   Journal = {Ieice Transactions on Communications},
   Volume = {E91-B},
   Number = {2},
   Pages = {613-617},
   Publisher = {Institute of Electronics, Information and Communications
             Engineers (IEICE)},
   Year = {2008},
   Month = {January},
   url = {http://dx.doi.org/10.1093/ietcom/e91-b.2.613},
   Abstract = {We propose a new broadcast strategy for a multiple-input
             multiple-output (MIMO) system with N transmit antennas at
             the transmitter and M≤N single antenna receivers. The
             proposed method, based on dirtypaper coding (DPC), spatially
             separates the M users but does not suffer from the power
             loss of classical spatial division multiple access (SDMA).
             For the special case of M=N=2 and when the two single
             antenna receivers are assumed to be co-located, the proposed
             scheme produces a 2 transmit, 2 receiver antenna MIMO
             transmission system that doubles the symbol rate of MIMO
             space-time block code (STBC) systems from one to two symbol
             per transmission time. It is proved theoretically and
             experimentally that the proposed scheme provides the same
             performance level as that of MIMO STBC systems (i.e., the
             Alamouti scheme) for the first symbol, and the same
             performance as the Bell labs layered space-time (BLAST)
             system for the second symbol. When compared to the BLAST
             system, the proposed scheme has the same symbol rate, but
             achieves significantly better performance, since it provides
             2 level diversity per symbol on the first symbol while the
             BLAST system does not provide any diversity. Copyright ©
             2008 The Institute of Electronics, Information and
             Communication Engineers.},
   Doi = {10.1093/ietcom/e91-b.2.613},
   Key = {fds336800}
}

@article{fds336802,
   Author = {Devroye, N and Vu, M and Tarokh, V},
   Title = {Cognitive radio networks: Highlights of information
             theoretic limits, models, and design},
   Journal = {Ieee Signal Processing Magazine},
   Volume = {25},
   Number = {6},
   Pages = {12-23},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {January},
   url = {http://dx.doi.org/10.1109/MSP.2008.929286},
   Abstract = {In recent years, the development of intelligent, adaptive
             wireless devices called cognitive radios, together with the
             introduction of secondary spectrum licensing, has led to a
             new paradigm in communications: cognitive networks.
             Cognitive networks are wireless networks that consist of
             several types of users: often a primary user (the primary
             license-holder of a spectrum band) and secondary users
             (cognitive radios). These cognitive users employ their
             cognitive abilities to communicate without harming the
             primary users. The study of cognitive networks is relatively
             new and many questions are yet to be answered. In this
             article we highlight some of the recent information
             theoretic limits, models, and design of these promising
             networks. © 2008 IEEE.},
   Doi = {10.1109/MSP.2008.929286},
   Key = {fds336802}
}

@article{fds336803,
   Author = {Shin, OS and Kung, HT and Tarokh, V},
   Title = {Construction of block orthogonal Golay sequences and
             application to channel estimation of mimo-ofdm
             systems},
   Journal = {Ieee Transactions on Communications},
   Volume = {56},
   Number = {1},
   Pages = {27-31},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2008},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCOMM.2008.050492},
   Abstract = {In this paper, we construct a family of block orthogonal
             Golay sequences that have low peak-to-mean envelope power
             ratio (PMEPR) as well as blockwise orthogonal properties. We
             then present an application of the sequences to channel
             estimation of multiple-input multiple-output orthogonal
             frequency division multiplexing (MIMO-OFDM) systems. We
             compare the performance of the proposed algorithm with that
             of a frequency division multiplexing (FDM) piloting
             algorithm, and investigate the effect of co-channel
             interference (CCI) on the channel estimation performance. ©
             2008 IEEE.},
   Doi = {10.1109/TCOMM.2008.050492},
   Key = {fds336803}
}

@article{fds340030,
   Author = {Entekhabi, AH and Sharif, M and Tarokh, V},
   Title = {On the Peak to Average Power Reduction of OFDM Signals Using
             Reserved Subcarriers},
   Journal = {2008 Ieee 19th International Symposium on Personal, Indoor
             and Mobile Radio Communications},
   Pages = {1630-+},
   Publisher = {IEEE},
   Year = {2008},
   Month = {January},
   ISBN = {978-1-4244-2643-0},
   Key = {fds340030}
}

@article{fds340031,
   Author = {Bai, D and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Beam Selection Gain from Butler Matrices},
   Journal = {Ieee Vehicular Technology Conference},
   Pages = {446-450},
   Publisher = {IEEE},
   Year = {2008},
   Month = {January},
   ISBN = {978-1-4244-1722-3},
   Key = {fds340031}
}

@article{fds336805,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Performance study of various sparse representation methods
             using redundant frames},
   Journal = {Forty First Annual Conference on Information Sciences and
             Systems, Ciss 2007 Proceedings},
   Pages = {726-729},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424410371},
   url = {http://dx.doi.org/10.1109/CISS.2007.4298400},
   Abstract = {Sparse representations have recently received wide attention
             because of their numerous potential applications. In this
             paper, we consider sparse representations of signals with at
             most L non-zero coefficients using a frame ℱ of size M in
             CN. We bound the average distortion of such a representation
             for any arbitrary frame ℱ by a numerical lower bound that
             is only a function of the sparsity e = L/N of the
             representation, and the redundancy (r - 1) = M/N - 1 of ℱ.
             This numerical lower bound is shown to be much stronger than
             the analytical and asymptotic bounds of [1] in low
             dimensions (e.g. N = 6,8,10), but it is much less
             straightforward to compute. We then study the performance of
             randomly generated frames with respect to this numerical
             lower bound, and to the analytical and asymptotic bounds of
             [1]. When the optimal sparse representation algorithm is
             used, it is observed that randomly generated frames perform
             about 2 dB away from the theoretical lower bound in low
             dimensions. We use the greedy orthogonal matching pursuit
             (OMP) algorithm to study the performance of randomly
             generated frames in higher dimensions. For small values of
             ε, randomly generated frames using OMP perform close to the
             lower bound and the results suggest that the loss of the
             sub-optimal search using orthogonal matching pursuit
             algorithm grows as a function of e. As N grows, a
             concentration phenomenon for the performance of randomly
             generated frames about their average is observed in all
             cases, even when using the OMP algorithm. © 2007
             IEEE.},
   Doi = {10.1109/CISS.2007.4298400},
   Key = {fds336805}
}

@article{fds336806,
   Author = {Vu, M and Devroye, N and Sharif, M and Tarokh, V},
   Title = {Scaling laws of cognitive networks},
   Journal = {Proceedings of the 2nd International Conference on Cognitive
             Radio Oriented Wireless Networks and Communications,
             Crowncom},
   Pages = {2-8},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   url = {http://dx.doi.org/10.1109/CROWNCOM.2007.4549764},
   Abstract = {Opportunistic secondary spectrum usage has the potential to
             dramatically increase spectral efficiency and rates of a
             network of secondary cognitive users. In this work we
             consider a cognitive network: n pairs of cognitive
             transmitter and receiver wish to communicate simultaneously
             in the presence of a single primary transmitter-receiver
             link. We assume each cognitive transmitter-receiver pair
             communicates in a realistic single-hop fashion, as cognitive
             links are likely to be highly localized in space. We first
             show that under an outage constraint on the primary link's
             capacity, provided that the density of the cognitive users
             is constant, the sum-rate of the n cognitive links scales
             linearly with n as n → ∞. This scaling is in contrast to
             the sum-rate scaling of √n seen in multi-hop ad-hoc
             networks. We then explore the optimal radius of the primary
             exclusive region: the region in which no secondary cognitive
             users may transmit, such that the outage constraint on the
             primary user is satisfied. We obtain bounds that help the
             design of this primary exclusive region, outside of which
             cognitive radios may freely transmit.},
   Doi = {10.1109/CROWNCOM.2007.4549764},
   Key = {fds336806}
}

@article{fds336807,
   Author = {Hwang, I and You, C and Kim, Y and Tarokh, V},
   Title = {Antenna selection strategies for MIMO systems},
   Journal = {Ieee International Conference on Communications},
   Pages = {4140-4143},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424403537},
   url = {http://dx.doi.org/10.1109/ICC.2007.682},
   Abstract = {Antenna selection strategies for multiple-input
             multiple-output (MIMO) wireless systems is presented. In our
             scheme, both transmit and receive antenna selection is done
             at the receiver, significantly reducing feedback information
             to the transmitter. Row/column probability density function
             (pdf) is used for antenna selection to reduce computational
             complexity without performance degradation. Unlike other
             schemes, we used two different antenna selection algorithms
             both for high SNR and low SNR regime, achieving additional
             performance gain in comparison with the single antenna
             selection algorithm. Simulation results show that our scheme
             nearly approaches to the optimal closed-loop capacity (known
             as water-filling capacity). © 2007 IEEE.},
   Doi = {10.1109/ICC.2007.682},
   Key = {fds336807}
}

@article{fds336810,
   Author = {Hwang, I and Kim, D and You, C and Kim, Y and Tarokh,
             V},
   Title = {A new practical dirty-paper coding strategy in MIMO
             system},
   Journal = {Forty First Annual Conference on Information Sciences and
             Systems, Ciss 2007 Proceedings},
   Pages = {125-129},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424410371},
   url = {http://dx.doi.org/10.1109/CISS.2007.4298285},
   Abstract = {In this paper, we propose a new broadcast strategy for a
             MIMO system with N transmit antennas at the transmitter and
             M < N single antenna receivers. The proposed method
             spatially separates the M users but does not suffer from the
             power loss of classical SDMA. For the special case of M = N
             = 2 and when the two single antenna receivers are assumed to
             be colocated, the proposed scheme produces a 2 transmit, 2
             receiver antenna MIMO scheme. This gives a MIMO transmission
             scheme that doubles the symbol rate of MIMO STBC systems
             (Alamouti scheme) from one to two symbol per transmission
             time. It is proved that it provides the same performance
             level as that of the Alamouti STBC for the first symbol, and
             the same performance as the BLAST system for the second
             symbol. When compared to the BLAST system, our scheme has
             the same symbol rate, but enjoys significant performance
             improvements, since it provides 2 level diversity per symbol
             on the first symbol while the BLAST system does not provide
             any diversity. © 2007 IEEE.},
   Doi = {10.1109/CISS.2007.4298285},
   Key = {fds336810}
}

@article{fds336811,
   Author = {Parker, PA and Mitran, P and Bliss, DW and Tarokh,
             V},
   Title = {Training sequence design for wireless collaborative
             communication systems in frequency-selective
             fading},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Pages = {2050-2057},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {9781424421107},
   url = {http://dx.doi.org/10.1109/ACSSC.2007.4487598},
   Abstract = {We consider a collaborative communication system consisting
             of several nodes jointly communicating to a common
             destination node. Once each node determines the message to
             send, a space-time code across the sources is used to
             transmit the signal to the destination. As there may be
             frequency offsets and unknown frequency selective channels,
             we assume a training sequence is sent in the preamble to
             estimate these parameters. In this paper, we derive an
             algorithm that designs training sequences that minimize the
             Cramér-Rao Bound for frequency estimation in a
             frequency-selective environment for a multiple node
             collaborative communication system. © 2007
             IEEE.},
   Doi = {10.1109/ACSSC.2007.4487598},
   Key = {fds336811}
}

@article{fds336812,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {On sparsity, redundancy and quality of frame
             representations},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {951-955},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424414296},
   url = {http://dx.doi.org/10.1109/ISIT.2007.4557114},
   Abstract = {We consider approximations of signals by the elements of a
             frame in a complex vector space of dimension N and formulate
             both the noiseless and the noisy sparse representation
             problems. The noiseless representation problem is to find
             sparse representations of a signal r given that such
             representations exist. In this case, we explicitly construct
             a frame, referred to as the Vandermonde frame, for which the
             noiseless sparse representation problem can be solved
             uniquely using O(N2) operations, as long as the number of
             non-zero coefficients in the sparse representation of r is
             ∈N for some 0 ≤ ∈ ≤ 0.5, thus improving on a result
             of Candès and Tao [3]. We also show that ∈ ≤ 0.5 cannot
             be relaxed without violating uniqueness. The noisy sparse
             representation problem is to find sparse representations of
             a signal r satisfying a distortion criterion. In this case,
             we establish a lower bound on the trade-off between the
             sparsity of the representation, the underlying distortion
             and the redundancy of any given frame. ©2007
             IEEE.},
   Doi = {10.1109/ISIT.2007.4557114},
   Key = {fds336812}
}

@article{fds336813,
   Author = {Kim, SJ and Mitran, P and John, C and Ghanadan, R and Tarokh,
             V},
   Title = {Coded bi-directional relaying in combat scenarios},
   Journal = {Proceedings Ieee Military Communications Conference
             Milcom},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424415136},
   url = {http://dx.doi.org/10.1109/MILCOM.2007.4455154},
   Abstract = {In this paper, we present three protocols for bidirectional
             coded cooperation. In coded bi-directional cooperation, two
             agents wish to communicate with each other in the presence
             of a relay node that may help. The first protocol is a two
             phase protocol where both users simultaneously transmit
             during the first phase and the relay alone transmits during
             the second. The second protocol considers sequential
             transmissions from the two users followed by a transmission
             from the relay while the third protocol is a hybrid of the
             first two protocols and has four phases. In a shared
             half-duplex channel, as each user is unable to receive a
             signal while simultaneously transmitting, the first protocol
             limits any received signal for the end users to arrive from
             the relay only. In contrast, the second and third protocols
             allow for each end-user to received signals from both the
             relay and the other user. Thus, in the second and third
             protocols, there is potential for additional
             "side-information" at each receiving agent. In this paper,
             we show that this side-information may be used to yield more
             diversity and thereby greatly increase communication
             reliability over fading channels. Finally, we consider
             channel models based on the Joint Tactical Radio System
             (JTRS), and compute outage probabilities and achievable
             rates. Based on these results, the relative merits of each
             protocol is discussed in various regimes. Furthermore,
             experiments demonstrate the performance with the proposed
             protocols dominates the traditional three phase coded
             relaying protocol in which the side-information is not used.
             These results may be explained by the additional diversity
             provided by the proper utilization of the side-information.
             These results have significant applications in the design of
             net-centric systems for tactical environment, particularly
             in the design of medium access control for mobile ad-hoc
             networks and robust communication in tactical edge networks.
             © 2007 IEEE.},
   Doi = {10.1109/MILCOM.2007.4455154},
   Key = {fds336813}
}

@article{fds336814,
   Author = {Bai, D and Mitran, P and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Channel hardening and the scheduling gain of antenna
             selection diversity schemes},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {1066-1070},
   Publisher = {IEEE},
   Year = {2007},
   Month = {December},
   ISBN = {1424414296},
   url = {http://dx.doi.org/10.1109/ISIT.2007.4557365},
   Abstract = {For a multiple antenna system, we compute the asymptotic
             distribution of antenna selection gain when the transmitter
             selects the transmit antenna with the strongest channel. We
             use this to asymptotically estimate the underlying channel
             capacity distributions, and demonstrate that unlike
             multiple-input/ multiple-output (MIMO) systems,the channel
             for antenna selection systems hardens at a slower rate, and
             thus a significant multiuser scheduling gain can exist.
             Additionally, even without this scheduling gain, it is
             demonstrated that transmit antenna selection systems
             outperform open loop MIMO systems at low
             signal-to-interference-plus-noise ratio (SINR) regimes,
             particularly for small number of receive antennas. This may
             have some implications on wireless system design, because
             most of the users in modern wireless systems have low SINRs.
             ©2007 IEEE.},
   Doi = {10.1109/ISIT.2007.4557365},
   Key = {fds336814}
}

@article{fds361701,
   Author = {Babadi, B and Tarokh, V},
   Title = {A Distributed Dynamic Frequency Allocation
             Algorithm},
   Year = {2007},
   Month = {November},
   Abstract = {We consider a network model where the nodes are grouped into
             a number of clusters and propose a distributed dynamic
             frequency allocation algorithm that achieves performance
             close to that of a centralized optimal algorithm. Each
             cluster chooses its transmission frequency band based on its
             knowledge of the interference that it experiences. The
             convergence of the proposed distributed algorithm to a
             sub-optimal frequency allocation pattern is proved. For some
             specific cases of spatial distributions of the clusters in
             the network, asymptotic bounds on the performance of the
             algorithm are derived and comparisons to the performance of
             optimal centralized solutions are made. These analytic
             results and additional simulation studies verify performance
             close to that of an optimum centralized frequency allocation
             algorithm. It is demonstrated that the algorithm achieves
             about 90% of the Shannon capacities corresponding to the
             optimum/near-optimum centralized frequency band assignments.
             Furthermore, we consider the scenario where each cluster can
             be in active or inactive mode according to a two-state
             Markov model. We derive conditions to guarantee finite
             steady state variance for the output of the algorithm using
             stochastic analysis. Further simulation studies confirm the
             results of stochastic modeling and the performance of the
             algorithm in the time-varying setup.},
   Key = {fds361701}
}

@article{fds336816,
   Author = {Sang, JK and Mitran, P and Tarokh, V},
   Title = {Performance bounds for Bi-directional coded cooperation
             protocols},
   Journal = {Proceedings International Conference on Distributed
             Computing Systems},
   Publisher = {IEEE},
   Year = {2007},
   Month = {November},
   url = {http://dx.doi.org/10.1109/ICDCSW.2007.109},
   Abstract = {In coded bi-directional cooperation, two nodes wish to
             exchange messages over a shared half-duplex channel with the
             help of a relay. In this paper, we derive performance bounds
             for this problem for each of three protocols. The first
             protocol is a two phase protocol where both users
             simultaneously transmit during the first phase and the relay
             alone transmits during the second. In this protocol, our
             bounds are tight. The second protocol considers sequential
             transmissions from the two users followed by a transmission
             from the relay while the third protocol is a hybrid of the
             first two protocols and has four phases. In the latter two
             protocols the inner and outer bounds are not identical, and
             differ in a manner similar to the inner and outer bounds of
             Cover's relay channel. Numerical evaluation shows that at
             least in some cases of interest our bounds do not differ
             significantly. Finally, in the Gaussian case with path loss,
             we derive achievable rates and compare the relative merits
             of each protocol in various regimes. Surprisingly, we find
             that in some cases, the achievable rate region of the four
             phase protocol sometimes contains points that are outside
             the outer bounds of the other protocols. © 2007
             IEEE.},
   Doi = {10.1109/ICDCSW.2007.109},
   Key = {fds336816}
}

@article{fds336818,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Performance of sparse representation algorithms using
             randomly generated frames},
   Journal = {Ieee Signal Processing Letters},
   Volume = {14},
   Number = {11},
   Pages = {777-780},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2007},
   Month = {November},
   url = {http://dx.doi.org/10.1109/LSP.2007.901683},
   Abstract = {We consider sparse representations of signals with at most L
             nonzero coefficients using a frame F of size M in CN. For
             any F, we establish a universal numerical lower bound on the
             average distortion of the representation as a function of
             the sparsity epsi; = L/N of the representation and
             redundancy (r - 1) = M/N-1 of F. In low dimensions (e.g., N
             = 6, 8, 10), this bound is much stronger than the analytical
             and asymptotic bounds given in another of our papers. In
             contrast, it is much less straightforward to compute. We
             then compare the performance of randomly generated frames to
             this numerical lower bound and to the analytical and
             asymptotic bounds given in the aforementioned paper. In low
             dimensions, it is shown that randomly generated frames
             perform about 2 dB away from the theoretical lower bound,
             when the optimal sparse representation algorithm is used. In
             higher dimensions, we evaluate the performance of randomly
             generated frames using the greedy orthogonal matching
             pursuit (OMP) algorithm. The results indicate that for small
             values of ε, OMP performs close to the lower bound and
             suggest that the loss of the suboptimal search using
             orthogonal matching pursuit algorithm grows as a function of
             ε. In all cases, the performance of randomly generated
             frames hardens about their average as N grows, even when
             using the OMP algorithm. © 2007 IEEE.},
   Doi = {10.1109/LSP.2007.901683},
   Key = {fds336818}
}

@article{fds340034,
   Author = {Devroye, N and Tarokh, V},
   Title = {On the Degrees of Freedom in Cognitive Radio
             Channels},
   Volume = {abs/0707.1859},
   Year = {2007},
   Month = {July},
   Abstract = {After receiving useful peer comments, we would like to
             withdraw this paper.},
   Key = {fds340034}
}

@article{fds336819,
   Author = {Shin, OS and Chan, AM and Kung, HT and Tarokh, V},
   Title = {Design of an OFDM cooperative space-time diversity
             system},
   Journal = {Ieee Transactions on Vehicular Technology},
   Volume = {56},
   Number = {4 II},
   Pages = {2203-2215},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2007},
   Month = {July},
   url = {http://dx.doi.org/10.1109/TVT.2007.897642},
   Abstract = {In this paper, we propose a wireless system that realizes
             theoretical benefits of space-time cooperation.
             Specifically, we design a space-time cooperative system
             based on orthogonal frequency division multiplexing (OFDM),
             which we refer to as a cooperative (CO)-OFDM system. Our
             design includes a two-phase space-time cooperation protocol,
             as well as a transmitter and receiver architecture that
             facilitates cooperation. Furthermore, we devise a frame
             structure, on which we build practical timing and frequency
             synchronization algorithms and a channel estimation
             algorithm. In particular, the proposed frequency
             synchronization algorithm utilizes the underlying structure
             of the cooperation protocol, and the proposed channel
             estimation algorithm is based on a pairwise orthogonal
             construction of two sequences. We validate the performance
             of the proposed synchronization and channel estimation
             algorithms through simulations. We then present simulation
             results that demonstrate the overall performance advantage
             of the CO-OFDM system over an OFDM system without
             cooperation, not only under idealistic assumptions but also
             under realistic situations where the proposed algorithms are
             employed. © 2007 IEEE.},
   Doi = {10.1109/TVT.2007.897642},
   Key = {fds336819}
}

@article{fds336821,
   Author = {Yim, R and Shin, OS and Tarokh, V},
   Title = {Reverse-link rate control algorithms with fairness
             guarantees for CDMA systems},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {6},
   Number = {4},
   Pages = {1386-1397},
   Publisher = {IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS
             INC},
   Year = {2007},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TWC.2007.348335},
   Abstract = {We propose a set of distributed rate control algorithms for
             the reverse-link of CDMA systems using a pricing mechanism.
             In the derivation, we assume that the base station
             broadcasts a real-valued feedback in order to control the
             reverse activity level. In addition, we assume that the
             access terminals are able to transmit data at any rate
             within a unite range, and that the transmission power is a
             linear function of the transmission rate. For a specific
             utility function, we show that the proposed algorithm
             achieves social optimality, satisfies an interference power
             constraint, and exhibits desirable short- and long-term
             fairness behaviors. We then modify this algorithm so that it
             can be applied to the case when the transmission power is a
             convex function of the transmission rate. Next, we consider
             the case that the feedback parameter is a single reverse
             activity bit, and the underlying rates are elements of a
             discrete set of admissible rates. This scenario is similar
             to that of the IS-856 standard. We further modify our
             algorithms so that they can be applied to this system setup,
             and verify the performance using numerical simulations. It
             is demonstrated that our algorithms exhibit short- and
             long-term fairness behavior for this realistic scenario. ©
             2007 IEEE.},
   Doi = {10.1109/TWC.2007.348335},
   Key = {fds336821}
}

@article{fds340036,
   Author = {Akçakaya, M and Tarokh, V},
   Title = {Performance Bounds on Sparse Representations Using Redundant
             Frames},
   Volume = {abs/cs/0703045},
   Year = {2007},
   Month = {March},
   Abstract = {We consider approximations of signals by the elements of a
             frame in a complex vector space of dimension $N$ and
             formulate both the noiseless and the noisy sparse
             representation problems. The noiseless representation
             problem is to find sparse representations of a signal
             $\mathbf{r}$ given that such representations exist. In this
             case, we explicitly construct a frame, referred to as the
             Vandermonde frame, for which the noiseless sparse
             representation problem can be solved uniquely using $O(N^2)$
             operations, as long as the number of non-zero coefficients
             in the sparse representation of $\mathbf{r}$ is $\epsilon N$
             for some $0 \le \epsilon \le 0.5$, thus improving on a
             result of Candes and Tao \cite{Candes-Tao}. We also show
             that $\epsilon \le 0.5$ cannot be relaxed without violating
             uniqueness. The noisy sparse representation problem is to
             find sparse representations of a signal $\mathbf{r}$
             satisfying a distortion criterion. In this case, we
             establish a lower bound on the trade-off between the
             sparsity of the representation, the underlying distortion
             and the redundancy of any given frame.},
   Key = {fds340036}
}

@article{fds336817,
   Author = {Parker, PA and Bliss, DW and Mitran, P and Tarokh,
             V},
   Title = {Adaptive frequency synchronization for collaborative
             communication systems},
   Journal = {Proceedings International Conference on Distributed
             Computing Systems},
   Pages = {82-87},
   Publisher = {IEEE},
   Year = {2007},
   Month = {January},
   ISBN = {0769528384},
   url = {http://dx.doi.org/10.1109/ICDCSW.2007.96},
   Abstract = {Cooperative diversity systems are wireless communication
             systems designed to exploit cooperation among users to
             mitigate the effects of multipath fading. In fairly general
             conditions, it has been shown that these systems can achieve
             the diversity order of an equivalent MISO channel and, if
             the node geometry permits, virtually the same outage
             probability is achieved as that of the equivalent MISO
             channel for a wide range of applicable SNR. However, much of
             the prior analysis has been performed under the assumption
             of perfect timing and frequency offset synchronization. In
             this paper, we derive the estimation bounds and associated
             maximum likelihood estimators for frequency offset
             estimation in a cooperative communication system. The
             cooperative nature of the system is utilized to reduce the
             estimation error with respect to standard (non-cooperative)
             frequency estimation algorithms. For a worst case frequency
             offset distribution among the nodes, we show that this
             estimator is optimal in the sense of estimation error
             variance. © 2007 IEEE.},
   Doi = {10.1109/ICDCSW.2007.96},
   Key = {fds336817}
}

@article{fds336820,
   Author = {Tarokh, V and Alamouti, SM and Koivunen, V and Kim,
             KH},
   Title = {MIMO-OFDM and its application},
   Journal = {Journal of Communications and Networks},
   Volume = {9},
   Number = {2},
   Pages = {109},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2007},
   Month = {January},
   url = {http://dx.doi.org/10.1109/JCN.2007.6182828},
   Doi = {10.1109/JCN.2007.6182828},
   Key = {fds336820}
}

@article{fds336822,
   Author = {Greenstein, LJ and Ghassemzadeh, SS and Hong, SC and Tarokh,
             V},
   Title = {Comparison study of UWB indoor channel models},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {6},
   Number = {1},
   Pages = {128-135},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2007},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TWC.2007.04691},
   Abstract = {We compare three approaches for modeling the ultra-wideband
             (UWB) indoor channel delay profile, including the one
             adopted by the IEEE 802.15.3a Task Group. We do this using a
             large database we collected (and have reported on
             previously) spanning numerous indoor environments. Where
             appropriate, we recalculate model parameters so as to be
             compatible with the database. We test the models against the
             database and against each other by computing certain
             statistical 'attributes' of the ensemble of channel delay
             profiles, e.g., the probability distribution, across the
             ensemble, of the root-mean-square (rms) delay spread. We
             show that each of the modeling approaches yields reasonable
             agreement with the database for most or all of the
             attributes tested, and we discuss the relative merits of the
             three approaches. © 2007 IEEE.},
   Doi = {10.1109/TWC.2007.04691},
   Key = {fds336822}
}

@article{fds340035,
   Author = {Babadi, B and Tarokh, V},
   Title = {A Distributed Dynamic Frequency Allocation Algorithm For Ad
             Hoc Networks},
   Journal = {Corr},
   Volume = {abs/0711.3247},
   Year = {2007},
   Key = {fds340035}
}

@article{fds340037,
   Author = {Bai, D and Mitran, P and Ghassemzadeh, SS and Miller, RR and Tarokh,
             V},
   Title = {Rate of Channel Hardening of Antenna Selection Diversity
             Schemes and Its Implication on Scheduling},
   Journal = {Corr},
   Volume = {abs/cs/0703022},
   Year = {2007},
   Key = {fds340037}
}

@article{fds340039,
   Author = {Vu, M and Devroye, N and Sharif, M and Tarokh, V},
   Title = {Scaling Laws of Cognitive Networks.},
   Journal = {Crowncom},
   Pages = {2-8},
   Publisher = {IEEE},
   Editor = {Chandramouli, R and Martin, F},
   Year = {2007},
   ISBN = {978-1-4244-0814-6},
   Key = {fds340039}
}

@article{fds336826,
   Author = {Rosenblum, M and Caramanis, C and Goemans, MX and Tarokh,
             V},
   Title = {Approximating fluid schedules in crossbar packet-switches
             and Banyan networks},
   Journal = {Ieee/Acm Transactions on Networking},
   Volume = {14},
   Number = {6},
   Pages = {1374-1386},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {December},
   url = {http://dx.doi.org/10.1109/TNET.2006.886320},
   Abstract = {We consider a problem motivated by the desire to provide
             flexible, rate-based, quality of service guarantees for
             packets sent over input queued switches and switch networks.
             Our focus is solving a type of online traffic scheduling
             problem, whose input at each time step is a set of desired
             traffic rates through the switch network. These traffic
             rates in general cannot be exactly achieved since they
             assume arbitrarily small fractions of packets can be
             transmitted at each time step. The goal of the traffic
             scheduling problem is to closely approximate the given
             sequence of traffic rates by a sequence of transmissions in
             which only whole packets are sent. We prove worst-case
             bounds on the additional buffer use, which we call backlog,
             that results from using such an approximation. We first
             consider the N × N, input queued, crossbar switch. Our main
             result is an online packet-scheduling algorithm using no
             speedup that guarantees backlog at most (N + 1)2/4 packets
             at each input port and each output port. Upper bounds on
             worst-case backlog have been proved for the case of constant
             fluid schedules, such as the N2 - 2N + 2 bound of Chang,
             Chen, and Huang (INFOCOM, 2000). Our main result for the
             crossbar switch is the first, to our knowledge, to bound
             backlog in terms of switch size N for arbitrary,
             time-varying fluid schedules, without using speedup. Our
             main result for Banyan networks is an exact characterization
             of the speedup required to maintain bounded backlog, in
             terms of polytopes derived from the network topology. ©
             2006 IEEE.},
   Doi = {10.1109/TNET.2006.886320},
   Key = {fds336826}
}

@article{fds336827,
   Author = {Ochiai, H and Mitran, P and Tarokh, V},
   Title = {Variable-rate two-phase collaborative communication
             protocols for wireless networks},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {52},
   Number = {9},
   Pages = {4299-4313},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {September},
   url = {http://dx.doi.org/10.1109/TIT.2006.880055},
   Abstract = {The performance of two-phase collaborative communication
             protocols is studied for wireless networks. All the
             communication nodes in the cluster are assumed to share the
             same channel and transmit or receive collaboratively in a
             quasi-static Rayleigh flat-fading environment. In addition
             to small-scale fading, the effect of large-scale path loss
             is also considered. Based on a decode-and-forward approach,
             we consider various variable-rate two-phase protocols that
             can achieve full diversity order and analyze the effect of
             node geometry on their performance in terms of the outage
             probability of mutual information. For the single-relay node
             case, it is shown that if the collaborator node is close to
             the source node, a protocol based on space-time coding (STC)
             can achieve good diversity gain. Otherwise, a protocol based
             on receiver diversity performs better. These protocols are
             also compared with one based on fixed-rate repetition coding
             and their performance tradeoffs with node geometry are
             studied. The second part deals with multiple relays. It is
             known that with N relays an asymptotic diversity order of
             N+1 is achievable with STC-based protocols in the two-phase
             framework. However, in the framework of collaborative STC,
             those relay nodes which fail to decode remain silent (this
             event is referred to as a node erasure). We show that this
             node erasure has the potential to considerably reduce the
             diversity order and point out the importance of designing
             the STC to be robust against such node erasure. © 2006
             IEEE.},
   Doi = {10.1109/TIT.2006.880055},
   Key = {fds336827}
}

@article{fds336828,
   Author = {Devroye, N and Mitran, P and Tarokh, V},
   Title = {Limits on communications in a cognitive radio
             channel},
   Journal = {Ieee Communications Magazine},
   Volume = {44},
   Number = {6},
   Pages = {44-49},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {June},
   url = {http://dx.doi.org/10.1109/MCOM.2006.1668418},
   Abstract = {In this article we review FCC secondary markets initiatives
             and how smart wireless devices could be used to increase
             spectral efficiency. We survey the current proposals for
             cognitive radio deployment, and present a new, potentially
             more spectrally efficient model for a wireless channel
             employing cognitive radios; the cognitive radio channel.
             This channel models the simplest scenario in which a
             cognitive radio could be used and consists of a 2 Tx, 2 Rx
             wireless channel in which one transmitter knows the message
             of the other. We obtain fundamental limits on the
             communication possible over such a channel, and discuss
             future engineering and regulatory issues. © 2006
             IEEE.},
   Doi = {10.1109/MCOM.2006.1668418},
   Key = {fds336828}
}

@article{fds336829,
   Author = {Devroye, N and Mitran, P and Tarokh, V},
   Title = {Achievable rates in cognitive radio channels},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {52},
   Number = {5},
   Pages = {1813-1827},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {May},
   url = {http://dx.doi.org/10.1109/TIT.2006.872971},
   Abstract = {Cognitive radio promises a low-cost, highly flexible
             alternative to the classic single-frequency band,
             single-protocol wireless device. By sensing and adapting to
             its environment, such a device is able to fill voids in the
             wireless spectrum and can dramatically increase spectral
             efficiency. In this paper, the cognitive radio channel is
             defined as a two-sender, two-receiver interference channel
             in which sender 2 obtains the encoded message sender 1 plans
             to transmit. We consider two cases: in the genie-aided
             cognitive radio channel, sender 2 is noncausally presented
             the data to be transmitted by sender 1 while in the causal
             cognitive radio channel, the data is obtained causally. The
             cognitive radio at sender 2 may then choose to transmit
             simultaneously over the same channel, as opposed to waiting
             for an idle channel as is traditional for a cognitive radio.
             Our main result is the development of an achievable region
             which combines Gel'fand-Pinkser coding with an achievable
             region construction for the interference channel. In the
             additive Gaussian noise case, this resembles dirty-paper
             coding, a technique used in the computation of the capacity
             of the Gaussian multiple-input multiple-output (MIMO)
             broadcast channel. Numerical evaluation of the region in the
             Gaussian noise case is performed, and compared to an inner
             bound, the interference channel, and an outer bound, a
             modified Gaussian MIMO broadcast channel. Results are also
             extended to the case in which the message is causally
             obtained. © 2006 IEEE.},
   Doi = {10.1109/TIT.2006.872971},
   Key = {fds336829}
}

@article{fds336830,
   Author = {Mitran, P and Devroye, N and Tarokh, V},
   Title = {On compound channels with side information at the
             transmitter},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {52},
   Number = {4},
   Pages = {1745-1755},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TIT.2006.871044},
   Abstract = {Costa has proved that for noncausally known Gaussian
             interference at a power constrained transmitter
             communicating over an additive white Gaussian noise channel
             there is no capacity loss when compared to a scenario where
             interference is not present. For the case of a transmitter
             communicating over a quasistatic (i.e., nonergodic) fading
             channel, his method does not apply. In this correspondence,
             we derive upper and lower bounds on the capacity of compound
             channels with side information at the transmitter, first for
             finite alphabet channels and then, based on this result, for
             channels on standard alphabets (this includes real
             alphabets). For the special case of a degenerate compound
             channel with only one possible realization, our bounds are
             equivalent to the well-known capacity with side-information
             formula of Gel'fand and Pinsker. For the quasistatic fading
             channel, when fading is Ricean, we suggest a scheme based on
             our lower bound for which the performance is found to be
             relatively good even for moderate K -factor. As K → ∞,
             the uncertainty on the channel vanishes and our scheme
             obtains the performance of dirty paper coding, namely that
             the interference is perfectly mitigated. As K → 0, the
             proposed scheme treats the interferer as additional noise.
             These results may be of importance for the emerging field of
             cognitive radios where one user may be aware of another
             user's intended message to a common receiver, but is unaware
             of the channel path gains. © 2006 IEEE.},
   Doi = {10.1109/TIT.2006.871044},
   Key = {fds336830}
}

@article{fds336831,
   Author = {Kim, IM and Ghassemzadeh, SS and Tarokh, V},
   Title = {Optimized nonuniform PSK for multiclass traffic and its
             application to space-time block codes},
   Journal = {Ieee Transactions on Communications},
   Volume = {54},
   Number = {2},
   Pages = {364-373},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {February},
   url = {http://dx.doi.org/10.1109/TCOMM.2005.863725},
   Abstract = {We construct nonuniform phase-shift keying (PSK)
             constellations that provide unequal error protection for
             multiclass traffic such as compressed voice and video data.
             Then closed-form expressions expression for the exact
             bit-error rate (BER) of the nonuniform PSK constellations is
             derived in multiple receive-antenna systems over Rayleigh
             fading channels. Based on this BER analysis, we optimize the
             nonuniform PSK constellations such that the BERs of all the
             bits of each class are equalized or such that the total
             transmission power is minimized subject to the average BER
             constraints. In particular, we demonstrate that even for
             transmitting single-class traffic, the optimized nonuniform
             PSK constellations can be better than the conventional
             uniform PSK. Finally, we extend the nonuniform PSK
             constellations to space-time coded communications systems
             with multiple transmit and multiple receive antennas. ©
             2006 IEEE.},
   Doi = {10.1109/TCOMM.2005.863725},
   Key = {fds336831}
}

@article{fds336808,
   Author = {Devroye, N and Mitran, P and Tarokh, V},
   Title = {Cognitive decomposition of wireless networks},
   Journal = {1st International Conference on Cognitive Radio Oriented
             Wireless Networks and Communications 2006,
             Crowncom},
   Publisher = {IEEE},
   Year = {2006},
   Month = {January},
   ISBN = {1424403812},
   url = {http://dx.doi.org/10.1109/CROWNCOM.2006.363475},
   Abstract = {In this paper, we provide a framework for a fundamental
             study of the communication limits of networks of cognitive
             devices. It is shown that all communication in a network of
             cognitive and non-cognitive devices can be cast into
             competitive, cognitive and cooperative behaviors. An
             achievable rate region for the cognitive radio channnel
             (which captures the most fundamental form of cognition -
             vertical spectrum sharing), is presented. © 2006
             IEEE.},
   Doi = {10.1109/CROWNCOM.2006.363475},
   Key = {fds336808}
}

@article{fds336823,
   Author = {Yim, R and Shin, OS and Tarokh, V},
   Title = {Distributed delay-aware rate control algorithm for the
             reverse-link of CDMA systems},
   Journal = {Ieee International Conference on Communications},
   Volume = {10},
   Pages = {4363-4368},
   Publisher = {IEEE},
   Year = {2006},
   Month = {January},
   ISBN = {1424403553},
   url = {http://dx.doi.org/10.1109/ICC.2006.255324},
   Abstract = {We propose a new distributed rate control algorithm for the
             reverse link of CDMA systems. Specifically, when the
             statistics of packet arrivals are known locally to each
             access terminal (AT), this new algorithm aims to provide a
             means to control the relative delay that each AT
             experiences. For this algorithm, assuming that the arrival
             process is Poisson and stationary, it is shown through
             simulations that all ATs experience an equal amount of
             average delay when the system is underloaded, and the same
             packet drop probability when the system is overloaded.
             Furthermore, we propose a modification to the algorithm that
             gives priority to some desired ATs, and reduces their
             relative average delay. Finally, simulation results indicate
             that the algorithm achieves similar short-term average delay
             even when the packet arrival process is not stationary. ©
             2006 IEEE.},
   Doi = {10.1109/ICC.2006.255324},
   Key = {fds336823}
}

@article{fds336824,
   Author = {Jung, YH and Nam, SH and Kim, Y and Chung, J and Tarokh,
             V},
   Title = {Differential spatial multiplexing for two and three transmit
             antennas},
   Journal = {Ieee International Conference on Communications},
   Volume = {7},
   Pages = {3317-3322},
   Publisher = {IEEE},
   Year = {2006},
   Month = {January},
   ISBN = {1424403553},
   url = {http://dx.doi.org/10.1109/ICC.2006.255228},
   Abstract = {In this paper, we construct a differential spatial
             multiplexing method that can trade-off spatial diversity for
             increased transmission rate in differential multi-input
             multi-output (MIMO) systems. To achieve a desired
             multiplexing gain while providing simple encoding and
             decoding, GramSchmidt algorithm is used at the transmitter
             to construct the unitary transmission matrix. In addition,
             by applying optimum scaling factors to generate transmission
             matrix, the symbol error rates can be minimized. Because the
             transmission matrix itself is not the information we are
             interested in, the equivalent channel parameters for each
             transmitted information symbols are calculated and the
             linear signal model for the information symbols is derived.
             Since that model is exactly the same as that of the coherent
             spatial multiplexing, all kinds of coherent detection
             schemes can be directly applied. The advantage of the
             proposed scheme over the differential space-time block codes
             (STBC) and the effects of scaling factor are investigated by
             computer simulation. In high transmission rate regimes, the
             proposed differential spatial multiplexing method can
             outperform the differential STBC having the same transmit
             rate in the signal to noise ratios (SNRs) we are interested
             in. © 2006 IEEE.},
   Doi = {10.1109/ICC.2006.255228},
   Key = {fds336824}
}

@article{fds336832,
   Author = {Choi, YS and Alamouti, SM and Tarokh, V},
   Title = {Complementary beamforming: New approaches},
   Journal = {Ieee Transactions on Communications},
   Volume = {54},
   Number = {1},
   Pages = {41-50},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2006},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCOMM.2005.861674},
   Abstract = {Smart antenna technology can greatly improve the coverage
             radius of wireless systems by focusing the transmitted
             signal (beam) toward desired users. However, beamforming has
             an important side effect as it creates a region, herein
             referred to as the complementary region, where some users in
             the network cannot sense the directional signals (beams). We
             have referred to this as the hidden beam problem in Tarokh.
             From a physical layer perspective, beamforming reduces
             cochannel interference (CCI). However, in systems that use
             medium access-control techniques such as the carrier-sense
             multiple access (CSMA) protocol in wireless local area
             networks, during a busy period of the channel, the users in
             the complementary region may wrongly decide that the medium
             is idle and transmit packets. This may cause CCI,
             unnecessary retransmissions, subsequent backoff, and
             increased network latency. We introduced the concept of
             complementary beamforming (CBF) to address this issue in
             Tarokh. In this paper, we propose two new methods, called
             "subspace complementary beamforming" (SCBF) and
             "complementary superposition beamforming" (CSBF). The SCBF
             uses dummy data to ensure a controlled level of received
             energy in all directions of eigenvectors unused by downlink
             beamforming. The technique works in multipath fading
             channels. The approach achieves similar results to those
             reported in Tarokh. However, it enables the second technique
             (CSBF) which can also send data content in the complementary
             beam. This allows passive nodes in the network to receive
             "broadcast" information, while the active nodes are engaged
             in the exchange of user-specific data. It is shown that CBF
             effects can be achieved simply by increasing the transmit
             power of only one of antenna elements when space-division
             multiple access is not applied. Simulations are provided in
             order to quantify overall network performance improvements
             when using CBF, confirming significant throughput and delay
             performance enhancements. © 2006 IEEE.},
   Doi = {10.1109/TCOMM.2005.861674},
   Key = {fds336832}
}

@article{fds340040,
   Author = {Devroye, N and Mitran, P and Tarokh, V},
   Title = {Cognitive decomposition of wireless networks},
   Journal = {2006 1st International Conference on Cognitive Radio
             Oriented Wireless Networks and Communications},
   Pages = {145-+},
   Publisher = {IEEE},
   Year = {2006},
   Month = {January},
   ISBN = {978-1-4244-0380-6},
   Key = {fds340040}
}

@article{fds340041,
   Author = {Rosenblum, M and Caramanis, C and Goemans, MX and Tarokh,
             V},
   Title = {Approximating fluid schedules in crossbar packet-switches
             and Banyan networks.},
   Journal = {Ieee/Acm Trans. Netw.},
   Volume = {14},
   Pages = {1374-1387},
   Year = {2006},
   url = {http://dx.doi.org/10.1145/1217706},
   Doi = {10.1145/1217706},
   Key = {fds340041}
}

@article{fds336833,
   Author = {Devroye, N and Mitran, P and Tarokh, V},
   Title = {Cognitive multiple access networks},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Volume = {2005},
   Pages = {57-61},
   Publisher = {IEEE},
   Year = {2005},
   Month = {December},
   ISBN = {0780391519},
   url = {http://dx.doi.org/10.1109/ISIT.2005.1523292},
   Abstract = {A cognitive radio can sense the transmission of other users
             in its environment and possibly extract the corresponding
             messages. It can use this information to transmit over the
             same channel while reducing interference from, and to other
             users. In this paper, we define inter/intra-cluster
             competitive, cooperative, and cognitive behavior in wireless
             networks. We define inter-cluster cognitive behavior as
             simultaneous transmissions by two or more clusters in which
             some clusters know the messages to be transmitted by other
             clusters, and so can act as relays or use a Gel'fand-Pinsker
             coding-like technique to mitigate interference. We construct
             an achievable region for the inter-cluster behavior of two
             multiple access channels. In the Gaussian case, we compare
             our achievable region to that of competitive behavior as
             well as that of cooperative behavior.},
   Doi = {10.1109/ISIT.2005.1523292},
   Key = {fds336833}
}

@article{fds336834,
   Author = {Shin, OS and Ghassemzadeh, SS and Greenstein, LJ and Tarokh,
             V},
   Title = {Performance evaluation of MB-OFDM and DS-UWB systems for
             wireless personal area networks},
   Journal = {Icu 2005: 2005 Ieee International Conference on Ultra
             Wideband, Conference Proceedings},
   Volume = {2005},
   Pages = {214-219},
   Year = {2005},
   Month = {December},
   ISBN = {078039397X},
   Abstract = {Ultra-wideband (UWB) radio has been proposed for physical
             layer standard of the future high-speed wireless personal
             area networks (WFANs), One proposal is referred to as
             multi-band orthogonal frequency division multiplexing
             (MB-OFDM), and the other is direct-sequence ultra-wideband
             (DS-UWB). In this paper, we evaluate the performance of
             these physical layers as proposed to the IEEE 802.15 Task
             Group 3a. Specifically, we evaluate and compare the 10%
             outage frame error rate (FER) versus transmit-receive
             distance for the two systems using standard UWB channel
             models. In an AWGN channel, the two approaches yield
             essentially the same performance. In fading channels, the
             MB-OFDM system is shown to outperform the DS-UWB system for
             the assumed receiver structures. However, the relative
             performance ranking turns primarily on the signal processing
             complexity of the receiver, especially at high rates.
             Furthermore, the DS-UWB system is found to be more robust to
             imperfect channel estimation than the MB-OFDM
             system.},
   Key = {fds336834}
}

@article{fds336836,
   Author = {Kim, IM and Hong, SC and Ghassemzadeh, SS and Tarokh,
             V},
   Title = {Opportunistic beamforming based on multiple weighting
             vectors},
   Journal = {Ieee Transactions on Wireless Communications},
   Volume = {4},
   Number = {6},
   Pages = {2683-2687},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2005},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TWC.2005.857999},
   Abstract = {In order to improve the throughput of the opportunistic
             beamforming, the authors generalize the opportunistic
             beamforming by using multiple random weighting vectors at
             each time slot. The base station chooses the best weighting
             vector and performs the opportunistic beamforming with this
             optimum vector. For the case of equally strong independent
             fast Rayleigh fading channels, the throughput of the
             proposed scheme is analytically approximated and the optimum
             number of random weighting vectors per time slot is
             obtained. Numerical results demonstrate that the proposed
             scheme considerably improves the throughput compared to the
             conventional opportunistic beamforming for a low/realistic
             number of users. © 2005 IEEE.},
   Doi = {10.1109/TWC.2005.857999},
   Key = {fds336836}
}

@article{fds336837,
   Author = {Ochiai, H and Mitran, P and Poor, HV and Tarokh, V},
   Title = {Collaborative beamforming for distributed wireless ad hoc
             sensor networks},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {53},
   Number = {11},
   Pages = {4110-4124},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2005},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TSP.2005.857028},
   Abstract = {The performance of collaborative beamforming is analyzed
             using the theory of random arrays. The statistical average
             and distribution of the beampattern of randomly generated
             phased arrays is derived in the framework of wireless ad hoc
             sensor networks. Each sensor node is assumed to have a
             single isotropic antenna and nodes in the cluster
             collaboratively transmit the signal such that the signal in
             the target direction is coherently added in the far-field
             region. It is shown that with N sensor nodes uniformly
             distributed over a disk, the directivity can approach N,
             provided that the nodes are located sparsely enough. The
             distribution of the maximum sidelobe peak is also studied.
             With the application to ad hoc networks in mind, two
             scenarios (closed-loop and open-loop) are considered.
             Associated with these scenarios, the effects of phase jitter
             and location estimation errors on the average beampattern
             are also analyzed. © 2005 IEEE.},
   Doi = {10.1109/TSP.2005.857028},
   Key = {fds336837}
}

@article{fds336838,
   Author = {Chung, J and Nam, SH and Jung, YH and Tarokh, V},
   Title = {Trading-off transmission rate with transmit diversity in
             differential detection},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {61},
   Number = {3},
   Pages = {1638-1641},
   Year = {2005},
   Month = {October},
   Abstract = {In this paper we construct a method where rate can be
             trade-off for diversity in differential detection transmit
             diversity. Specifically, we show for the case 3 and 4
             transmit and M receive anteanns, when using the PSK
             constellation, it is possible to double the rate of
             differential transmit diversity schemes (from 3/4 symbols
             per channel use to 1.5 symbols per channel use) while
             achieving 2(M-1) level diversity with extremely simple
             encoding and decoding. © 2005 IEEE.},
   Key = {fds336838}
}

@article{fds336839,
   Author = {Yim, R and Rosenblum, M and Tarokh, V},
   Title = {Delay bounds for packetizing time-varying fluid policies
             with speedup and lookahead in single server
             systems},
   Journal = {Proceedings Ieee Infocom},
   Volume = {4},
   Pages = {2590-2601},
   Publisher = {IEEE},
   Year = {2005},
   Month = {October},
   ISBN = {0780389689},
   url = {http://dx.doi.org/10.1109/INFCOM.2005.1498543},
   Abstract = {We consider an online, processor sharing system with a
             single server in a packet-switched network where the
             processor multiplexes packets from multiple input ports onto
             the same output link. Under a fluid model, in which incoming
             data is treated as infinitely divisible, the multiplexer
             allocates its output capacity to serve fractions of packets
             from all input ports simultaneously (which we call a fluid
             policy). However, due to the packet nature of the network
             traffic, a multiplexer scheduler must approximate this fluid
             policy by a schedule in which only whole packets are sent
             (which we call a packetized policy). We assume that at each
             time instant, the aggregate service rate demanded by a fluid
             policy is no greater than the output link capacity. Then,
             for a single server with N input ports, and a scheduler
             using speedup s of at least 2 and a lookahead window of L
             ≥ 0 time steps, we prove bounds on worst-case maximum
             additional delay D. In particular, we show that (⌈Ne-s⌉
             - L - 2)+ ≤ D ≤ min {(⌈Ne1-s⌉ - L)+, ⌈Ne -s⌉}.
             In the case when no lookahead is used (L = 0), a tighter
             bound can be obtained: (⌈Ne-s⌉ - 2)+ ≤ D ≤
             ⌈Ne-s⌉. © 2005 IEEE.},
   Doi = {10.1109/INFCOM.2005.1498543},
   Key = {fds336839}
}

@article{fds336840,
   Author = {Kim, IM and Hong, SC and Ghassemzadeh, SS and Tarokh,
             V},
   Title = {Optimum opportunistic beamforming based on multiple
             weighting vectors},
   Journal = {Ieee International Conference on Communications},
   Volume = {4},
   Pages = {2427-2430},
   Year = {2005},
   Month = {September},
   Abstract = {In order to improve the throughput of the opportunistic
             beamforming, we generalize the opportunistic beamforming by
             using multiple random weighting vectors at each time slot.
             The base station chooses the best weighting vector and
             performs the opportunistic beamforming with this optimum
             vector. For the case of equally strong independent fast
             Rayleigh fading channels, we analytically approximate the
             throughput of the proposed scheme and obtain the optimum
             number of random weighting vectors per time slot. Numerical
             results demonstrate that the proposed scheme considerably
             improves the throughput compared to the conventional
             opportunistic beamforming for a low/realistic number of
             users. © 2005 IEEE.},
   Key = {fds336840}
}

@article{fds336841,
   Author = {Mitran, P and Ochiai, H and Tarokh, V},
   Title = {Collaborative diversity enhancements for wireless
             communications},
   Journal = {Ieee International Conference on Communications},
   Volume = {4},
   Pages = {2437-2441},
   Year = {2005},
   Month = {September},
   Abstract = {The use of the spatial dimension is known to greatly
             increase the reliability of quasi-static (non-ergodic)
             wireless channels. In this paper, we demonstrate that most
             of this gain can also be achieved through collaborative
             communications with single-antenna/multiple-antenna nodes
             when there is one receiving agent. In particular, for the
             single antenna case, we consider communication to take place
             between clusters of nearby nodes. We show the existence of
             collaborative codes for communications for which the
             intra-cluster negotiation penalty is in principle small and
             almost all the diversity gain of traditional space-time
             codes may be realized. For example, for single
             transmitter/receiver nodes with two collaborators that have
             as little as 10 dB path loss advantage over the receiver,
             the penalty for collaboration over traditional space-time
             systems is negligible. © 2005 IEEE.},
   Key = {fds336841}
}

@article{fds336842,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Sveinsson, T and Kavčić, A and Tarokh, V},
   Title = {UWB delay profile models for residential and commercial
             indoor environments},
   Journal = {Ieee Transactions on Vehicular Technology},
   Volume = {54},
   Number = {4},
   Pages = {1235-1244},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2005},
   Month = {July},
   url = {http://dx.doi.org/10.1109/TVT.2005.851379},
   Abstract = {We present models for the ultrawideband (UWB) channel delay
             profile in indoor environments, based on the processing of
             two large sets of measured data. Both measurement sets are
             for a center frequency of 5 GHz, but the bandwidths are very
             different - 1.25 GHz and 6 GHz. We model both line-of-sight
             (LOS) and nonline-of-sight (NLOS) paths, and do so for both
             single-family homes and commercial buildings. Also, we
             consider both the profile at a receiver point, which we call
             the multipath intensity profile (MIP), and the locally
             spatially averaged profile, which we call the power delay
             profile (PDP). For both cases, we find that the profile for
             NLOS paths can be modeled as a decaying exponential times a
             noise-like variation with lognormal statistics and that, for
             LOS paths, the profile has the same form plus a strong
             component at the minimum delay. The model consists of
             statistical descriptions of the parameters of these
             functions, including the effects of transmit-receive (T-R)
             distance and of variations from building to building. We
             show simulation results for a few cases to demonstrate that
             the model accurately predicts key properties of the measured
             channels, such as the distribution of rms delay spread. ©
             2005 IEEE.},
   Doi = {10.1109/TVT.2005.851379},
   Key = {fds336842}
}

@article{fds336843,
   Author = {Mitran, P and Ochiai, H and Tarokh, V},
   Title = {Space-time diversity enhancements using collaborative
             communications},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {51},
   Number = {6},
   Pages = {2041-2057},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2005},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TIT.2005.847731},
   Abstract = {The use of the spatial dimension is known to greatly
             increase the reliability of quasi-static (i.e., nonergodic)
             wireless channels. In this paper, it is demonstrated that
             most of this gain can also be achieved through collaborative
             communications with single-antenna/ multiple-antenna nodes
             when there is one receiving agent. In particular, for the
             single-antenna case, communication is considered to take
             place between clusters of nearby nodes. The existence of
             collaborative codes for which the intra-cluster negotiation
             penalty is, in principle, small (and almost all the
             diversity gain of traditional space-time codes may be
             realized) is shown. For example, for a single transmitter
             node with two collaborators and one receiver node, if the
             collaborators have as little as a 10-dB path loss advantage
             over the receiver, the penalty for collaboration over
             traditional space-time systems is negligible. © 2005
             IEEE.},
   Doi = {10.1109/TIT.2005.847731},
   Key = {fds336843}
}

@article{fds336835,
   Author = {Parker, P and Wolfe, PJ and Tarokh, V},
   Title = {A signal processing application of randomized low-rank
             approximations},
   Journal = {Ieee Workshop on Statistical Signal Processing
             Proceedings},
   Volume = {2005},
   Pages = {345-350},
   Year = {2005},
   Month = {January},
   ISBN = {0780394046},
   url = {http://dx.doi.org/10.1109/ssp.2005.1628618},
   Abstract = {Low-rank approximations to linear operators find wide use in
             signal processing. In the discrete case, assuming the
             desired rank is known a priori, such approximations are
             generally calculated using the singular value decomposition.
             In this vein, randomized algorithms have recently been
             developed in the context of theoretical computer science,
             with the goal of achieving approximations arbitrarily close
             to this optimal low-rank solution with very high
             probability. Such algorithms function by finding
             (deterministic) low-rank approximations to random
             submatrices chosen probabilistically - thereby providing
             significant reductions in computational complexity, and
             leading to their applicability even in the case of very
             large matrices. Here it is demonstrated that algorithms of
             this type also show promise in signal processing
             applications, in particular for the case of adaptive
             beamforming in both the narrowband and wideband scenarios.
             Quantitative simulation results are provided to indicate
             that near-optimal nulling performance, as measured in terms
             of signal-to-interference-plus-noise ratio, may be achieved
             via straightforward modifications of the randomized
             algorithms described above. Results indicate that a large
             computational savings is possible, relative to standard
             methods, with little corresponding loss in performance.
             ©2005 IEEE.},
   Doi = {10.1109/ssp.2005.1628618},
   Key = {fds336835}
}

@article{fds336844,
   Author = {Ochiai, H and Mitran, P and Poor, HV and Tarokh, V},
   Title = {On the effects of phase estimation errors on collaborative
             beamforming in wireless ad hoc networks},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {III},
   Publisher = {IEEE},
   Year = {2005},
   Month = {January},
   ISBN = {0780388747},
   url = {http://dx.doi.org/10.1109/ICASSP.2005.1415795},
   Abstract = {The performance of collaborative beamforming is studied
             using the theory of random arrays in the framework of
             wireless sensor networks. With the application to ad hoc
             networks in mind, two scenarios, one denoted closed-loop and
             the other open-loop, are considered. Associated with these
             scenarios, the effects of phase jitter and location
             estimation errors on the average beampattern are analyzed.
             © 2005 IEEE.},
   Doi = {10.1109/ICASSP.2005.1415795},
   Key = {fds336844}
}

@article{fds340042,
   Author = {Parker, P and Wolfe, PJ and Tarokh, V},
   Title = {A signal processing application of randomized low-rank
             approximations},
   Journal = {2005 Ieee/Sp 13th Workshop on Statistical Signal Processing
             (Ssp), Vols 1 and 2},
   Pages = {311-316},
   Publisher = {IEEE},
   Year = {2005},
   Month = {January},
   ISBN = {0-7803-9403-8},
   Key = {fds340042}
}

@article{fds336845,
   Author = {Ochiai, H and Mitran, P and Tarokh, V},
   Title = {Design and analysis of collaborative diversity protocols for
             wireless sensor networks},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {60},
   Number = {7},
   Pages = {4645-4649},
   Year = {2004},
   Month = {December},
   Abstract = {We consider wireless sensor networks where all the sensor
             nodes share the same channel and transmit collaboratively in
             a quasi-static Rayleigh fading environment. Intuition
             suggests that collaborative communication can achieve a
             higher diversity gain than traditional SISO systems. Based
             on a decode-and-forward approach, we propose spectrally
             efficient variable-rate two-phase protocols that can achieve
             full diversity and analyze the effect of node geometry on
             their performance in terms of the outage probability of
             mutual information. Numerical results show that provided the
             collaborator node is close to the source node, full
             diversity gain can be readily achieved without loss of
             bandwidth efficiency. © 2004 IEEE.},
   Key = {fds336845}
}

@article{fds336846,
   Author = {Bellorado, J and Ghassemzadeh, SS and Kavčić, A and Tarokh, B and Tarokh, V},
   Title = {Time-hopping sequence design for narrowband interference
             suppression},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {60},
   Number = {6},
   Pages = {3925-3929},
   Year = {2004},
   Month = {December},
   Abstract = {In this paper, we present a simple interference mitigation
             solution for coexistence of Ultra-Wideband (UWB) systems
             with other wireless systems. Specifically, we consider the
             design of time-hopping codes for UWB systems that deploy
             impulse radio architecture. We give a methodology for the
             construction of TH sequences that minimize the imposed UWB
             interference on a given narrowband system. To illustrate the
             effectiveness of our designed codes, we conduct physical
             layer simulations of the interference induced by UWB signals
             on close proximity wireless local area networks (WLANs) that
             deploy IEEE 802. 11a standard. Our performance measure is
             the IEEE 802.11a client rate degradation vs. distance from
             its Access Point. Our results show that, when using
             optimized TH codes, UWB systems can have no impact on the
             achievable data-rates and range of IEEE 802.11a WLAN
             devices; regardless of the position of the UWB system with
             respect to these devices. © 2004 IEEE.},
   Key = {fds336846}
}

@article{fds336847,
   Author = {Ochiai, H and Mitran, P and Poor, HV and Tarokh, V},
   Title = {Collaborative beamforming in ad hoc networks},
   Journal = {2004 Ieee Information Theory Workshop Proceedings,
             Itw},
   Pages = {396-401},
   Year = {2004},
   Month = {December},
   ISBN = {0780387201},
   Abstract = {The performance of collaborative beamforming is analyzed
             using the theory of random arrays. The statistical average
             and distribution of the beampatterns of randomly generated
             phased arrays are derived in the framework of wireless ad
             hoc sensor networks. Each sensor node is assumed to have a
             single isotropic antenna and nodes in the cluster
             collaboratively transmit the signal such that the signal in
             the target direction is coherently added in the far-field
             region. The distribution of the maximum beampattern sidelobe
             is also analyzed and a closed-form bound is derived based on
             the Gaussian approximation method. ©2004
             IEEE.},
   Key = {fds336847}
}

@article{fds336848,
   Author = {Rosenblum, M and Goemans, MX and Tarokh, V},
   Title = {Universal bounds on buffer size for packetizing fluid
             policies in input queued, crossbar switches},
   Journal = {Proceedings Ieee Infocom},
   Volume = {2},
   Pages = {1126-1134},
   Publisher = {IEEE},
   Year = {2004},
   Month = {November},
   ISBN = {0780383559},
   url = {http://dx.doi.org/10.1109/INFCOM.2004.1356999},
   Abstract = {In this paper, we consider a type of on-line, traffic
             scheduling problem in input queued, crossbar switches. The
             input to a problem, at each time step, is a set of desired
             traffic rates. These traffic rates in general cannot be
             exactly achieved since they assume arbitrarily small
             fractions of packets can be transmitted at each time step.
             The goal of the traffic scheduling problem is to closely
             approximate the given sequence of traffic rates by a
             sequence of switch uses in which only whole packets are
             sent. The focus of this paper is bounding the costs incurred
             in using such an approximation, in terms of the additional
             buffer size required. We establish universal bounds on the
             additional buffer size due to sending only whole packets;
             these bounds do not depend on the particular distribution of
             the input traffic, require no speedup, and guarantee 100%
             throughput. Specifically, for an N × N input queued,
             crossbar switch, an on-line, packetizing algorithm is
             presented that guarantees 100% throughput with a buffer
             requirement of (N + 1) 2 /4 packets per input port with no
             speedup. The algorithm can be improved to run in O(N log N)
             time, using a fast algorithm for edge-coloring bipartite
             multi-graphs. In the reverse direction, it is shown for an N
             × N input queued, crossbar switch, that any on-line,
             packetizing algorithm with no speedup requires a buffer size
             of N/e - 2 packets per input port. We also extend the main
             packetizing algorithm in this paper to a general class of
             switch architectures.},
   Doi = {10.1109/INFCOM.2004.1356999},
   Key = {fds336848}
}

@article{fds336849,
   Author = {Ghassemzadeh, SS and Jana, R and Rice, CW and Turin, W and Tarokh,
             V},
   Title = {Measurement and modeling of an ultra-wide bandwidth indoor
             channel},
   Journal = {Ieee Transactions on Communications},
   Volume = {52},
   Number = {10},
   Pages = {1786-1796},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2004},
   Month = {October},
   url = {http://dx.doi.org/10.1109/TCOMM.2003.820755},
   Abstract = {This paper describes the results of frequency-domain channel
             sounding in residential environments. It consists of
             detailed characterization of complex frequency responses of
             ultra-wideband (UWB) signals having a nominal center
             frequency of 5 GHz. A path loss model as well as a
             second-order autoregressive model is proposed for frequency
             response generation of the UWB indoor channel. Probability
             distributions of the model parameters for different
             locations are presented. Also, time-domain results such as
             root mean square delay spread and percent of captured power
             are presented. © 2004 IEEE.},
   Doi = {10.1109/TCOMM.2003.820755},
   Key = {fds336849}
}

@article{fds336850,
   Author = {Cvetkovic, Z and Tarokh, V and Yoon, S},
   Title = {Frequency synchronization in OFDM},
   Journal = {2015 Ieee International Conference on Acoustics, Speech, and
             Signal Processing (Icassp)},
   Volume = {4},
   Year = {2004},
   Month = {September},
   Abstract = {We present an OFDM frequency synchronization scheme. The
             scheme uses periodic OFDM symbols, similarly to the
             algorithms proposed previously by Morelli and Mengali and
             Schmidl and Cox. The proposed scheme attains considerably
             higher accuracy than the scheme by Schmidl and Cox requiring
             a similar computational load. Compared to the scheme by
             Morelli and Mengali, the proposed algorithm attains a
             somewhat inferior accuracy but at a significantly reduced
             computational complexity, i.e O(N) versus O(N 2) operations
             for N-tone OFDM. In addition to that, the scheme proposed
             here is considerably less sensitive to the accuracy of the
             involved computations than the other two
             schemes.},
   Key = {fds336850}
}

@article{fds336851,
   Author = {Hochwald, BM and Marzetta, TL and Tarokh, V},
   Title = {Multiple-antenna channel hardening and its implications for
             rate feedback and scheduling},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {50},
   Number = {9},
   Pages = {1893-1909},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2004},
   Month = {September},
   url = {http://dx.doi.org/10.1109/TIT.2004.833345},
   Abstract = {Wireless data traffic is expected to grow over the next few
             years and the technologies that will provide data services
             are still being debated. One possibility is to use multiple
             antennas at base stations and terminals to get very high
             spectral efficiencies in rich scattering environments. Such
             multiple-input/multiple-output (MIMO) channels can then be
             used in conjunction with scheduling and rate-feedback
             algorithms to further increase channel throughput. This
             paper provides an analysis of the expected gains due to
             scheduling and bits needed for rate feedback. Our analysis
             requires an accurate approximation of the distribution of
             the MIMO channel mutual information. Because the exact
             distribution of the mutual information in a Rayleigh-fading
             environment is difficult to analyze, we prove a central
             limit theorem for MIMO channels with a large number of
             antennas. While the growth in average mutual information
             (capacity) of a MIMO channel with the number of antennas is
             well understood, it turns out that the variance of the
             mutual information can grow very slowly or even shrink as
             the number of antennas grows. We discuss implications of
             this "channel-hardening" result for data and voice services,
             scheduling, and rate feedback. We also briefly discuss the
             implications when shadow fading effects are included. ©
             2004 IEEE.},
   Doi = {10.1109/TIT.2004.833345},
   Key = {fds336851}
}

@article{fds336852,
   Author = {Nam, SH and Hwang, CS and Chung, J and Tarokh, V},
   Title = {Differential space time block codes using QAM for four
             transmit antennas},
   Journal = {Ieee International Conference on Communications},
   Volume = {2},
   Pages = {952-956},
   Year = {2004},
   Month = {August},
   Abstract = {We develop differential space time block codes (STBC) using
             non-constant modulus constellations for four transmit
             antennas. The proposed method improves on the conventional
             differential STBC techniques because of the larger minimum
             distances of non-constant modulus constellations. The
             transmitted signals are modulated using pulse amplitude
             modulation (PAM). Encoding is similar to that of the
             conventional differential STBC, while the receiver is
             different. The signal at the receiver is divided by the
             estimated channel power and then decoded using a
             conventional QAM decoder which treats pairs of transmited
             PAM symbols transmitted from two transmit antennas as one
             QAM symbol. For transmission rates greater than 2
             bits/channel use, the proposed method outperforms the
             conventional differential STBC.},
   Key = {fds336852}
}

@article{fds336853,
   Author = {Chong, CV and Venkataramani, R and Tarokh, V},
   Title = {Erratum: A new construction of 16-QAM Golay complementary
             sequences (IEEE Trans. Informa. Theory (2003) 49,
             (2953-2959))},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {50},
   Number = {6},
   Pages = {1374},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2004},
   Month = {June},
   url = {http://dx.doi.org/10.1109/TIT.2004.828158},
   Doi = {10.1109/TIT.2004.828158},
   Key = {fds336853}
}

@article{fds336854,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Sveinsson, T and Tarokh,
             V},
   Title = {An Impulse Response Model For Residential Wireless
             Channels},
   Journal = {Conference Record / Ieee Global Telecommunications
             Conference},
   Volume = {3},
   Pages = {1211-1215},
   Publisher = {IEEE},
   Year = {2003},
   Month = {December},
   ISBN = {0780379748},
   url = {http://dx.doi.org/10.1109/glocom.2003.1258431},
   Abstract = {We present a statistical model for the Multipath Intensity
             Profile (MIP) that can be used to construct an impulse
             response of a residential wireless channel. The model
             incorporates relevant parameters such as distance, global
             rms delay spread and the correlation between received
             multipaths. It describes the statistics of the MIP in
             detail. This model, together with a suitable path loss
             model, can be used to simulate residential wireless channels
             for performance evaluation of various communication systems.
             The MIP model is based on over 300,000 indoor frequency
             responses measured in a 1.25GHz bandwidth centered on 5-GHz,
             and simulation shows that it captures very well the main
             statistical properties of the measured data.},
   Doi = {10.1109/glocom.2003.1258431},
   Key = {fds336854}
}

@article{fds336855,
   Author = {Bellorado, J and Ghassemzadeh, SS and Greenstein, LJ and Sveinsson,
             T and Tarokh, V},
   Title = {Coexistence of Ultra-Wideband Systems with IEEE-802.1la
             Wireless LANs},
   Journal = {Conference Record / Ieee Global Telecommunications
             Conference},
   Volume = {1},
   Pages = {410-414},
   Year = {2003},
   Month = {December},
   Abstract = {In this study we provide a physical layer based analysis of
             the coexistence issues of Ultra-Wideband (UWB) with other
             devices in the same spectrum. Specifically, we have focused
             on the UWB interference to and from devices using the
             Wireless Local Area Network (WLAN) standard IEEE 802.11a.
             Our results indicate that a UWB interferer operating at the
             peak allowable power density induces minimal interference
             into such WLAN devices in line-of sight (LOS) scenarios,
             even at close range. However, in the non-LOS (NLOS) case, a
             UWB interferer can severely affect the data-rate sustainable
             by 802.1 la systems. Moreover, 802.11a interference into UWB
             systems is shown to reduce the signal-to-interference ratio
             (SIR) by as much as 36 dB when the interferer is within LOS
             of the UWB receiver.},
   Key = {fds336855}
}

@article{fds336856,
   Author = {Hwang, CS and Nam, SH and Chung, J and Tarokh, V},
   Title = {Differential space time block codes using QAM
             constellations},
   Journal = {Ieee International Symposium on Personal, Indoor and Mobile
             Radio Communications, Pimrc},
   Volume = {2},
   Pages = {1693-1697},
   Publisher = {IEEE},
   Year = {2003},
   Month = {December},
   ISBN = {0780378229},
   url = {http://dx.doi.org/10.1109/PIMRC.2003.1260403},
   Abstract = {We propose differential space time block codes (STBC) using
             quadrature amplitude modulation (QAM), which can not be
             utilized in the conventional differential STBC. Since QAM
             constellations have a larger minimum distance compared with
             phase shift keying (PSK), the proposed method has the
             advantage of SNR gain compared with conventional
             differential STBC. The QAM signals are encoded in a manner
             similar to that of conventional differential STBCs. To
             decode QAM signals, the signals received are normalized by
             the channel power estimated forgoing training symbols, and
             then decoded with a conventional QAM decoder. When the
             transmission rate is more than 3 bits/channel use in time
             varying channels, the simulation results demonstrate that
             the proposed method with the channel power estimation
             outperforms the conventional differential STBC. © 2003
             IEEE.},
   Doi = {10.1109/PIMRC.2003.1260403},
   Key = {fds336856}
}

@article{fds336858,
   Author = {Tarokh, V and Choi, YS and Alamouti, S},
   Title = {Complementary beamforming},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {58},
   Number = {5},
   Pages = {3136-3140},
   Publisher = {IEEE},
   Year = {2003},
   Month = {December},
   ISBN = {0780379543},
   url = {http://dx.doi.org/10.1109/vetecf.2003.1286205},
   Abstract = {We present complementary beamforming techniques which enable
             the formation of multiple directional beams to some users
             while guaranteeing a minimum power level to the rest of the
             users in the network. These techniques can be used for many
             different applications such as beamforming in wireless
             networks that employ channel sensing for medium
             access.},
   Doi = {10.1109/vetecf.2003.1286205},
   Key = {fds336858}
}

@article{fds336861,
   Author = {Chong, CV and Venkataramani, R and Tarokh, V},
   Title = {A New Construction of 16-QAM Golay Complementary
             Sequences},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {49},
   Number = {11},
   Pages = {2953-2959},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TIT.2003.818418},
   Abstract = {We present a new construction of 16-QAM Golay sequences of
             length n = 2m, The number of constructed sequences is (14 +
             12m) (m!/2)4 m+1. When employed as a code in an orthogonal
             frequency-division multiplexing (OFDM) system; this set of
             sequences has a peak-to-mean envelope power ratio (PMEPR) of
             3.6. By considering two specific subsets of these sequences,
             we obtain new codes with PMEPR bounds of 2.0 and 2.8 and
             respective code sizes of (2 + 2m) (m!/2)4m+1 and (4 + 4m)
             (m!/2)4 m+1. These are larger than previously known codes
             for the same PMEPR bounds.},
   Doi = {10.1109/TIT.2003.818418},
   Key = {fds336861}
}

@article{fds336862,
   Author = {Hwang, CS and Nam, SH and Chung, J and Tarokh, V},
   Title = {Differential space time block codes using nonconstant
             modulus constellations},
   Journal = {Ieee Transactions on Signal Processing},
   Volume = {51},
   Number = {11},
   Pages = {2955-2964},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {November},
   url = {http://dx.doi.org/10.1109/TSP.2003.818157},
   Abstract = {We propose differential space time block codes (STBC) using
             nonconstant modulus constellations, e.g., quadrature
             amplitude modulation (QAM), which cannot be utilized in the
             conventional differential STBC. Since QAM constellations
             have a larger minimum distance compared with the phase shift
             keying (PSK), the proposed method has the advantage of
             signal-to-noise ratio (SNR) gain compared with conventional
             differential STBC. The QAM signals are encoded in a manner
             similar to that of the conventional differential STBC. To
             decode nonconstant modulus signals, the received signals are
             normalized by the channel power estimated forgoing training
             symbols and then decoded with a conventional QAM decoder.
             Assuming the knowledge of the channel power at the receiver,
             the symbol error rate (SER) bound of the proposed method
             under independent Rayleigh fading assumption is derived,
             which shows better SER performance than the conventional
             differential STBC. When the transmission rate is more than 3
             bits/channel use in time-varying channels, the simulation
             results demonstrate that the proposed method with the
             channel power estimation outperforms the conventional
             differential STBC. Specifically, the posed method using the
             channel power estimation obtains a 7.3 dB SNR gain at a
             transmission rate of 6 bits/channel use in slow fading
             channels. Although the performance gap between the proposed
             method and the conventional one decreases as the Doppler
             frequency increases, the proposed method still exhibits
             lower SER than the conventional one, provided the estimation
             interval L is chosen carefully.},
   Doi = {10.1109/TSP.2003.818157},
   Key = {fds336862}
}

@article{fds336863,
   Author = {Ghassemzadeh, SS and Tarokh, V},
   Title = {UWB path loss characterization in residential
             environments},
   Journal = {Ieee Radio Frequency Integrated Circuits Symposium, Rfic,
             Digest of Technical Papers},
   Pages = {501-504},
   Publisher = {IEEE},
   Year = {2003},
   Month = {August},
   ISBN = {0780376943},
   url = {http://dx.doi.org/10.1109/rfic.2003.1213994},
   Abstract = {In this paper, we describe a simple method for measurement
             of the Ultra-Wideband Band (UWB) frequency response for
             evaluation of the path loss and impulse response of the UWB
             indoor channel. We propose a simple statistical path loss
             model for the residential channel that is based on over
             300,000 frequency response measurements. The Probability
             distributions of the model parameters for different
             locations are presented.},
   Doi = {10.1109/rfic.2003.1213994},
   Key = {fds336863}
}

@article{fds336864,
   Author = {Ghassemzadeh, SS and Tarokh, V},
   Title = {UWB path loss characterization in residential
             environments},
   Journal = {2017 Ieee Mtt S International Microwave Symposium
             (Ims)},
   Volume = {1},
   Pages = {365-368},
   Year = {2003},
   Month = {August},
   Abstract = {In this paper, we describe a simple method for measurement
             of the Ultra-Wideband Band (UWB) frequency response for
             evaluation of the path loss and impulse response of the UWB
             indoor channel We propose a simple statistical path loss
             model for the residential channel that is based on over
             300,000 frequency response measurements. The Probability
             distributions of the model parameters for different
             locations are presented.},
   Key = {fds336864}
}

@article{fds340043,
   Author = {Biglieri, E and Tarokh, V and Simon, MK},
   Title = {Special issue on coding and signal processing for MIMO
             system},
   Journal = {Journal of Communications and Networks},
   Volume = {5},
   Number = {2},
   Pages = {93-95},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {June},
   url = {http://dx.doi.org/10.1109/jcn.2003.6596571},
   Doi = {10.1109/jcn.2003.6596571},
   Key = {fds340043}
}

@article{fds336865,
   Author = {Kim, IM and Tarokh, V},
   Title = {Variable-rate space-time block codes in M-ary PSK
             systems},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {21},
   Number = {3},
   Pages = {362-373},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {April},
   url = {http://dx.doi.org/10.1109/JSAC.2003.809697},
   Abstract = {We consider a multiple antenna system when combined array
             processing with space-time coding is used. We present
             variable rate space-time block codes for two, three, and
             four transmit antennas and optimize the transmit power so
             that the average bit-error rate (BER) is minimized.
             Numerical results show that this optimum power allocation
             scheme provides significant gain over the equal power
             allocation scheme. We then classify all the variable rate
             space-time block codes having the same code rates and
             identify the unique code that achieves the lowest BER. We
             explicitly compute the performance of the variable rate
             codes over a Rayleigh-fading channel. The proposed variable
             rate space-time block codes are useful for unequal error
             protection in multiple transmit antenna systems.},
   Doi = {10.1109/JSAC.2003.809697},
   Key = {fds336865}
}

@article{fds336866,
   Author = {Sotiriadis, PP and Tarokh, V and Chandrakasan,
             AP},
   Title = {Energy reduction in VLSI computation modules: An
             information-theoretic approach},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {49},
   Number = {4},
   Pages = {790-808},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {April},
   url = {http://dx.doi.org/10.1109/TIT.2003.809601},
   Abstract = {We consider the problem of reduction of computation cost by
             introducing redundancy in the number of ports as well as in
             the input and output sequences of computation modules. Using
             our formulation, the classical "communication scenario" is
             the case when a computation module has to recompute the
             input sequence at a different location or time with high
             fidelity and low bit-error rates. We then consider
             communication with different computational cost objective
             than that given by bit-error rate. An example is
             communication over deep submicrometer very-large scale
             integration (VLSI) buses where the expected energy
             consumption per communicated information bit is the cost of
             computation. We treat this scenario using tools from
             information theory and establish fundamental bounds on the
             achievable expected energy consumption per bit in deep
             submicrometer VLSI buses as a function of their utilization.
             Some of our results also shed light on coding schemes that
             achieve these bounds. We then prove that the best tradeoff
             between the expected energy consumption per bit and bus
             utilization can be achieved using codes constructed from
             typical sequences of Markov stationary ergodic processes. We
             use this observation to give a closed-form expression for
             the best tradeoff between the expected energy consumption
             per bit and the utilization of the bus. This expression, in
             principle, can be computed using standard numerical methods.
             The methodology developed here naturally extends to more
             general computation scenarios.},
   Doi = {10.1109/TIT.2003.809601},
   Key = {fds336866}
}

@article{fds336857,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Kavčić, A and Sveinsson, T and Tarokh, V},
   Title = {UWB indoor path loss model for residential and commercial
             buildings},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {58},
   Number = {5},
   Pages = {3115-3119},
   Publisher = {IEEE},
   Year = {2003},
   Month = {January},
   ISBN = {0780379543},
   url = {http://dx.doi.org/10.1109/vetecf.2003.1286197},
   Abstract = {We present a statistical model for the path loss of
             ultra-wideband channels in indoor environments. In contrast
             to previous measurements, the data reported here are for a
             bandwidth of 6 GHz rather than 1.25 GHz; they encompass
             commercial buildings in addition to single-family homes (20
             of each); and local spatial averaging is included. As
             before, the center frequency is 5.0 GHz. Separate models are
             given for commercial and residential environments and-within
             each category - for line-of-sight (LOS) and
             non-line-of-sight (NLS) paths. All four models have the same
             mathematical structure, differing only in their numerical
             parameters. The two new models (LOS and NLS) for residences
             closely match those derived from the previous measurements,
             thus affirming the stability of our path loss modeling. For
             greater accuracy, we therefore pool the two data sets in our
             final models for residences. We find that the path loss
             statistics for the two categories of buildings are quite
             similar.},
   Doi = {10.1109/vetecf.2003.1286197},
   Key = {fds336857}
}

@article{fds336859,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Kavčić, A and Sveinsson, T and Tarokh, V},
   Title = {UWB indoor delay profile model for residential and
             commercial environments},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {58},
   Number = {5},
   Pages = {3120-3125},
   Publisher = {IEEE},
   Year = {2003},
   Month = {January},
   ISBN = {0780379543},
   url = {http://dx.doi.org/10.1109/vetecf.2003.1286198},
   Abstract = {We present a statistical model for the delay profile of
             ultra-wideband channels in indoor environments. Two kinds of
             profiles are defined, namely the multipath intensity profile
             (MIP) and the power delay profile (PDF). The MIP is he delay
             profile at a point in space, while the PDF is a local
             spatial average. The model is based on 60,000 complex
             frequency response measurements from 20 commercial buildings
             and 20 residential homes, with the transmitter and receiver
             both in line-of-sight (LOS) and non-line-of-sight (NLS) of
             each other. Simulations using the PDF model show excellent
             statistical agreement with the measured data.},
   Doi = {10.1109/vetecf.2003.1286198},
   Key = {fds336859}
}

@article{fds336860,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Kavčić, A and Sveinsson, T and Tarokh, V},
   Title = {An empirical indoor path loss model for ultra-wideband
             channels},
   Journal = {Journal of Communications and Networks},
   Volume = {5},
   Number = {4},
   Pages = {303-307},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {January},
   url = {http://dx.doi.org/10.1109/jcn.2003.6596612},
   Abstract = {We present a statistical model for the path loss of
             ultra-wideband (UWB) channels in indoor environments. In
             contrast to our previously reported measurements, the data
             reported here are for a bandwidth of 6GHz rather than
             1.25GHz; they encompass commercial buildings in addition to
             single-family homes (20 of each); and local spatial
             averaging is included. As before, the center frequency is
             5.0GHz. Separate models are given for commercial and
             residential environments and, within each category, for
             line-of-sight (LOS) and non-line-of-sight (NLS) paths. All
             four models have the same mathematical structure, differing
             only in their numerical parameters. The two new models (LOS
             and NLS) for residences closely match those derived from the
             previous measurements, thus affirming the stability of our
             path loss modeling. We find, also, that the path loss
             statistics for the two categories of buildings are quite
             similar.},
   Doi = {10.1109/jcn.2003.6596612},
   Key = {fds336860}
}

@article{fds336867,
   Author = {Ghassemzadeh, SS and Greenstein, LJ and Sveinsson, T and Tarokh,
             V},
   Title = {A multipath intensity profile model for residential
             environments},
   Journal = {Ieee Wireless Communications and Networking Conference,
             Wcnc},
   Volume = {1},
   Pages = {150-155},
   Publisher = {IEEE},
   Year = {2003},
   Month = {January},
   ISBN = {0780377001},
   url = {http://dx.doi.org/10.1109/WCNC.2003.1200336},
   Abstract = {We describe a statistical model for the multipath intensity
             profile (MIP) in residential environments. The work is based
             on over 300,000 frequency response measurements at 712
             locations in 23 homes. We show that, for non-line-of-sight
             (NLS) path, the MIP is well-modeled as a decaying
             exponential vs. delay, multiplied by a lognormal process
             over delay; and that a similar model applies to
             line-of-sight (LOS) paths. Moreover, we present simple
             statistical descriptions for the parameters of these
             functions.},
   Doi = {10.1109/WCNC.2003.1200336},
   Key = {fds336867}
}

@article{fds333011,
   Author = {Tarokh, V and Naguib, A and Seshadri, N and Calderbank,
             AR},
   Title = {Erratum: Space-time codes for high data rate wireless
             communications: Performance criteria in the presence of
             channel estimation errors, mobility, and multiple paths
             (IEEE Trans. Commun. (1999) 47, (199-207))},
   Journal = {Ieee Transactions on Communications},
   Volume = {51},
   Number = {12},
   Pages = {2141},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2003},
   Month = {January},
   url = {http://dx.doi.org/10.1109/TCOMM.2003.822179},
   Doi = {10.1109/TCOMM.2003.822179},
   Key = {fds333011}
}

@article{fds340044,
   Author = {Ghassemzadeh, SS and Tarokh, V},
   Title = {Invited - UWB path loss characterization in residential
             environments},
   Journal = {2017 Ieee Mtt S International Microwave Symposium
             (Ims)},
   Pages = {365-368},
   Publisher = {IEEE},
   Editor = {Thal, H},
   Year = {2003},
   Month = {January},
   ISBN = {0-7803-7695-1},
   Key = {fds340044}
}

@article{fds336868,
   Author = {Tarokh, V and Kim, IM},
   Title = {Existence and construction of noncoherent unitary space-time
             codes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {48},
   Number = {12},
   Pages = {3112-3117},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2002},
   Month = {December},
   url = {http://dx.doi.org/10.1109/TIT.2002.805075},
   Abstract = {We consider transmission using N transmit and reception
             using M receive antennas in a wireless environment assuming
             that neither the transmitter nor the receiver knows the
             channel coefficients. For the scenario that the transmission
             employs noncoherent T × N unitary space-time codes and for
             a block-fading channel model where the channel is static
             during T channel uses and varies from T channel uses to the
             other, we establish the bound r ≤ min(T - N, N) on the
             diversity advantage rM provided by the code. In order to
             show that the requirement r ≤ min(T - N, N) cannot he
             relaxed, for any given R, N, T, and r ≤ min(T - N, N), we
             then construct unitary T × N space-time codes of rate R
             that guarantee diversity advantage rM. Two constructions are
             given that are also amenable to simple encoding and
             noncoherent maximum-likelihood (ML) decoding
             algorithms.},
   Doi = {10.1109/TIT.2002.805075},
   Key = {fds336868}
}

@article{fds341281,
   Author = {Slock, D and Tarokh, V and Xia, X-G},
   Title = {Editorial},
   Journal = {Eurasip Journal on Advances in Signal Processing},
   Volume = {2002},
   Number = {3},
   Publisher = {Springer Science and Business Media LLC},
   Year = {2002},
   Month = {December},
   url = {http://dx.doi.org/10.1155/s1110865702001968},
   Doi = {10.1155/s1110865702001968},
   Key = {fds341281}
}

@article{fds336871,
   Author = {Chong, CV and Tarokh, V},
   Title = {Two constructions of 16-QAM Golay complementary
             sequences},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {240},
   Year = {2002},
   Month = {September},
   Abstract = {Two constructions of 16-quadrature amplitude modulation
             (QAM) Golay complementary sequences from 4-QAM complementary
             sequences were presented. These sequences can be applied as
             pilot sequences in future orthogonal frequency division
             miltiplexing (OFDM) systems. The symbols from the first
             4-QAM sequence were denoted as major coordinates, and the
             symbols from the other sequence was denoted as minor
             coordinates.},
   Key = {fds336871}
}

@article{fds336872,
   Author = {Sotiriadis, PP and Tarokh, V and Chandrakasan,
             A},
   Title = {Energy reduction and fundamental energy limits in digital
             VLSI circuits},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {393},
   Publisher = {IEEE},
   Year = {2002},
   Month = {September},
   ISBN = {0780375017},
   url = {http://dx.doi.org/10.1109/isit.2002.1023665},
   Abstract = {Energy reduction and fundamental energy limits in digital
             VLSI circuits were discussed. Bus was used to calculate the
             minimum cost of energy since its cost function is known.
             Results can be extended to units modelled as finite state
             machines and can also be used to calculate other energy
             costs objectives such as time.},
   Doi = {10.1109/isit.2002.1023665},
   Key = {fds336872}
}

@article{fds336870,
   Author = {Slock, D and Tarokh, V and Xia, XG},
   Title = {Editorial},
   Journal = {Eurasip Journal on Applied Signal Processing},
   Volume = {2002},
   Number = {5},
   Pages = {445-446},
   Publisher = {Springer Nature},
   Year = {2002},
   Month = {May},
   url = {http://dx.doi.org/10.1155/S1110865702001920},
   Doi = {10.1155/S1110865702001920},
   Key = {fds336870}
}

@article{fds336873,
   Author = {Slock, D and Tarokh, V and Xia, NG},
   Title = {Applied Signal Processing: Editorial},
   Journal = {Eurasip Journal on Applied Signal Processing},
   Number = {3},
   Pages = {209-210},
   Year = {2002},
   Month = {March},
   Key = {fds336873}
}

@article{fds336869,
   Author = {Haas, SM and Shapiro, JH and Tarokh, V},
   Title = {Space-time codes for wireless optical communications},
   Journal = {Eurasip Journal on Applied Signal Processing},
   Volume = {2002},
   Number = {3},
   Pages = {211-220},
   Publisher = {Springer Nature},
   Year = {2002},
   Month = {January},
   url = {http://dx.doi.org/10.1155/s1110865702000604},
   Abstract = {A space-time channel coding technique is presented for
             overcoming turbulence-induced fading in an atmospheric
             optical heterodyne communication system that uses multiple
             transmit and receive apertures. In particular, a design
             criterion for minimizing the pairwise probability of
             codeword error in a space-time code (STC) is developed from
             a central limit theorem approximation. This design criterion
             maximizes the mean-to-standard-deviation ratio of the
             received energy difference between codewords. It leads to
             STCs that are a subset of the previously reported STCs for
             Rayleigh channels, namely those created from orthogonal
             designs. This approach also extends to other fading channels
             with independent, zero-mean path gains. Consequently, for
             large numbers of transmit and receive antennas, STCs created
             from orthogonal designs minimize the pairwise codeword error
             probability for this larger class of fading
             channels.},
   Doi = {10.1155/s1110865702000604},
   Key = {fds336869}
}

@article{fds336874,
   Author = {Tarokh, V and Hochwald, BM},
   Title = {Existence and construction of block interleavers},
   Journal = {Ieee International Conference on Communications},
   Volume = {3},
   Pages = {1855-1857},
   Publisher = {IEEE},
   Year = {2002},
   Month = {January},
   ISBN = {0780374002},
   url = {http://dx.doi.org/10.1109/ICC.2002.997169},
   Abstract = {The necessary and sufficient conditions on the existence of
             (N1, N2) block interleavers of block size L, were
             established. The interleaver was found to exist on the
             condition that L ≥ N1N2. Explicit algebraic expressions
             were also provided. It was proved that the rectangular
             interleavers were not optimal.},
   Doi = {10.1109/ICC.2002.997169},
   Key = {fds336874}
}

@article{fds336875,
   Author = {Sotiriadis, PP and Chandrakasan, A and Tarokh,
             V},
   Title = {Maximum achievable energy reduction using coding with
             applications to deep sub-micron buses},
   Journal = {Proceedings Ieee International Symposium on Circuits and
             Systems},
   Volume = {1},
   Year = {2002},
   Month = {January},
   Abstract = {In this work we ask: How much can we reduce the power
             consumption in deep-sub-micron buses using coding
             techniques? We answer the question in two steps. First we
             give the minimum energy per information bit required for
             communicating through deep-sub-micron buses. Then, we show
             that the minimum energy is asymptotically achievable using
             coding. In addition, a simple differential coding scheme is
             proposed that achieves most of the possible energy
             reduction. The methodology used here also applies to more
             general communication and computation models.},
   Key = {fds336875}
}

@article{fds336876,
   Author = {Turin, W and Jana, R and Ghassemzadeh, SS and Rice, CW and Tarokh,
             V},
   Title = {Autoregressive modeling of an indoor UWB
             channel},
   Journal = {2002 Ieee Conference on Ultra Wideband Systems and
             Technologies, Uwbst 2002 Digest of Papers},
   Pages = {71-74},
   Publisher = {IEEE},
   Year = {2002},
   Month = {January},
   ISBN = {0780374967},
   url = {http://dx.doi.org/10.1109/UWBST.2002.1006321},
   Abstract = {Based on frequency domain measurements in the 4.375-5.625
             GHz band a channel model for the frequency response of the
             indoor radio channel is introduced. In particular. a
             second-order Autoregressive (AR) model is proposed for
             frequency response generation of the ultra wide band indoor
             channel. A complete characterization of the model parameters
             is described along with probability distributions and
             dependencies between parameters. © 2002
             IEEE.},
   Doi = {10.1109/UWBST.2002.1006321},
   Key = {fds336876}
}

@article{fds336877,
   Author = {Ghassemzadeh, SS and Jana, R and Rice, CW and Turin, W and Tarokh,
             V},
   Title = {A statistical path loss model for in-home UWB
             channels},
   Journal = {2002 Ieee Conference on Ultra Wideband Systems and
             Technologies, Uwbst 2002 Digest of Papers},
   Pages = {59-64},
   Publisher = {IEEE},
   Year = {2002},
   Month = {January},
   ISBN = {0780374967},
   url = {http://dx.doi.org/10.1109/UWBST.2002.1006319},
   Abstract = {This paper describes a simple statistical model for
             evaluating the path loss in residential environments. It
             consists of detailed characterization of path loss model
             parameters of ultra-wideband band (UWB) signals having a
             nominal center frequency of 5 GHz. The proposed statistical
             path loss model is for the in-home channel and it is based
             on over 300,000 frequency response measurements. Probability
             distributions of the model parameters for different
             locations are presented. Also, time domain results such as
             RMS delay spread and percent of captured power are
             presented. © 2002 IEEE.},
   Doi = {10.1109/UWBST.2002.1006319},
   Key = {fds336877}
}

@article{fds336878,
   Author = {Kim, IM and Tarokh, V},
   Title = {Variable rate sapce-time block codes in MPSK
             systems},
   Journal = {Conference Record Asilomar Conference on Signals, Systems
             and Computers},
   Volume = {2},
   Pages = {1122-1126},
   Year = {2002},
   Month = {January},
   Abstract = {We consider a multiple antenna system when combined array
             processing with space-time coding is used [2]. We present
             variable rate space-time block codes for two, three, and
             four transmit antennas and optimize the transmit power so
             that the average BER is minimized. Numerical results show
             that this optimum power allocation scheme provides
             significant gain over the equal power allocation scheme. We
             then classify all the variable rate space-time block codes
             having the same code rates and Identify the unique code that
             achieves the lowest BER. We explicitly compute the
             performance of the variable rate codes over a Rayleigh
             fading channel. The proposed variable rate space-time block
             codes are useful for unequal error protection in multiple
             transmit antenna systems.},
   Key = {fds336878}
}

@article{fds336884,
   Author = {Chong, CV and Tarokh, V},
   Title = {A simple encodable/decodable OFDM QPSK code with low
             peak-to-mean envelope power ratio},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {47},
   Number = {7},
   Pages = {3025-3029},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2001},
   Month = {November},
   url = {http://dx.doi.org/10.1109/18.959282},
   Abstract = {We present a quadrature phase-shift keying (QPSK) coding
             scheme for multicarrier communications. The scheme supports
             simple encoding and extremely simple maximum-likelihood (ML)
             decoding algorithms for orthogonal frequency-division
             multiplexing (OFDM). Moreover, all the codewords have
             peak-to-mean envelope power ratio (PMEPR) of at most 6
             dB.},
   Doi = {10.1109/18.959282},
   Key = {fds336884}
}

@article{fds336879,
   Author = {Chong, CV and Tarokh, V},
   Title = {A simple encodable/decodable OFDM QPSK code with low
             peak-to-mean envelope power ratio},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {315},
   Year = {2001},
   Month = {September},
   Abstract = {We present a QPSK coding scheme for use in multicarrier
             communications. The scheme supports simple encoding and
             extremely simple maximum likelihood (ML) decoding algorithms
             for orthogonal frequency division multiplexing (OFDM)
             applications. Moreover, all the codewords have peak-to-mean
             envelope power ratio (PMEPR) of at most 4.},
   Key = {fds336879}
}

@article{fds336883,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Multiple transmit antenna differential detection from
             generalized orthogonal designs},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {47},
   Number = {6},
   Pages = {2626-2631},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2001},
   Month = {September},
   url = {http://dx.doi.org/10.1109/18.945280},
   Abstract = {We explicitly construct multiple transmit antenna
             differential encoding/decoding schemes based on generalized
             orthogonal designs. These constructions generalize the two
             transmit antenna differential detection scheme that we
             proposed before.},
   Doi = {10.1109/18.945280},
   Key = {fds336883}
}

@article{fds336880,
   Author = {Rößing, C and Tarokh, V},
   Title = {A construction of OFDM 16-QAM sequences having low peak
             powers},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {47},
   Number = {5},
   Pages = {2091-2094},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2001},
   Month = {January},
   url = {http://dx.doi.org/10.1109/18.930949},
   Abstract = {Using a realization of 16-QAM as set addition of two scaled
             versions of the 4-PSK constellation, we construct 16-QAM
             sequences having low peak-to-mean envelope power ratios
             (PMEPR) from 4-PSK Golay sequences. Various upper bounds on
             the peak envelope powers of these sequences are established.
             Transmission using these sequences provides twice as much
             rate as transmission using complementary Golay sequences
             with a maximum PMEPR of 3.6 (5.56dB).},
   Doi = {10.1109/18.930949},
   Key = {fds336880}
}

@article{fds336881,
   Author = {Haas, SM and Shapiro, JH and Tarokh, V},
   Title = {Space-time codes for wireless optical channels},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {244},
   Publisher = {IEEE},
   Year = {2001},
   Month = {January},
   url = {http://dx.doi.org/10.1109/ISIT.2001.936107},
   Abstract = {A space-time channel coding technique is presented for
             overcoming turbulence-induced fading in an atmospheric
             optical communication system that uses multiple transmit and
             receive apertures. In particular, a design criterion for
             minimizing the pairwise probability of codeword error in a
             space-time code (STC) is developed from a central limit
             theorem approximation. This design criterion maximizes the
             ratio of mean to standard deviation of the received energy
             difference between codewords. It leads to STCs that are a
             subset of the previously reported STCs for Rayleigh
             channels, namely those created from orthogonal
             designs.},
   Doi = {10.1109/ISIT.2001.936107},
   Key = {fds336881}
}

@article{fds336882,
   Author = {Medvedev, I and Tarokh, V},
   Title = {A channel-shortening multiuser detector for DS-CDMA
             systems},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {3},
   Number = {53ND},
   Pages = {1834-1838},
   Publisher = {IEEE},
   Year = {2001},
   Month = {January},
   ISBN = {0780367286},
   url = {http://dx.doi.org/10.1109/vetecs.2001.945011},
   Abstract = {The multiple-access interference (MAI) encountered by
             Direct-Sequence Code-Division Multiple Access (DS-CDMA)
             users in a multipath environment is a key issue in the
             detection of mobile communication users. The MAI is one of
             the major reasons for the degradation in performance of
             multiuser communication systems over single-user systems.
             Although the optimum detection technique, Maximum-Likelihood
             Sequence Estimation (MLSE), is well known, its complexity is
             exponential with the number of users, which makes it
             computationally unattractive. This paper presents a
             multiuser detector that performs close to the optimum MLSE
             while drastically reducing the decoding complexity. The
             detection technique is based on a channel-shortening
             algorithm and will allow for group detection of a subset of
             the users via the MLSE.},
   Doi = {10.1109/vetecs.2001.945011},
   Key = {fds336882}
}

@article{fds336885,
   Author = {Paterson, KG and Tarokh, V},
   Title = {On the existence and construction of good codes with low
             peak-to-average power ratios},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {217},
   Publisher = {IEEE},
   Year = {2000},
   Month = {December},
   ISBN = {0780358570},
   url = {http://dx.doi.org/10.1109/isit.2000.866515},
   Abstract = {The peak-to-average power ratio PAPR(C) of a code C is an
             important characteristic of that code when it is used in
             OFDM communications. We establish bounds on the region of
             achievable triples (R, d, PAPR(C)) where R is the code rate
             and d is the minimum Euclidean distance of the code. We
             prove a lower bound on PAPR in terms of R and d and show
             that there exist asymptotically good codes whose PAPR is at
             most 8 log n. We give explicit constructions of
             error-correcting codes with low PAPR by employing bounds for
             hybrid exponential sums over Galois fields and
             rings.},
   Doi = {10.1109/isit.2000.866515},
   Key = {fds336885}
}

@article{fds336888,
   Author = {Paterson, KG and Tarokh, V},
   Title = {On the existence and construction of good codes with low
             peak-to-average power ratios},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {46},
   Number = {6},
   Pages = {1974-1987},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2000},
   Month = {September},
   url = {http://dx.doi.org/10.1109/18.868473},
   Abstract = {The first lower bound on the peak-to-average power ratio
             (PAPR) of a constant energy code of a given length n,
             minimum Euclidean distance and rate is established.
             Conversely, using a nonconstructive Varshamov-Gilbert style
             argument yields a lower bound on the achievable rate of a
             code of a given length, minimum Euclidean distance and
             maximum PAPR. The derivation of these bounds relies on a
             geometrical analysis of the PAPR of such a code. Further
             analysis shows that there exist asymptotically good codes
             whose PAPR is at most 8 log n. These bounds motivate the
             explicit construction of error-correcting codes with low
             PAPR. Bounds for exponential sums over Galois fields and
             rings are applied to obtain an upper bound of order (log n)2
             on the PAPRs of a constructive class of codes, the trace
             codes. This class includes the binary simplex code, duals of
             binary, primitive Bose-Chaudhuri-Hocquenghem (BCH) codes and
             a variety of their nonbinary analogs. Some open problems are
             identified.},
   Doi = {10.1109/18.868473},
   Key = {fds336888}
}

@article{fds336886,
   Author = {Tarokh, V and Jafarkhani, H},
   Title = {Differential detection scheme for transmit
             diversity},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {18},
   Number = {7},
   Pages = {1169-1174},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2000},
   Month = {July},
   url = {http://dx.doi.org/10.1109/49.857917},
   Abstract = {We present a transmission scheme for exploiting diversity
             given by two transmit antennas when neither the transmitter
             nor the receiver has access to channel state information.
             The new detection scheme can use equal energy constellations
             and encoding is simple. At the receiver, decoding is
             achieved with low decoding complexity. The transmission
             provides full spatial diversity and requires no channel
             state side information at the receiver. The scheme can be
             considered as the extension of differential detection
             schemes to two transmit antennas.},
   Doi = {10.1109/49.857917},
   Key = {fds336886}
}

@article{fds336887,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Image clustering using fuzzy graph theory},
   Journal = {Smart Structures and Materials 2005: Active Materials:
             Behavior and Mechanics},
   Volume = {3972},
   Pages = {245-252},
   Year = {2000},
   Month = {January},
   Abstract = {We propose an image clustering algorithm which uses fuzzy
             graph theory. First, we define a fuzzy graph and the concept
             of connectivity for a fuzzy graph. Then, based on our
             definition of connectivity we propose an algorithm which
             finds connected subgraphs of the original fuzzy graph. Each
             connected subgraph can be considered as a cluster. As an
             application of our algorithm, we consider a database of
             images. We calculate a similarity measure between any pairs
             of images in the database and generate the corresponding
             fuzzy graph. Then, we find the subgraphs of the resulting
             fuzzy graph using our algorithm. Each subgraph corresponds
             to a cluster. We apply our image clustering algorithm to the
             key frames of news programs to find the anchorperson
             clusters. Simulation results show that our algorithm is
             successful to find most of anchorperson frames from the
             database.},
   Key = {fds336887}
}

@article{fds336889,
   Author = {Tarokh, V and Jafarkhani, H},
   Title = {On the computation and reduction of the peak-to-average
             power ratio in multicarrier communications},
   Journal = {Ieee Transactions on Communications},
   Volume = {48},
   Number = {1},
   Pages = {37-44},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2000},
   Month = {January},
   url = {http://dx.doi.org/10.1109/26.818871},
   Abstract = {For any code C defined over an equal energy constellation,
             it is first shown that at any time instance, the problem of
             determining codewords of C with high peak-to-average power
             ratios (PAPR) in a multicarrier communication system is
             intimately related to the problem of minimum-distance
             decoding of C. Subsequently, a method is proposed for
             computing the PAPR by minimum-distance decoding of C at many
             points of time. Moreover, an upper bound on the error
             between this computed value and the true one is derived.
             Analogous results are established for codes defined over
             arbitrary signal constellations. As an application of this
             computational method, an approach for reducing the PAPR of C
             proposed by Jones and Wilkinson is revisited. This approach
             is based on introducing a specific phase shift to each
             coordinate of all the codewords where phase shift are
             independent of the codewords and known both to the
             transmitter and the receiver. We optimize the phase shifts
             offline by applying our method for computing the PAPR for
             the coding scenario proposed by ETSI BRAN Standardization
             Committee. Reductions of order 4.5 dB can be freely obtained
             using the computed phase shifts. Examples are provided
             showing that most of the grain is preserved when the
             computed optimal phase shifts are rounded to quantenary
             phase-shift keying (PSK), 8-PSK, and 16-PSK type phase
             shifts.},
   Doi = {10.1109/26.818871},
   Key = {fds336889}
}

@article{fds340045,
   Author = {Tarokh, V and Jafarkhani, H and Calderbank, AR},
   Title = {Correction to "Space-time block codes from orthogonal
             designs"},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {46},
   Number = {1},
   Pages = {314-314},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {2000},
   Month = {January},
   url = {http://dx.doi.org/10.1109/tit.2000.1282193},
   Doi = {10.1109/tit.2000.1282193},
   Key = {fds340045}
}

@article{fds336894,
   Author = {Tarokh, V and Vardy, A and Zeger, K},
   Title = {Universal bound on the performance of lattice
             codes},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {45},
   Number = {2},
   Pages = {670-681},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.749010},
   Abstract = {We present a lower bound on the probability of symbol error
             for maximum-likelihood decoding of lattices and lattice
             codes on a Gaussian channel. The bound is tight for error
             probabilities and signal-to-noise ratios of practical
             interest, as opposed to most existing bounds that become
             tight asymptotically for high signal-to-noise ratios. The
             bound is also universal; it provides a limit on the highest
             possible coding gain that may be achieved, at specific
             symbol error probabilities, using any lattice or lattice
             code in n dimensions. In particular, it is shown that the
             effective coding gains of the densest known lattices are
             much lower than their nominal coding gains. The asymptotic
             (as n - behavior of the new bound is shown to coincide with
             the Shannon limit for Gaussian channels. © 1999
             IEEE.},
   Doi = {10.1109/18.749010},
   Key = {fds336894}
}

@article{fds336890,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Design of successively refinable trellis-coded
             quantizers},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {45},
   Number = {5},
   Pages = {1490-1497},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.771148},
   Abstract = {We propose successively refinable trellis-coded quantizers
             for progressive transmission. (Progressive transmission is
             an essential component of image and multimedia browsing
             systems.) A new trellis structure which is scalable is used
             in the design of our trellis-coded quantizers. A
             hierarchical set partitioning is developed to preserve
             successive refinability. Two algorithms for designing
             trellis-coded quantizers which provide embedded bit streams
             are provided. The computational complexity of the proposed
             schemes is compared with that of trellis-coded quantization.
             Simulation results show excellent performances for
             memoryless sources. © 1999 IEEE.},
   Doi = {10.1109/18.771148},
   Key = {fds336890}
}

@article{fds336891,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Multiple description trellis-coded quantization},
   Journal = {Ieee Transactions on Communications},
   Volume = {47},
   Number = {6},
   Pages = {799-802},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {December},
   url = {http://dx.doi.org/10.1109/26.771331},
   Abstract = {We present a construction of multiple description
             trellis-coded quantizers. We use the tensor product of
             trellises to build a trellis which is applicable to multiple
             description coding. The problems of index assignment and set
             partitioning for the resulting trellis are considered. The
             Viterbi algorithm provides the best path for encoding and
             the design procedure utilizes a generalized Lloyd algorithm.
             The encoding process simultaneously generates all the
             transmitted sequences. Furthermore, the complexity of the
             scheme is almost independent of the rate. The quantizer
             provides remarkable performance with little encoding
             complexity. © 1999 IEEE.},
   Doi = {10.1109/26.771331},
   Key = {fds336891}
}

@article{fds336893,
   Author = {Paterson, KG and Tarokh, V},
   Title = {On the existence and construction of good codes with low
             peak-to-average power ratios},
   Journal = {Hp Laboratories Technical Report},
   Number = {51},
   Year = {1999},
   Month = {April},
   Abstract = {The first lower bound on the peak-to-average power ratio
             (PAPR) of a constant energy code of a given length n,
             minimum Euclidean distance and rate is established.
             Conversely, using a non-constructive Varshamov-Gilbert style
             argument yields a lower bound on the achievable rate of a
             code of a given length, minimum Euclidean distance and
             maximum PAPR. The derivation of these bounds relies on a
             geometrical analysis of the PAPR of such a code. Further
             analysis shows that there exist asymptotically good codes
             whose PAPR is at most 8 log n. These bounds motivate the
             explicit construction of error-correcting codes with low
             PAPR. Bounds for exponential sums over Galois fields and
             rings are applied to obtain an upper bound of order (log n)2
             on the PAPRs of a constructive class of codes, the trace
             codes. This class includes the binary simplex code, duals of
             binary, primitive BCH codes and a variety of their
             non-binary analogues. Some open problems are
             identified.},
   Key = {fds336893}
}

@article{fds333012,
   Author = {Tarokh, V and Jafarkhani, H and Calderbank, AR},
   Title = {Space-time block coding for wireless communications:
             Performance results},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {17},
   Number = {3},
   Pages = {451-460},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {March},
   url = {http://dx.doi.org/10.1109/49.753730},
   Abstract = {We document the performance of space-time block codes [13],
             [14], which provide a new paradigm for transmission over
             Rayleigh fading channels using multiple transmit antennas.
             Data is encoded using a space-time block code, and the
             encoded data is split into n streams which are
             simultaneously transmitted using n transmit antennas. The
             received signal at each receive antenna is a linear
             superposition of the n transmitted signals perturbed by
             noise. Maximum likelihood decoding is achieved in a simple
             way through decoupling of the signals transmitted from
             different antennas rather than joint detection. This uses
             the orthogonal structure of the space-time block code and
             gives a maximum likelihood decoding algorithm which is based
             only on linear processing at the receiver. We review the
             encoding and decoding algorithms for various codes and
             provide simulation results demonstrating their performance.
             It is shown that using multiple transmit antennas and
             space-time block coding provides remarkable performance at
             the expense of almost no extra processing.},
   Doi = {10.1109/49.753730},
   Key = {fds333012}
}

@article{fds336895,
   Author = {Tarokh, V and Jafarkhnni, H},
   Title = {A differential detection scheme for transmit
             diversity},
   Journal = {Ieee Wireless Communications and Networking Conference,
             Wcnc},
   Volume = {3},
   Pages = {1043-1047},
   Publisher = {IEEE},
   Year = {1999},
   Month = {January},
   ISBN = {0780356683},
   url = {http://dx.doi.org/10.1109/WCNC.1999.796832},
   Abstract = {We present a transmission scheme for exploiting diversity
             given by two transmit antennas when neither the transmitter
             nor the receiver has access to channel state information.
             The new detection scheme can use PSK constellations and
             encoding is simple. At the receiver, decoding is achieved
             with low decoding complexity. The transmission provides full
             spatial diversity and requires no channel state side
             information at the receiver. The scheme can be thought as
             the extension of differential detection schemes to two
             transmit antennas.},
   Doi = {10.1109/WCNC.1999.796832},
   Key = {fds336895}
}

@article{fds336896,
   Author = {Lo, T and Tarokh, V},
   Title = {Space-time block coding-from a physical perspective},
   Journal = {Ieee Wireless Communications and Networking Conference,
             Wcnc},
   Volume = {1},
   Pages = {150-153},
   Publisher = {IEEE},
   Year = {1999},
   Month = {January},
   ISBN = {0780356683},
   url = {http://dx.doi.org/10.1109/WCNC.1999.797804},
   Abstract = {Space-time block coding (STBC) is an effective transmit
             diversity scheme. It was presented previously by in terms of
             coding and decoding by Alamouti (see IEEE J. Select. Areas
             Commun., vol.16, no.8, p.1451-58, 1998) and by Tarokh,
             Jafarkhani and Calderbank (see IEEE Trans. Inform. Theory,
             1999). Here, STBC is examined from a different perspective;
             namely the radiation patterns resulting from simultaneous
             transmission from multiple transmit antennas.},
   Doi = {10.1109/WCNC.1999.797804},
   Key = {fds336896}
}

@article{fds336897,
   Author = {Tarokh, V and Jafarkhani, H},
   Title = {Algorithm for reducing the peak to average power ratio in a
             multicarrier communications system},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {1},
   Pages = {680-684},
   Year = {1999},
   Month = {January},
   ISBN = {0780354354},
   Abstract = {One of the main implementation disadvantages of a
             multicarrier communication system is the possibly high peak
             to average power ratio of the transmitted signals. One
             proposed solution is given by Jones and Wilkinson. It is
             based on applying a specific phase shift (not dependent on
             the codeword) to each dimension of the transmitted
             codewords. These phase shifts are known both to the
             transmitter and the receiver. Thus the phase shifts can be
             compensated for in the receiver without changing the
             distance properties of the code. Therefore, neither the rate
             nor the code performance is sacrificed. The phases need only
             once be computed off-line and the complexity of the system
             does not increase. Our combination is to provide an
             algorithm to compute the phases that minimize the maximum
             peak to average power ratio taken over all possible
             transmitted signals. The new algorithm enables us to apply
             the Jones-Wilkinson method to various medium length as well
             as long codes of practical interest, a computational task
             for which no solution was known before. We apply our
             algorithm to some of the codes adapted for use in the
             physical layer of future wireless local area networks by the
             ETSI BRAN Hiperlan-II standardization committee. We report
             the computed reductions in peak to average power
             ratio.},
   Key = {fds336897}
}

@article{fds336898,
   Author = {Tarokh, V},
   Title = {Space-time codes for high data rate wireless communication:
             performance criteria in the presence of channel estimation
             errors, mobility, and multiple paths},
   Journal = {Ieee Transactions on Communications},
   Volume = {47},
   Number = {2},
   Pages = {199-207},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {January},
   url = {http://dx.doi.org/10.1109/26.752125},
   Abstract = {Space-time coding is a bandwidth and power efficient method
             of communication over fading channels that realizes the
             benefits of multiple transmit antennas. Specific codes have
             been constructed using design criteria derived for
             quasi-static flat Rayleigh or Rician fading, where channel
             state information is available at the receiver. It is
             evident that the practicality of space-time codes will be
             greatly enhanced if the derived design criteria remain valid
             in the absence of perfect channel state information. It is
             even more desirable that the design criteria not be unduly
             sensitive to frequency selectivity and to the Doppler
             spread. This paper presents a theoretical study of these
             issues beginning with the effect of channel estimation
             error. Here it is assumed that a channel estimator extracts
             fade coefficients at the receiver and for constellations
             with constant energy, it is proved that in the absence of
             ideal channel state information the design criteria for
             space-time codes is still valid. The analysis also
             demonstrates that standard channel estimation techniques can
             be used in conjunction with space-time codes provided that
             the number of transmit antennas is small. We also derive the
             maximum-likelihood detection metric in the presence of
             channel estimation errors. Next, the effect of multiple
             paths on the performance of space-time codes is studied for
             a slowly changing Rayleigh channel. It is proved that the
             presence of multiple paths does not decrease the diversity
             order guaranteed by the design criteria used to construct
             the space-time codes. Similar results hold for rapid fading
             channels with or without multiple paths. The conclusion is
             that the diversity order promised by space-time coding is
             achieved under a variety of mobility conditions and
             environmental effects.},
   Doi = {10.1109/26.752125},
   Key = {fds336898}
}

@article{fds336892,
   Author = {Tarokh, V and Naguib, A},
   Title = {Combined array processing and space-time
             coding},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {45},
   Number = {4},
   Pages = {1121-1128},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {January},
   url = {http://dx.doi.org/10.1109/18.761255},
   Abstract = {The information capacity of wireless communication systems
             may be increased by employing multiple transmit and receiver
             antennas. The goal of the system design is to exploit this
             capacity in a practical way. To increase data rate over
             wireless channels, space-time coding techniques appropriate
             to multiple transmit antennas are employed. These space-time
             codes introduce temporal and spatial correlation into
             signals transmitted from different antennas to provide
             diversity at the receiver, and coding gain over the uncoded
             system. The encoding and decoding complexity are reduced by
             partitioning the antennas at the transmitter into small
             groups, and using individual space-time code, called
             component codes, to transmit information from each group of
             antennas.},
   Doi = {10.1109/18.761255},
   Key = {fds336892}
}

@article{fds333013,
   Author = {Tarokh, V and Jafarkhani, H and Calderbank, AR},
   Title = {Space-time block codes from orthogonal designs},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {45},
   Number = {5},
   Pages = {1456-1467},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1999},
   Month = {January},
   url = {http://dx.doi.org/10.1109/18.771146},
   Abstract = {The theory of space-time block coding is presented as a
             simple and elegant method for transmission using multiple
             transmit antennas in a wireless Rayleigh/Rician environment.
             These codes have a very simple maximum-likelihood decoding
             algorithm which is only based on linear processing. Designs
             that correspond to combined coding and linear processing at
             the transmitter are also considered.},
   Doi = {10.1109/18.771146},
   Key = {fds333013}
}

@article{fds336899,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Multiple description trellis coded quantization},
   Journal = {Ieee International Conference on Image Processing},
   Volume = {1},
   Pages = {669-673},
   Publisher = {IEEE Comput. Soc},
   Year = {1998},
   Month = {December},
   ISBN = {0818688211},
   url = {http://dx.doi.org/10.1109/icip.1998.723587},
   Abstract = {We present a construction of multiple description trellis
             coded quantizers. We use the tensor product of trellises to
             build a trellis which is applicable to multiple description
             coding. The problems of index assignment and set
             partitioning for the resulting trellis are considered. The
             Viterbi algorithm provides the best path for encoding and
             the design procedure utilizes a generalized Lloyd algorithm.
             The encoding process simultaneously generates all the
             transmitted sequences. Furthermore, the complexity of the
             scheme is almost independent of the rate. The quantizer
             provides remarkable performance with little encoding
             complexity.},
   Doi = {10.1109/icip.1998.723587},
   Key = {fds336899}
}

@article{fds336900,
   Author = {Agrawal, D and Tarokh, V and Naguib, A and Seshadri,
             N},
   Title = {Space-time coded OFDM for high data-rate wireless
             communication over wideband channels},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {3},
   Pages = {2232-2236},
   Year = {1998},
   Month = {December},
   Abstract = {The space-time coded orthogonal frequency division
             multiplexing (OFDM) scheme is described to provide high
             data-rate wireless communication over wideband channels.
             Simulation results for a 4-PSK 16 state space-time coded
             OFDM system are presented. The proposed scheme is capable of
             reliable transmission at relatively lower signal to noise
             ratio in variety of delay profiles, thus making it a robust
             alternative.},
   Key = {fds336900}
}

@article{fds333014,
   Author = {Tarokh, V and Naguib, A and Seshadri, N and Calderbank,
             AR},
   Title = {Recent progress in space-time block and trellis
             coding},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {314},
   Publisher = {IEEE},
   Year = {1998},
   Month = {December},
   url = {http://dx.doi.org/10.1109/ISIT.1998.708919},
   Abstract = {Techniques for transmission and reception over wireless
             channels using multiple transmit antennas are presented. ©
             1998 IEEE.},
   Doi = {10.1109/ISIT.1998.708919},
   Key = {fds333014}
}

@article{fds333017,
   Author = {Tarokh, V and Seshadri, N and Calderbank, AR},
   Title = {Space-time codes for high data rate wireless communication:
             Performance criterion and code construction},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {44},
   Number = {2},
   Pages = {744-765},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1998},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.661517},
   Abstract = {We consider the design of channel codes for improving the
             data rate and/or the reliability of communications over
             fading channels using multiple transmit antennas. Data is
             encoded by a channel code and the encoded data is split into
             n streams that are simultaneously transmitted using n
             transmit antennas. The received signal at each receive
             antenna is a linear superposition of the n transmitted
             signals perturbed by noise. We derive performance criteria
             for designing such codes under the assumption that the
             fading is slow and frequency nonselective. Performance is
             shown to be determined by matrices constructed from pairs of
             distinct code sequences. The minimum rank among these
             matrices quantifies the diversity gain, while the minimum
             determinant of these matrices quantifies the coding gain.
             The results are then extended to fast fading channels. The
             design criteria are used to design trellis codes for high
             data rate wireless communication. The encoding/decoding
             complexity of these codes is comparable to trellis codes
             employed in practice over Gaussian channels. The codes
             constructed here provide the best tradeoff between data
             rate, diversity advantage, and trellis complexity.
             Simulation results are provided for 4 and 8 PSK signal sets
             with data rates of 2 and 3 bits/symbol, demonstrating
             excellent performance that is within 2-3 dB of the outage
             capacity for these channels using only 64 state encoders. ©
             1998 IEEE.},
   Doi = {10.1109/18.661517},
   Key = {fds333017}
}

@article{fds333016,
   Author = {Naguib, AF and Tarokh, V and Seshadri, N and Calderbank,
             AR},
   Title = {A space-time coding modem for high-data-rate wireless
             communications},
   Journal = {Ieee Journal on Selected Areas in Communications},
   Volume = {16},
   Number = {8},
   Pages = {1459-1477},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1998},
   Month = {October},
   url = {http://dx.doi.org/10.1109/49.730454},
   Abstract = {This paper presents the theory and practice of a new
             advanced modem technology suitable for high-data-rate
             wireless communications and presents its performance over a
             frequency-flat Rayleigh fading channel. The new technology
             is based on space-time coded modulation (STCM) [1]-[5] with
             multiple transmit and/or multiple receive antennas and
             orthogonal pilot sequence insertion (O-PSI). In this
             approach, data is encoded by a space-time (ST) channel
             encoder and the output of the encoder is split into N
             streams to be simultaneously transmitted using N transmit
             antennas. The transmitter inserts periodic orthogonal pilot
             sequences in each of the simultaneously transmitted bursts.
             The receiver uses those pilot sequences to estimate the
             fading channel. When combined with an appropriately designed
             interpolation filter, accurate channel state information
             (CSI) can be estimated for the decoding process. Simulation
             results of the proposed modem, as applied to the IS-136
             cellular standard, are presented. We present the frame error
             rate (FER) performance results as a function of the
             signal-to-noise ratio (SNR) and the maximum Doppler
             frequency, in the presence of timing and frequency offset
             errors. Simulation results show that for 10% FER, a 32-state
             eight-phase-shift keyed (8-PSK) ST code with two transmit
             and two receive antennas can support data rates up to 55.8
             kb/s on a 30-kHz channel, at an SNR of 11.7 dB and a maximum
             Doppler frequency of 180 Hz. Simulation results for other
             codes and other channel conditions are also provided. We
             also compare the performance of the proposed STCM scheme
             with delay-diversity schemes and conclude that STCM can
             provide significant SNR improvement over simple delay
             diversity.},
   Doi = {10.1109/49.730454},
   Key = {fds333016}
}

@article{fds336901,
   Author = {Tarokh, V and Lo, TKY},
   Title = {Principal ratio combining for fixed wireles applications
             when transmitter diversity is employed},
   Journal = {Ieee Communications Letters},
   Volume = {2},
   Number = {8},
   Pages = {223-225},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1998},
   Month = {August},
   url = {http://dx.doi.org/10.1109/4234.709438},
   Abstract = {We present a near-optimal detection method for decoding
             codes appropriate to transmission using multiple transmit
             antennas in a fixed wireless environment. The method is a
             nontrivial generalization of maximum ratio combining. This
             reduces the decoding complexity at the expense of some
             sacrifice in performance.},
   Doi = {10.1109/4234.709438},
   Key = {fds336901}
}

@article{fds336902,
   Author = {Jafarkhani, H and Tarokh, V},
   Title = {Successively refinable trellis coded quantization},
   Journal = {Data Compression Conference Proceedings},
   Pages = {83-92},
   Publisher = {IEEE Comput. Soc},
   Year = {1998},
   Month = {January},
   ISBN = {0818684062},
   url = {http://dx.doi.org/10.1109/dcc.1998.672134},
   Abstract = {We propose successively refinable trellis coded quantizers
             which are suitable for progressive transmission. A new
             trellis structure which is scalable is used in the design of
             our trellis coded quantizers. A hierarchical set
             partitioning is used to preserve successive refinability.
             Two algorithms for designing trellis coded quantizers which
             provide embedded bit streams are provided. The computational
             complexity of the proposed schemes is compared with that of
             trellis coded quantization. Simulation results show good
             performances for memoryless sources.},
   Doi = {10.1109/dcc.1998.672134},
   Key = {fds336902}
}

@article{fds336903,
   Author = {Tarokh, V and Alamouti, SM and Poon, P},
   Title = {New detection schemes for transmit diversity with no channel
             estimation},
   Journal = {Icupc 1998 Ieee 1998 International Conference on Universal
             Personal Communications, Conference Proceedings},
   Volume = {2},
   Pages = {917-920},
   Publisher = {IEEE},
   Year = {1998},
   Month = {January},
   ISBN = {0780351061},
   url = {http://dx.doi.org/10.1109/ICUPC.1998.733643},
   Abstract = {We present two new detection methods for the simple transmit
             diversity scheme proposed by Alamouti (see IEEE Journal on
             Selected Areas of Communications, Special Issue on Signal
             Processing for Wireless Communications, 1998). The new
             detection schemes require no channel state information at
             either the transmitter or the receiver. Using 2 transmit
             antennas and 1 receive antenna, the scheme provides a
             diversity order of two. Simulations have been included to
             show that the scheme has almost a 3 dB penalty compared to
             coherent detection.},
   Doi = {10.1109/ICUPC.1998.733643},
   Key = {fds336903}
}

@article{fds336904,
   Author = {Alamouti, SM and Tarokh, V and Poon, P},
   Title = {Trellis-coded modulation and transmit diversity: Design
             criteria and performance evaluation},
   Journal = {Icupc 1998 Ieee 1998 International Conference on Universal
             Personal Communications, Conference Proceedings},
   Volume = {1},
   Pages = {703-707},
   Publisher = {IEEE},
   Year = {1998},
   Month = {January},
   ISBN = {0780351061},
   url = {http://dx.doi.org/10.1109/ICUPC.1998.733058},
   Abstract = {This paper presents the selection criteria for trellis codes
             used with the simple transmit diversity scheme proposed in
             Alamouti (1998) and reviewed in this paper. The optimum
             metrics for soft decision Viterbi decoding are derived and
             the asymptotic coding gains are calculated. The design
             method achieves both coding gain and a diversity order of 2
             using 2 transmit antennas and 1 receive antenna. It is also
             demonstrated that trellis codes optimized for AWGN are also
             optimal for use in conjunction with the transmit diversity
             scheme in Rayleigh fading.},
   Doi = {10.1109/ICUPC.1998.733058},
   Key = {fds336904}
}

@article{fds336905,
   Author = {Tarokh, V and Lo, TKY},
   Title = {Principal ratio combining for fixed wireless applications
             when transmitter diversity is employed},
   Journal = {Icupc 1998 Ieee 1998 International Conference on Universal
             Personal Communications, Conference Proceedings},
   Volume = {2},
   Pages = {907-909},
   Publisher = {IEEE},
   Year = {1998},
   Month = {January},
   ISBN = {0780351061},
   url = {http://dx.doi.org/10.1109/ICUPC.1998.733641},
   Abstract = {We present a near-optimal detection method for decoding
             codes appropriate to transmission using multiple transmit
             antennas in a fixed wireless environment. The method is a
             non-trivial generalization of maximum ratio combining. This
             reduces the decoding complexity at the expense of some
             sacrifice in performance.},
   Doi = {10.1109/ICUPC.1998.733641},
   Key = {fds336905}
}

@article{fds333015,
   Author = {Tarokh, V and Jafarkhani, H and Calderbank, AR},
   Title = {The application of orthogonal designs to wireless
             communication},
   Journal = {1998 Information Theory Workshop, Itw 1998},
   Pages = {46-47},
   Publisher = {IEEE},
   Year = {1998},
   Month = {January},
   ISBN = {0780344081},
   url = {http://dx.doi.org/10.1109/ITW.1998.706408},
   Abstract = {We introduce space-block codzng, a new paradigm for
             transmission over Rayleigh fading channels using multiple
             transmit antennas. Data is encoded using a space-block code
             and the encoded data is split into n streams which are
             simultaneously transmitted using n transmit antennas. The
             received signal at each receive antenna is a linear
             superposition of the n transmitted signal perturbed by
             noise. Decoding is achieved in a simple way using the
             orthogonal structure of tlie space-block code and maximum
             likelihood decoding algorithm is totally based on linear
             processing at the receiver. Space-black codes are designed
             to achieve the maximum diversity gain of transmit and
             receive antennas with the constraint of having a simple
             decoding algorithm. It is shown that the classical
             mathematical framework of orthogonal designs can be applied
             to construct cliannel codes which have a simple decoding
             algorithm, while providing tlie full spatial diversity
             order. Space-block codes constructed in this way only exist
             for few sporadic values of n and therefore there is a need
             for a new mathematical theory. In this light, we introduce
             the theory of Generalzzed Deszgns which provides codes for
             both real and complex constellations for any number of
             transmit antennas. Using this theory, we construct
             space-block codes that achieve the maximum possible
             transmission rate for any number of transmit antennas using
             any arbitrary real constellation such as PAM. For any
             arbitrary complex constellation such as PSK and QAM, we
             construct space-block codes that achieve half of the maximum
             possible transmission rate for any number of transmit
             antennas. For tlie specific cases of two, three and four
             transmit antennas, we provide space-block codes that achieve
             respectively the whole, 3/4 and 3/4 of maximum possible
             transmission rate using arbitrary complex constellations.
             The best trade-off between tlie decoding delay and the
             number of transmit antennas is also computed and it is shown
             that the designed codes are optimal in this sense as well.
             Various fundamental problems are posed which are both
             inatliematically appealing and have immediate application to
             the design of a physical layer for wireless communication
             systems.},
   Doi = {10.1109/ITW.1998.706408},
   Key = {fds333015}
}

@article{fds336906,
   Author = {Tarokh, V and Vardy, A},
   Title = {Upper bounds on trellis complexity of lattices},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {385},
   Publisher = {IEEE},
   Year = {1997},
   Month = {December},
   ISBN = {0780339568},
   url = {http://dx.doi.org/10.1109/ISIT.1997.613322},
   Abstract = {Unlike block codes, n-dimensional lattices can have minimal
             trellis diagrams with an arbitrarily large number of states,
             branches, and paths. We show by a counter-example that there
             is no f(n), a function of n, such that all rational lattices
             of dimension n have a trellis with less than f(n) states.
             Nevertheless, we prove that if Λ is a sublattice of Zn then
             it has a trellis T, such that the maximum number of states
             in T is upper bounded by the volume of Λ. Furthermore,
             using a theorem due to Hermite, we show that every integral
             lattice Λ has a trellis T, such that the total number of
             paths in T can be bounded from above in terms of the volume
             of Λ. The resulting bounds are exponential in the dimension
             n and are seldom tight. Nonetheless, these are the first
             known general upper bounds on trellis complexity of
             lattices. © 1997 IEEE.},
   Doi = {10.1109/ISIT.1997.613322},
   Key = {fds336906}
}

@article{fds336907,
   Author = {Tarokh, V and Vardy, A and Zeger, K},
   Title = {Sequential decoding of lattice codes},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {497},
   Publisher = {IEEE},
   Year = {1997},
   Month = {December},
   ISBN = {0780339568},
   url = {http://dx.doi.org/10.1109/ISIT.1997.613434},
   Abstract = {We consider lattice tree-codes based on a lattice Λ having
             a finite trellis diagram T. Such codes are easy to encode
             and benefit from the structure of Λ . Sequential decoding
             of lattice tree-codes is studied, and the corresponding Fano
             (1963) metric is derived. An upper bound on the running time
             of the sequential decoding algorithm is established, and
             found to resemble the Pareto distribution. Our bound
             indicates that the order of label groups in T plays an
             important role in determining the complexity of sequential
             decoding. Furthermore, it is proved that lattice tree-codes
             of arbitrarily high rate, based on Λ and T, can be
             sequentially decoded with the same complexity, and without
             any possibility of buffer overflow. © 1997
             IEEE.},
   Doi = {10.1109/ISIT.1997.613434},
   Key = {fds336907}
}

@article{fds336908,
   Author = {Naguib, AF and Tarokh, V and Seshadri, N and Colderbank,
             AR},
   Title = {Space-time coded modulation for high data rate wireless
             communications},
   Journal = {Conference Record / Ieee Global Telecommunications
             Conference},
   Volume = {1},
   Pages = {102-109},
   Year = {1997},
   Month = {December},
   Abstract = {This paper presents the theory and practice of a new
             advanced modem technology suitable for high data rate
             wireless communications and presents its performance over a
             frequency-flat Rayleigh fading channel. The new technology
             is based on space-time coded modulation (STCM) with multiple
             transmit and/or multiple receive antennas and orthogonal
             pilot sequence insertion (O-PSI). In this approach data is
             encoded by a space-time channel encoder and the output of
             the encoder is split into N streams to be simultaneously
             transmitted using N transmit antennas. The transmitter
             inserts periodic orthogonal pilot sequences in each of the
             simultaneously transmitted bursts. The receiver uses those
             pilot sequences to estimate the fading channel. When
             combined with an appropriately designed interpolation
             filter, accurate channel state information (CSI) can be
             estimated for the decoding process. Simulation results of
             the proposed modem as applied to the IS-136 cellular
             standard are presented. We present the frame error rate
             (PER) performance as a function of the signal to noise ratio
             (SNR) and Doppler spread in the presence of timing and
             frequency offset errors. Simulation results show that, for
             examples, for 10% PER, data rates up to 54 kbps per a 30 kHz
             channel can be supported at a SNR of 11.7 dB and a Doppler
             spread of 180 Hz using a 32-state 8-PSK space-time code with
             2 transmit and 2 receive antennas. Simulation results for
             other cases are also provided.},
   Key = {fds336908}
}

@article{fds336909,
   Author = {Tarokh, V and Vardy, A},
   Title = {Upper bounds on trellis complexity of lattices},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {43},
   Number = {4},
   Pages = {1294-1300},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1997},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.605598},
   Abstract = {Unlike block codes, n-dimensional lattices can have minimal
             trellis diagrams with an arbitrarily large number of states,
             branches, and paths. In particular, we show by a
             counterexample that there is no f(n), a function of n, such
             that all rational lattices of dimension n have a trellis
             with less than f(n) states. Nevertheless, using a theorem
             due to Hermite, we prove that every integral lattice A of
             dimension n has a trellis T, such that the total number of
             paths in T is upper-bounded by P(T) ≤ n!(2/√3) n2(n-1)/2
             where V(ΛA) is the volume of Λ. Furthermore, the number of
             states at time i in T is upper-bounded by |S i| ≤ (2/√3)
             i2(n-1)/2V(Λ) 2i2/n. Although these bounds are seldom
             tight, these are the first known general upper bounds on
             trellis complexity of lattices. © 1997 IEEE.},
   Doi = {10.1109/18.605598},
   Key = {fds336909}
}

@article{fds336910,
   Author = {Linder, T and Tarokh, V and Zeger, K},
   Title = {Existence of optimal prefix codes for infinite source
             alphabets},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {43},
   Number = {6},
   Pages = {2026-2028},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1997},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.641571},
   Abstract = {It is proven that for every random variable with a countably
             infinite set of outcomes and finite entropy there exists an
             optimal prefix code which can be constructed from Huffman
             codes for truncated versions of the random variable, and
             that the average lengths of any sequence of Huffman codes
             for the truncated versions converge to that of the optimal
             code. Also, it is shown that every optimal infinite code
             achieves Kraft's inequality with equality. © 1997
             IEEE.},
   Doi = {10.1109/18.641571},
   Key = {fds336910}
}

@article{fds333018,
   Author = {Tarokh, V and Naguib, A and Seshadri, N and Calderbank,
             AR},
   Title = {Low-rate multi-dimensional space-time codes for both slow
             and rapid fading channels},
   Journal = {Ieee International Symposium on Personal, Indoor and Mobile
             Radio Communications, Pimrc},
   Volume = {3},
   Pages = {1206-1210},
   Year = {1997},
   Month = {December},
   Abstract = {We consider the design of channel codes for improving the
             data rate and/or the reliability of communications using
             multiple transmit antennas over a fading channel. It is
             assumed that the transmitter does not know the channel but
             seeks to choose a codebook that guarantees a diversity gain
             of r1 when there is no mobility and a diversity gain of
             r2≥r1 when the channel is fast fading. A solution to this
             problem is unveiled in this paper. Here, the encoded data is
             split into n streams that are simultaneously transmitted
             using n transmit antennas. The signal received at each
             receive antenna is a superposition of the faded versions of
             the n transmitted signals. We derive performance criteria
             for designing codes having the aforementioned properties.
             Performance is shown to be determined by diversity advantage
             quantified by a rank/distance and coding advantage
             quantified by a determinant/product criterion. The criteria
             is used to design codes for both slow and rapid fading
             channels. The constructed codes have remarkable performance
             in low signal to noise ratios and are suitable for improving
             the frequency reuse factor under a variety of mobility
             conditions.},
   Key = {fds333018}
}

@article{fds333020,
   Author = {Calderbank, AR and Seshadri, N and Tarokh, V},
   Title = {Space-time codes for wireless communication},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {146},
   Publisher = {IEEE},
   Year = {1997},
   Month = {December},
   url = {http://dx.doi.org/10.1109/ISIT.1997.613061},
   Abstract = {The design of channel codes for improving the data rate
             and/or the reliability of communications over fading
             channels using multiple transmit antennas is considered. A
             design criterion is provided and is then used to design
             space-time codes for high data rate wireless communication.
             These codes are trellis codes that are easy to encode and
             decode and have remarkable performance. © 1997
             IEEE.},
   Doi = {10.1109/ISIT.1997.613061},
   Key = {fds333020}
}

@article{fds333019,
   Author = {Tarokh, V and Seshadri, N and Calderbank, AR},
   Title = {Space-time codes for high data rate wireless communication:
             Performance criteria},
   Journal = {Ieee International Conference on Communications},
   Volume = {1},
   Pages = {299-303},
   Year = {1997},
   Month = {January},
   Abstract = {We consider the design of channel codes for improving the
             data rate and/or the reliability of communications over
             fading channels using multiple transmit antennas. Here, data
             is encoded by a channel code and the encoded data is split
             into n streams that are simultaneously transmitted using n
             transmit antennas. The received signal at each receive
             antenna is a linear superposition of the n transmitted
             signals. We derive performance criteria for designing
             channel codes under the assumption that the fading is slow
             and frequency non-selective. Performance is shown to be
             determined by diversity gain quantified by ranks and coding
             gain quantified by determinants of certain matrices that are
             constructed from the code sequences.},
   Key = {fds333019}
}

@article{fds333021,
   Author = {Tarokh, V and Naguib, AF and Seshadri, N and Calderbank,
             AR},
   Title = {Space-time codes for high data rate wireless communication:
             Mismatch analysis},
   Journal = {Ieee International Conference on Communications},
   Volume = {1},
   Pages = {309-313},
   Year = {1997},
   Month = {January},
   Abstract = {We revisit Space-Time Codes for a mobile communication
             system that employs multiple antennas at the base and
             optional antenna diversity at the mobile station. The
             realistic case when the channel state is not completely
             known is considered. It is assumed that the channel
             estimator extracts the fade coefficients using orthogonal
             pilot tones. Mismatch analysis is then carried out. It is
             proved that in the absence of ideal channel state
             information the design criteria for space-time codes
             developed in [11] is still valid for equal energy
             constellation case. Using our derivation, it is observed
             that channel estimation techniques commonly used over
             rapidly fading channels can be used in conjunction with
             space-time codes provided that the number of transmit
             antennas is small.},
   Key = {fds333021}
}

@article{fds333022,
   Author = {Seshadri, N and Tarokh, V and Calderbank, AR},
   Title = {Space-time codes for wireless communication: Code
             construction},
   Journal = {Ieee Vehicular Technology Conference},
   Volume = {2},
   Pages = {637-641},
   Year = {1997},
   Month = {January},
   Abstract = {We consider the design of channel codes for improving the
             data rate and/or the reliability of communications over
             fading channels using multiple transmit antennas. Here, data
             is encoded by a channel code and the encoded data is split
             into n streams that are simultaneously transmitted using n
             transmit antennas. The received signal at each receive
             antenna is a linear superposition of the n transmitted
             signals. We review the performance criteria for designing
             such codes under the assumption that the fading is slow and
             frequency non-selective established in [3]. Performance is
             determined by diversity gain quantified by ranks and coding
             gain quantified by determinants of certain matrices that are
             constructed from the code sequences. The performance
             criterion is then used to design trellis codes for high data
             rate wireless communication. These codes are easy to encode
             and decode. They provide the best trade-off between data
             rate, diversity gain, constellation size and trellis
             complexity. Simulation results are provided for 4 and 8 PSK
             signal sets with data rates of 2 and 3 bits/symbol,
             demonstrating excellent performance that is within 2-3 dB of
             the outage capacity for these channels.},
   Key = {fds333022}
}

@article{fds336912,
   Author = {Tarokh, V and Blake, LF},
   Title = {Trellis complexity versus the coding gain of lattices
             I},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {42},
   Number = {6 PART 1},
   Pages = {1796-1807},
   Publisher = {Institute of Electrical and Electronics Engineers
             (IEEE)},
   Year = {1996},
   Month = {December},
   url = {http://dx.doi.org/10.1109/18.556675},
   Abstract = {The best possible tradeoff between the coding gain and
             trellis complexity for lattices is studied. Three trellis
             complexity functions are defined for lattices as a measure
             of minimum trellis decoding complexity per dimension
             required for achieving a coding gain γ. The properties of
             these functions are studied from an analytic perspective. It
             is also shown that the trellis decoding complexity per
             dimension is lower-bounded by an explicit power of γ. ©
             1996 IEEE.},
   Doi = {10.1109/18.556675},
   Key = {fds336912}
}

@article{fds336913,
   Author = {Tarokh, V and Blake, IF},
   Title = {Trellis complexity versus the coding gain of lattices
             .2.},
   Journal = {Ieee Transactions on Information Theory},
   Volume = {42},
   Number = {6},
   Pages = {1808-1816},
   Publisher = {IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS
             INC},
   Year = {1996},
   Month = {November},
   url = {http://dx.doi.org/10.1109/18.556676},
   Abstract = {For an arbitrary rational lattice L with gain γ, the
             average number of states (respectively, branches) in any
             given trellis diagram of L is bounded below by a function of
             γ. It is proved that this function grows exponentially in
             γ. In the reverse direction, it is proved that given e > 0,
             for arbitrarily large values of γ, there exist lattices of
             gain γ with an average number of branches and states less
             than exp (7 ). © 1996 IEEE.},
   Doi = {10.1109/18.556676},
   Key = {fds336913}
}

@article{fds336911,
   Author = {Blake, IF and Tarokh, V},
   Title = {On the trellis complexity of the densest lattice packings in
             ℝn},
   Journal = {Siam Journal on Discrete Mathematics},
   Volume = {9},
   Number = {4},
   Pages = {597-601},
   Publisher = {Society for Industrial & Applied Mathematics
             (SIAM)},
   Year = {1996},
   Month = {January},
   url = {http://dx.doi.org/10.1137/S0895480195283348},
   Abstract = {An inequality relating the trellis complexity of lattices to
             their dimension and Hermite parameter is established. Using
             this inequality, a conjecture of Forney is proved indicating
             that the trellis complexity of the densest lattice packings
             in ℝn grows exponentially as a function of their coding
             gain.},
   Doi = {10.1137/S0895480195283348},
   Key = {fds336911}
}

@article{fds340047,
   Author = {Britten, D and Lemire, F and Tarokh, V},
   Title = {A Constraint on the Existence of Simple Torsion-Free Lie
             Modules},
   Journal = {Proceedings of the American Mathematical
             Society},
   Volume = {123},
   Number = {8},
   Pages = {2315-2315},
   Publisher = {JSTOR},
   Year = {1995},
   Month = {August},
   url = {http://dx.doi.org/10.2307/2161254},
   Doi = {10.2307/2161254},
   Key = {fds340047}
}

@article{fds336914,
   Author = {Tarokh, V and Blake, IF},
   Title = {Trellis complexity versus the coding gain of
             lattices},
   Journal = {Ieee International Symposium on Information Theory
             Proceedings},
   Pages = {125},
   Publisher = {IEEE},
   Year = {1995},
   Month = {January},
   ISBN = {0780324536},
   url = {http://dx.doi.org/10.1109/isit.1995.531329},
   Abstract = {The growth of trellis diagrams of lattices versus their
             coding gain is studied. It is established that this growth
             exponentially in terms of the coding gain.},
   Doi = {10.1109/isit.1995.531329},
   Key = {fds336914}
}

@article{fds340046,
   Author = {Britten, D and Lemire, F and Tarokh, V},
   Title = {A constraint on the existence of simple torsion-free lie
             modules},
   Journal = {Proceedings of the American Mathematical
             Society},
   Volume = {123},
   Number = {8},
   Pages = {2315-2321},
   Publisher = {American Mathematical Society (AMS)},
   Year = {1995},
   Month = {January},
   url = {http://dx.doi.org/10.1090/S0002-9939-1995-1246518-1},
   Abstract = {For any simple Lie algebra L with Cartan subalgebra H the
             classification of all simple H-diagonalizable. H-modules
             having a finite-dimensional weight space is known to depend
             on determining the simple torsion-free Lmodules of finite
             degree. It is further known that the only simple Lie
             algebras which admit simple torsion-free modules of finite
             degree are those of types An and Cn. For the case of An. we
             show that there are no simple torsion-free An- modules of
             degree k for n ≥ 4 and 2 ≤ k ≤ n - 2. We conclude with
             some examples showing that there exist simple torsion-free
             A. -modules of degrees 1, n - 1, and n. © 1995 American
             Mathematical Society.},
   Doi = {10.1090/S0002-9939-1995-1246518-1},
   Key = {fds340046}
}

 

dept@math.duke.edu
ph: 919.660.2800
fax: 919.660.2821

Mathematics Department
Duke University, Box 90320
Durham, NC 27708-0320