We consider a long-term average profit maximizing admission control prob...
Covert communication, a sub-field of information security, is focused on...
The number of wireless devices (e.g., cellular phones, IoT, laptops)
con...
Variational quantum Monte Carlo (VMC) combined with neural-network quant...
Consider the problem of covertly controlling a linear system. In this
pr...
In this paper, we consider the problem of guessing a sequence subject to...
According to recent empirical studies, a majority of users have the same...
Compute and Forward (CF) is a coding scheme which enables receivers to d...
Consider the problem of Private Information Retrieval (PIR) where a user...
Covert communication conceals transmission of messages from Alice to Bob...
For sales and marketing organizations within large enterprises, identify...
Consider the problem of guessing the realization of a random vector
X by...
A distributed binary hypothesis testing problem involving two parties, a...
In September 2017, McAffee Labs quarterly report estimated that brute fo...
Group Testing (GT) addresses the problem of identifying a small subset o...
Consider a Compute and Forward (CF) relay network with L users and a sin...
Consider a Compute and Forward (CF) relay network with L users and a sin...
Data collection in Wireless Sensor Networks (WSN) draws significant
atte...
We consider the problem of sequential decision making on random fields
c...