Sciweavers

TIT
2016
29views Education» more  TIT 2016»
8 years 8 months ago
Random Forests and Kernel Methods
—Random forests are ensemble methods which grow trees as base learners and combine their predictions by averaging. Random forests are known for their good practical performance, ...
Erwan Scornet
TIT
2016
48views Education» more  TIT 2016»
8 years 8 months ago
The Generalized Lasso With Non-Linear Observations
Abstract—We study the problem of signal estimation from nonlinear observations when the signal belongs to a low-dimensional set buried in a high-dimensional space. A rough heuris...
Yaniv Plan, Roman Vershynin
TIT
2016
39views Education» more  TIT 2016»
8 years 8 months ago
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure
—In this paper, we determine the entire secure degrees of freedom (s.d.o.f.) regions of the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference chan...
Jianwei Xie, Sennur Ulukus
TIT
2016
48views Education» more  TIT 2016»
8 years 8 months ago
Opportunistic Detection Rules: Finite and Asymptotic Analysis
—Opportunistic detection rules (ODRs) are variants of fixed-sample-size detection rules in which the statistician is allowed to make an early decision on the alternative hypothe...
Wenyi Zhang, George V. Moustakides, H. Vincent Poo...
TIT
2016
37views Education» more  TIT 2016»
8 years 8 months ago
Dissipation of Information in Channels With Input Constraints
One of the basic tenets in information theory, the data processing inequality states that output divergence does not exceed the input divergence for any channel. For channels with...
Yury Polyanskiy, Yihong Wu 0001
TIT
2016
45views Education» more  TIT 2016»
8 years 8 months ago
Optimal Families of Perfect Polyphase Sequences From the Array Structure of Fermat-Quotient Sequences
—We show that a p-ary polyphase sequence of period p2 from the Fermat quotients is perfect. That is, its periodic autocorrelation is zero for all non-trivial phase shifts. We cal...
Ki-Hyeon Park, Hong-Yeop Song, Dae San Kim, Solomo...
TIT
2016
46views Education» more  TIT 2016»
8 years 8 months ago
Capacity of Non-Malleable Codes
Mahdi Cheraghchi, Venkatesan Guruswami
TIT
2016
44views Education» more  TIT 2016»
8 years 8 months ago
Interference Functionals in Poisson Networks
—We propose and prove a theorem that allows the calculation of a class of functionals on Poisson point processes that have the form of expected values of sum-products of function...
Udo Schilcher, Stavros Toumpis, Martin Haenggi, Al...
TIT
2016
44views Education» more  TIT 2016»
8 years 8 months ago
Exact Recovery in the Stochastic Block Model
Emmanuel Abbe, Afonso S. Bandeira, Georgina Hall
TIT
2016
43views Education» more  TIT 2016»
8 years 8 months ago
Matrix Completion With Column Manipulation: Near-Optimal Sample-Robustness-Rank Tradeoffs
Abstract—This paper considers the problem of matrix completion when some number of the columns are completely and arbitrarily corrupted, potentially by a malicious adversary. It ...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...