—Random forests are ensemble methods which grow trees as base learners and combine their predictions by averaging. Random forests are known for their good practical performance, ...
Abstract—We study the problem of signal estimation from nonlinear observations when the signal belongs to a low-dimensional set buried in a high-dimensional space. A rough heuris...
—In this paper, we determine the entire secure degrees of freedom (s.d.o.f.) regions of the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference chan...
—Opportunistic detection rules (ODRs) are variants of fixed-sample-size detection rules in which the statistician is allowed to make an early decision on the alternative hypothe...
Wenyi Zhang, George V. Moustakides, H. Vincent Poo...
One of the basic tenets in information theory, the data processing inequality states that output divergence does not exceed the input divergence for any channel. For channels with...
—We show that a p-ary polyphase sequence of period p2 from the Fermat quotients is perfect. That is, its periodic autocorrelation is zero for all non-trivial phase shifts. We cal...
Ki-Hyeon Park, Hong-Yeop Song, Dae San Kim, Solomo...
—We propose and prove a theorem that allows the calculation of a class of functionals on Poisson point processes that have the form of expected values of sum-products of function...
Udo Schilcher, Stavros Toumpis, Martin Haenggi, Al...
Abstract—This paper considers the problem of matrix completion when some number of the columns are completely and arbitrarily corrupted, potentially by a malicious adversary. It ...