This paper develops an input-to-state stability (ISS) analysis of the Stefan problem with respect to an unknown heat loss. The Stefan problem represe…

Spherical shell dynamo models based on rotating convection show that the flow within the tangent cylinder is dominated by an off-axis plume that exte…

Our goal is to study the feasibility of porting termination analysis techniques developed for one programming paradigm to another paradigm. In this p…

This paper considers a resilient state estimation framework for unmanned aerial vehicles (UAVs) that integrates a Kalman filter-like state estimator …

We study an inverse source problem for the acoustic wave equation in a random waveguide. The goal is to estimate the source of waves from measurement…

Schwarz methods are attractive parallel solvers for large scale linear systems obtained when partial differential equations are discretized. For hybr…

In the paper, we present a strategy for accelerating posterior inference for unknown inputs in time fractional diffusion models. In many inference pr…

Many modern big data applications feature large scale in both numbers of responses and predictors. Better statistical efficiency and scientific insig…

Data cleaning is often an important step to ensure that predictive models, such as regression and classification, are not affected by systematic erro…

Underlay device-to-device (D2D) multicast communication has potential to improve performance of cellular networks. However, co-channel interference a…

We consider the following problem: Does there exist a probability distribution over subsets of a finite partially ordered set (poset), such that a set of constraints involving marginal probabilities of the poset's elements and maximal chains is sati…

We consider the following problem: Does there exist a probability distribution over subsets of a finite partially ordered set (poset), such that a se…

This research considers the ranking and selection (R&S) problem of selecting the optimal subset from a finite set of alternative designs. Given the t…

Fast algorithms for matrix multiplication, namely those that perform asymptotically fewer scalar operations than the classical algorithm, have been c…

Motivated by the broadcast view of the interference channel, the new problem of communication with disturbance constraints is formulated. The rate-di…

We consider the classical stochastic multi-armed bandit problem with a constraint on the total cost incurred by switching between actions. We prove m…

In this paper, we study the problem of identifying the impulse response of a linear time invariant (LTI) dynamical system from the knowledge of the i…

Low-rank matrix approximations, such as the truncated singular value decomposition and the rank-revealing QR decomposition, play a central role in da…

We present an algorithm that takes as input an $n$-vertex planar graph $G$ and a $k$-vertex pattern graph $P$, and computes the number of (induced) c…

Counting the frequencies of 3-, 4-, and 5-node undirected motifs (also know as graphlets) is widely used for understanding complex networks such as s…

This paper presents a nonparametric statistical modeling method for quantifying uncertainty in stochastic gradient systems with isotropic diffusion. …

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account