Telecomunicaciones, información y comunicación

Independent Set Reconfiguration Under Bounded-Hop Token
- The independent set reconfiguration problem (ISReconf) is the problem of determining, for given independent sets I_s and I_t of a graph G, whether I_s can be transformed into I_t by repeatedly...
$texttt{SynC}$: Synergistic Boosting of Structure and Representation for Deep Graph Clustering
- Employing graph neural networks (GNNs) for graph clustering has shown promising results in deep graph clustering. However, existing methods disregard the reciprocal relationship between...
Low-Rank Toeplitz Matrix Restoration: Descent Cone Analysis and Structured Random Matrix
- This note demonstrates that we can stably recover all symmetric Toeplitz matrices $\pmb{X}_0\in\mathbb{R}^{n\times n}$ of rank at most $r$ from a number of rank-one subgaussian measurements on the...
Principles of frugal inference and control
- A central challenge for intelligent agents in an uncertain world is striking the right balance between utility maximization and resource use, not only for external movement but also for internal...
Decouple then Converge: Handling Unknown Unlabeled Distributions in Long-Tailed Semi-Supervised Learning
- While long-tailed semi-supervised learning (LTSSL) has attracted growing attention in many real-world classification tasks, existing LTSSL algorithms typically assume that labeled and unlabeled data...
DyDiff: Long-Horizon Rollout via Dynamics Diffusion for Offline Reinforcement Learning
- With the great success of diffusion models (DMs) in generating realistic synthetic vision data, many researchers have investigated their potential in decision-making and control. Most of these works...
Evaluating Physician-AI Interaction for Cancer Management: Paving the Path towards Precision Oncology
- As machine learning (ML)-based decision support tools proliferate in clinical practice, understanding how clinicians integrate personalized ML predictions alongside randomized controlled trial (RCT)...
CHIRON: Accelerating Node Synchronization without Security Trade-offs in Distributed Ledgers
- Blockchain performance has historically faced challenges posed by the throughput limitations of consensus algorithms. Recent breakthroughs in research have successfully alleviated these constraints...
Single Image Reflection Removal with Patch Reflectance Prior
- Single Image Reflection Removal (SIRR) in real-world images is a challenging task due to diverse image degradations occurring on the glass surface during light transmission and reflection. Many...
Universal Time-Series Representation Learning: A Survey
- Time-series data exists in every corner of real-world systems and services, ranging from satellites in the sky to wearable devices on human bodies. Learning representations by extracting and...
VMT19937: A SIMD-Friendly Pseudo Random Number Generator based on Mersenne Twister 19937
- Many simulation applications require the generation of long sequences of pseudo-random numbers. Linear recurrences modulo 2 are commonly used as the fundamental building block for constructing...
Achieving Linear Speedup with ProxSkip in Distributed Stochastic Optimization
- The ProxSkip algorithm for distributed optimization is gaining increasing attention due to its effectiveness in reducing communication. However, existing analyses of ProxSkip are limited to the...
SumComp: Coding for Digital Over-the-Air Computation via the Ring of Integers
- Communication and computation are traditionally treated as separate entities, allowing for individual optimizations. However, many applications focus on local information's functionality rather...
Coordination Control of Discrete Event Systems under Cyber Attacks
- In this paper, coordination control of discrete event systems under joint sensor and actuator attacks is investigated. Sensor attacks are described by a set of attack languages using a proposed ALTER...
The Normal Distributions Indistinguishability Spectrum and its Application to Privacy-Preserving Machine Learning
- We investigate the privacy of {\em any} algorithm whose outputs have Gaussian distribution. This work is motivated by the prevalence of such algorithms in several useful (ML) applications, and the...
Lightweight CNN-Based DDoS Detection for Resource-Constrained Edge Networks
- Distributed Denial of Service (DDoS) attacks remain a persistent threat to the availability of Internet services, edge networks, and cyber-physical infrastructure. Although recent AI-security work...
Causal Influences over Social Learning Networks
- This paper investigates causal influences between agents linked by a social graph and interacting over time. In particular, the work examines the dynamics of social learning models and distributed...
Optimal Control of Multiclass Fluid Queueing Networks: A Machine Learning Approach
- We propose a machine learning approach to the optimal control of multiclass fluid queueing networks (MFQNETs) that provides explicit and insightful control policies. We prove that a piecewise...
Intuitive Surgical SurgToolLoc and SurgVU Challenges Results: 2022-2025
- Robotic assisted (RA) surgery promises to transform surgical intervention. Intuitive Surgical is committed to fostering these changes and the machine learning models and algorithms that will enable...
Online Resource Allocation with Convex-set Machine-Learned Advice
- Decision-makers often have access to machine-learned predictions about future demand that can help guide online resource allocation decisions. However, such predictions may be inaccurate. We develop...
Static and dynamic jamming games over wireless channels with mobile strategic players
- We study a wireless jamming problem consisting of the competition between a legitimate receiver and a jammer, as a zero-sum game where the value to maximize/minimize is the channel capacity at the...