Forty-Seventh Annual Allerton Conference
Sept 30 - Oct 2, 2009, University of Illinois at Urbana-Champaign, IL, USA

Program at a Glance    Wednesday    Thursday    Friday    Author Index    Keyword Index    My Program  

Last updated on March 5, 2015. This conference program is tentative and subject to change

Allerton-09 Keyword Index

C   D   I   M   N   O   P   Q   R   S   U   V   W  

Coding Techniques and ApplicationsFrA2.2, FrA4.1, FrA4.2, FrA4.3, FrA5.4, FrA6.5, ThA1.2, ThA5.4, ThA5.5, ThB4.1, ThB4.4, ThC2.1, ThC2.3, ThC2.5, ThC5.2, ThC6.1, ThD1.4, ThD2.1, ThD2.2, ThD2.5, WeA1.2, WeA1.5, WeA2.1, WeA2.2, WeA3.4, WeC2.6, WeC3.1, WeC3.3, WeC5.4, WeD2.1, WeD2.2, WeD2.3, WeD2.4, WeD5.1, WeD6.1
Coding TheoryFrA1.1, FrA1.4, FrA1.5, FrA1.6, FrA3.1, FrA4.4, FrA4.5, FrA5.4, ThA6.4, ThB1.3, ThB2.2, ThC1.4, ThC1.5, ThC2.2, ThC2.3, ThC2.4, ThD2.1, ThD5.2, WeA1.1, WeA1.2, WeA1.3, WeA1.4, WeA1.5, WeA2.1, WeA5.1, WeB2.3, WeB4.3, WeC2.1, WeC2.4, WeC6.2, WeD2.4
Control ApplicationsThB3.4, ThB5.3, WeD4.1
Data StorageFrA1.5, ThC2.1, ThC2.2, ThC2.3, ThC2.5, ThD2.2, WeB2.1
Decentralized and Distributed ControlFrA6.3, FrA6.4, ThA2.2, ThA3.2, ThA3.5, ThA4.2, ThA4.3, ThB3.1, ThB4.2, ThB5.3, ThB5.4, ThC6.3, ThD6.4, WeA4.1, WeA5.1, WeA5.2, WeA5.4, WeA5.5, WeB5.1, WeB5.2, WeB5.3, WeB5.4, WeB6.1, WeC2.5, WeC3.4, WeD3.1, WeD3.4
Detection and EstimationFrA3.2, FrA3.4, FrA3.5, FrA3.6, ThB3.2, ThC1.2, ThC6.2, ThD3.1, WeA2.1, WeA2.3, WeA2.4, WeA5.4, WeA6.1, WeA6.2, WeB2.3, WeB2.4, WeB5.1, WeB6.1, WeB6.2, WeB6.3, WeC1.5, WeC4.1, WeC5.4, WeD5.3
Discrete Event SystemsThB3.4, ThD4.2, WeD4.1, WeD4.2, WeD4.3
Dynamic Games and Decision TheoryFrA3.2, ThA3.1, ThA3.3, ThA5.1, ThB5.4, ThD6.1, ThD6.3, ThD6.4, WeB5.2, WeC2.3, WeC4.2, WeC4.5, WeD3.2, WeD3.3, WeD4.2
Image and Multimedia Signal ProcessingThC1.3
Image and Video CompressionThC1.5
Information Hiding and WatermarkingFrA2.2, FrA3.6, ThA5.1, ThC3.4, ThD3.1, ThD3.2
Information TheoryFrA1.4, FrA3.1, FrA4.3, FrA5.1, FrA5.2, FrA5.3, FrA5.5, FrPP.1, ThA1.2, ThA1.3, ThA2.1, ThA2.3, ThA2.6, ThA4.2, ThA4.5, ThA5.1, ThA5.2, ThA5.3, ThB1.1, ThB1.2, ThB2.2, ThB2.3, ThB4.4, ThC2.2, ThC2.4, ThC3.1, ThC3.2, ThC3.3, ThC5.4, ThC6.1, ThC6.4, ThD1.2, ThD1.3, ThD2.1, ThD2.3, ThD2.4, ThD3.2, ThD3.3, ThD3.4, ThD4.5, ThD5.2, ThD5.3, WeA2.3, WeA2.4, WeA3.1, WeA3.2, WeA3.3, WeA3.4, WeA5.3, WeB1.4, WeB2.3, WeB2.4, WeB3.2, WeB3.3, WeB3.4, WeB4.2, WeB4.3, WeB6.2, WeC1.1, WeC1.2, WeC1.3, WeC1.4, WeC2.1, WeC3.1, WeC5.1, WeC5.2, WeC5.3, WeC6.1, WeC6.2, WeC6.3, WeC6.4, WeC6.5, WeD1.1, WeD1.2, WeD1.3, WeD3.4, WeD5.2, WeD5.3, WeD6.1, WeD6.2, WeD6.3, WeD6.4
Intrusion/Anomaly Detection and DiagnosisThB3.2, ThC3.4, WeA4.4, WeD1.2, WeD3.3, WeD4.3
Iterative Coding TechniquesFrA4.3, FrA5.4, FrA6.5, ThA4.3, ThB1.2, ThD1.4, WeA1.1, WeC2.1, WeC2.2, WeC2.3, WeC2.6, WeD2.1, WeD2.2, WeD2.3, WeD2.4
MIMO SystemsFrA3.5, ThA4.1, ThB1.1, ThB2.4, ThC3.3, ThC5.1, ThC5.2, ThC5.3, ThC5.4, ThC5.5, ThD2.5, ThD3.4, ThD5.1, ThD5.3, ThD5.4, WeA1.2, WeB3.4
Multi-Agent Systems and Robot ControlFrA6.1, FrA6.3, FrA6.4, ThB3.1, ThB5.2, ThB5.4, ThD6.3, WeA6.5, WeB5.1, WeB5.3, WeD3.2
Multiuser Detection and EstimationFrA3.1, WeB6.4, WeC2.6
Network CodingFrA1.1, FrA1.3, FrA1.5, FrA6.6, ThC2.4, ThC2.5, ThD2.2, ThD4.4, WeA4.6, WeB1.1, WeB1.4, WeB4.2, WeC6.1
Network Coding in CommunicationFrA1.1, FrA1.3, FrA6.6, ThB2.2, ThB2.4, ThD5.2, WeB1.1, WeB1.2, WeB1.3, WeB1.4, WeC1.2, WeC1.4, WeD1.4
Networked Control SystemsFrA6.3, ThA3.2, ThA3.4, ThB3.1, ThB4.2, ThB5.2, ThD4.2, ThD6.3, WeA5.2, WeA5.5, WeA6.3, WeA6.4, WeA6.5, WeC5.1, WeD4.3
Nonlinear ControlThB4.2, ThC6.2
OptimizationFrA2.3, FrA6.5, ThA1.1, ThA3.4, ThA4.4, ThA4.5, ThB4.3, ThB5.1, ThB5.3, ThC1.3, ThC3.5, ThC5.3, ThC6.2, ThD6.2, ThD6.4, WeA2.5, WeA3.5, WeA4.1, WeA6.3, WeB4.2, WeB5.4, WeB6.3, WeB6.4, WeC1.3, WeC1.5, WeC3.2, WeC4.3, WeC4.4, WeC4.5, WeC5.2
Performance AnalysisFrA2.1, FrA2.3, ThA1.4, ThB3.3, ThC4.5, ThC5.1, ThD4.3, ThD4.4, ThD4.5, WeA4.1, WeA4.2, WeA4.3, WeA4.5, WeC1.3, WeC3.2, WeC3.3, WeC3.4, WeC3.5, WeC3.6
Pricing and Congestion ControlThC4.3, ThC4.4, ThC6.3, ThC6.5, ThD4.3, ThD4.4, WeA4.5, WeC3.6, WeC4.2, WeC4.3, WeC4.4
Queuing Theory and AnalysisFrA1.2, ThB3.3, ThC4.1, ThC4.2, ThC4.3, ThC5.4, ThD4.3, WeA4.2, WeA4.3, WeA4.5, WeC3.3
Reliable and Robust ControlThA1.1
Reliable and Trustworthy NetworksFrA2.1, ThA5.2, ThC3.5, ThC4.4, ThC4.5, WeD1.4, WeD3.3
Sensor NetworksFrA5.5, FrA6.1, FrA6.2, FrA6.4, ThA1.3, ThA2.1, ThA2.2, ThB2.1, WeA6.2, WeA6.3, WeA6.5, WeB1.2, WeB2.2, WeB6.3, WeB6.4
Sensor Networks in CommunicationsFrA2.2, FrA2.4, ThA3.2, ThB2.1, ThB2.3, WeB1.2, WeB4.4, WeB6.1, WeC2.5
Source Coding and CompressionFrA5.5, ThA1.3, ThA2.1, ThA4.1, ThA5.5, ThC1.5, ThC3.1, ThD1.1, ThD2.4, WeA2.2, WeA2.3, WeB2.2, WeB3.1, WeB4.3, WeC6.1, WeD2.2, WeD2.3
Statistical Signal ProcessingFrA3.4, ThB5.1, ThC1.2, ThC1.4, WeA1.3, WeA2.4, WeA2.5, WeA6.2, WeB2.1, WeB2.4, WeC2.3, WeC5.4, WeD1.2, WeD5.3
Stochastic Systems and ControlFrA1.2, FrA6.1, ThA3.4, ThA3.5, ThA4.2, ThA4.3, ThB3.2, ThC4.3, ThD4.2, ThD6.2, WeA3.5, WeA4.3, WeA6.4, WeB5.2, WeB5.3, WeC2.5, WeC3.5, WeC5.1, WeD3.1, WeD3.4, WeD4.2
Universal Algorithms and Machine LearningThA4.4, ThB5.1, ThC1.1, ThD2.4, WeA2.5, WeB2.1, WeB2.2
VLSI Signal ProcessingWeD2.1
Wireless CommunicationsFrA1.2, FrA1.3, FrA1.4, FrA2.1, FrA2.3, FrA2.4, FrA2.5, FrA3.2, FrA3.5, FrA4.6, FrA5.2, FrA5.3, FrA6.6, ThA1.1, ThA1.2, ThA1.4, ThA2.3, ThA2.4, ThA2.5, ThA2.6, ThA4.1, ThA5.3, ThA6.2, ThA6.3, ThB1.1, ThB2.1, ThB2.3, ThB2.4, ThB3.3, ThB4.3, ThB5.2, ThB6.1, ThB6.2, ThB6.3, ThB6.4, ThC1.2, ThC3.2, ThC3.3, ThC3.5, ThC4.1, ThC4.4, ThC4.5, ThC5.1, ThC5.2, ThC5.3, ThC5.5, ThC6.3, ThC6.4, ThD2.3, ThD2.5, ThD3.3, ThD4.5, ThD5.1, ThD5.3, ThD5.4, ThD6.2, WeA3.1, WeA3.2, WeA3.3, WeA3.4, WeA3.5, WeA6.1, WeB3.4, WeB4.1, WeC1.1, WeC1.2, WeC1.4, WeC1.5, WeC2.2, WeC3.2, WeC3.4, WeC4.1, WeC4.3, WeC4.4, WeC4.5, WeC4.6, WeD1.1, WeD6.1, WeD6.4




All Content © PaperCept, Inc.

This site is protected by copyright and trademark laws under US and International law.
All rights reserved. © 2002-2015 PaperCept, Inc.
Page generated 2015-03-05  00:15:01 PST  Terms of use