Wireless
Communications and Economics Workshop
Tentative Schedule
Date: June 21, 2013 Note: The venue has been moved to TY Wong Lecture Theatre on the 5th floor of Ho Sin-Hang Engineering Building.
|
Opening Speech |
8:50 - 9:00 | Dah Ming Chiu, Chairman of Department of Information Engineering | |
|
Morning Session (Chair: Prof. Angela Zhang) |
9:00 - 9:50 |
Randall Berry, Northwestern
University
The Price of Free Spectrum
|
Biography and
Abstract
|
9:50 - 10:20 | Coffee Break | |
10:20 - 11:10 |
Anant Sahai, The University of California, Berkeley
Towards an information theory for decentralized control |
Biography
and Abstract
|
11:10 - 12:00 | Jianwei Huang, The Chinese University of Hong Kong Mobile Data Offloading | Biography
and Abstract |
|
Afternoon Session (Chair: Prof. Jianwei Huang) |
2:00 - 2:50 |
Angel Lozano,
Universitat Pompeu Fabra
Interference Near-Sightedness: Fading Strikes
Back
|
Biography and
Abstract
|
2:50 - 3:40 |
Aylin Yener, The
Pennsylvania State University
Energy Harvesting Wireless Networks
This talk will
describe the similarities and differences between entropy inequalities
(inequalities between combinations of joint entropies, used, among
other things, for bounding capacities for network coding) and linear
rank inequalities (inequalities between combinations of joint subspace
ranks, used, among other things, for bounding linear capacities for
network coding). In addition to the direct relationship (every entropy
inequality is a linear rank inequality, but not vice versa), it will
cover the main known methods for generating these inequalities, the
collections of such inequalities known at this point, and unresolved
questions (such as whether the currently known methods are sufficient
to generate all such inequalities).
|
Biography
and Abstract
|
3:40 - 4:10 | Coffee Break | |
4:10 - 5:00 | Robert W. Heath,
The University of Texas at Austin
Constraints on entropies are in the core of
many models of multiuser information theory, multivariate statistics,
networking, cryptography and quantum sciences. Most degenerate
situations sometimes turn out to be related to matroids — combinatorial
structures studied for many decades. This tutorial will provide a
gentle introduction to the matroid theory with a view towards Shannon
entropy function, entropy region and information-theoretical
inequalities. Quantum counterparts of the models will be briefly
mentioned as well.
Coverage and Capacity Analysis of mmWave
Cellular Systems | Biography
and Abstract |
5:00 - 5:50 | Angela Zhang, The Chinese University of Hong Kong
Constraints on entropies are in the core of
many models of multiuser information theory, multivariate statistics,
networking, cryptography and quantum sciences. Most degenerate
situations sometimes turn out to be related to matroids — combinatorial
structures studied for many decades. This tutorial will provide a
gentle introduction to the matroid theory with a view towards Shannon
entropy function, entropy region and information-theoretical
inequalities. Quantum counterparts of the models will be briefly
mentioned as well.
A graphical method for defending false data injection attack in smart grids | Biography
and Abstract |
|