Stark C. Draper

According to our database1, Stark C. Draper authored at least 114 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Hardware-Based Linear Program Decoding With the Alternating Direction Method of Multipliers.
IEEE Trans. Signal Processing, 2019

Cuboid Partitioning for Hierarchical Coded Matrix Multiplication.
CoRR, 2019

Anytime Minibatch: Exploiting Stragglers in Online Distributed Optimization.
Proceedings of the 7th International Conference on Learning Representations, 2019

Information Storage in Multilayer Resistive Memories.
Proceedings of the 16th Canadian Workshop on Information Theory, 2019

Hierarchical coded matrix multiplication.
Proceedings of the 16th Canadian Workshop on Information Theory, 2019

Anytime Minibatch with Stale Gradients : (Invited Paper).
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Efficient learning of neighbor representations for boundary trees and forests.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Introduction to the Issue on Information-Theoretic Methods in Data Acquisition, Analysis, and Processing.
J. Sel. Topics Signal Processing, 2018

Exploitation of Stragglers in Coded Computation.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Hierarchical Coded Computation.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Anytime Stochastic Gradient Descent: A Time to Hear from all the Workers.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Learning the Interference Graph of a Wireless Network.
IEEE Trans. Signal and Information Processing over Networks, 2017

Fast Power and Energy Management for Future Many-Core Systems.
TOMPECS, 2017

Distributed coding of multispectral images.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Anytime Exploitation of Stragglers in Synchronous Stochastic Gradient Descent.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Bit-interleaved polar-coded OFDM for low-latency M2M wireless communications.
Proceedings of the IEEE International Conference on Communications, 2017

Hardware-based linear programming decoding via the alternating direction method of multipliers.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Irregular Polar Coding for Massive MIMO Channels.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Hardware-aware motion estimation via low-resolution motion hints.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

Coded caching with non-identical user demands.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

2016
ADMM LP Decoding of Non-Binary LDPC Codes in 𝔽2m.
IEEE Trans. Information Theory, 2016

The ADMM Penalized Decoder for LDPC Codes.
IEEE Trans. Information Theory, 2016

LP-Decodable Multipermutation Codes.
IEEE Trans. Information Theory, 2016

Hardware-Based ADMM-LP Decoding.
CoRR, 2016

Proactive Message Passing on Memory Factor Networks.
CoRR, 2016

FastCap: An efficient and fair algorithm for power capping in many-core systems.
Proceedings of the 2016 IEEE International Symposium on Performance Analysis of Systems and Software, 2016

Anytime coding for distributed computation.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs.
IEEE Trans. Information Theory, 2015

The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents.
IEEE Trans. Information Theory, 2015

ADMM decoding of error correction codes: From geometries to algorithms.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Encoding and decoding algorithms for LP-decodable multipermutation codes.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

ADMM decoding on trapping sets.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Linearization-based cross-layer design for throughput maximization in OFDMA wireless ad-hoc networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Second-order coding rate for m-class source-channel codes.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

Hardware based projection onto the parity polytope and probability simplex.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
The Streaming-DMT of Fading Channels.
IEEE Trans. Information Theory, 2014

Lossless Coding for Distributed Streaming Sources.
IEEE Trans. Information Theory, 2014

ADMM LP decoding of non-binary LDPC codes in $\mathbb{F}_{2^m}$.
CoRR, 2014

Achievability bounds for unequal message protection at finite block lengths.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On mismatched unequal message protection for finite block length joint source-channel coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

ADMM decoding of non-binary LDPC codes in F2m.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Instanton search algorithm for the ADMM penalized decoder.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

SleepScale: Runtime joint speed scaling and sleep states management for power efficient data centers.
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014

The privacy/security tradeoff across jointly designed linear authentication systems.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Hierarchical and High-Girth QC LDPC Codes.
IEEE Trans. Information Theory, 2013

The AWGN Red Alert Problem.
IEEE Trans. Information Theory, 2013

Decomposition Methods for Large Scale LP Decoding.
IEEE Trans. Information Theory, 2013

Secure Biometrics: Concepts, Authentication Architectures, and Challenges.
IEEE Signal Process. Mag., 2013

Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage.
IEEE Journal on Selected Areas in Communications, 2013

Queuing Theoretic Analysis of Power-performance Tradeoff in Power-efficient Computing
CoRR, 2013

The Diversity-Multiplexing Tradeoff of Delay-Constrained Sequential Streaming
CoRR, 2013

Converse bounds for assorted codes in the finite blocklength regime.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Analyzing the Impact of Joint Optimization of Cell Size, Redundancy, and ECC on Low-Voltage SRAM Array Total Area.
IEEE Trans. VLSI Syst., 2012

Rank Minimization Over Finite Fields: Fundamental Limits and Coding-Theoretic Interpretations.
IEEE Trans. Information Theory, 2012

Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent.
IEEE Trans. Information Theory, 2012

A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems.
IEEE Trans. Information Forensics and Security, 2012

Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness.
IEEE Trans. Information Forensics and Security, 2012

Suppressing pseudocodewords by penalizing the objective of LP decoding.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Passive learning of the interference graph of a wireless network.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Optimal scheduling policies with mutual information accumulation in wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The l1 penalized decoder and its reweighted LP.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Divide and Concur and Difference-Map BP Decoders for LDPC Codes.
IEEE Trans. Information Theory, 2011

Cooperative Transmission for Wireless Networks Using Mutual-Information Accumulation.
IEEE Trans. Information Theory, 2011

Optimal Backpressure Scheduling in Wireless Networks using Mutual Information Accumulation
CoRR, 2011

Cooperative Packet Routing using Mutual Information Accumulation
CoRR, 2011

The Sender-Excited Secret Key Agreement Model: Capacity and Error Exponents
CoRR, 2011

A Secret Key Generation System Based on Multipath Channel Randomness: RSSI vs CSSI
CoRR, 2011

An information-theoretic analysis of revocability and reusability in secure biometrics.
Proceedings of the Information Theory and Applications Workshop, 2011

Truncated tree codes for streaming data: Infinite-memory reliability using finite memory.
Proceedings of the 8th International Symposium on Wireless Communication Systems, 2011

Rank minimization over finite fields.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Streaming data over fading wireless channels: The diversity-multiplexing tradeoff.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On reliability of content identification from databases based on noisy queries.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors.
Proceedings of the 17th International Conference on High-Performance Computer Architecture (HPCA-17 2011), 2011

Secret key generation through OFDM multipath channel.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

On the cooperative red alert exponent for the AWGN-MAC with feedback.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Exploiting route diversity in multi-packet transmission using mutual information accumulation.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

The sender-excited secret key agreement model: Capacity theorems.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Divide & Concur and Difference-Map BP Decoders for LDPC Codes
CoRR, 2010

Cooperative reliability for streaming multiple access.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Minimizing total area of low-voltage SRAM arrays through joint optimization of cell size, redundancy, and ECC.
Proceedings of the 28th International Conference on Computer Design, 2010

2009
Rateless coding for arbitrary channel mixtures with decoder channel state information.
IEEE Trans. Information Theory, 2009

Cooperative Routing for Wireless Networks using Mutual-Information Accumulation
CoRR, 2009

Multi-stage decoding of LDPC codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Minimum energy per bit for secret key acquisition over multipath wireless channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Compressed sensing over finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Toward Compression of Encrypted Images and Video Sequences.
IEEE Trans. Information Forensics and Security, 2008

Variable-length channel coding with noisy feedback.
European Transactions on Telecommunications, 2008

Notary: Hardware techniques to enhance signatures.
Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), 2008

Feature extraction for a Slepian-Wolf biometric system using LDPC codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

The "hallucination" bound for the BSC.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Routing in Cooperative Wireless Networks with Mutual-Information Accumulation.
Proceedings of IEEE International Conference on Communications, 2008

Feature transformation of biometric templates for secure biometric systems based on error correcting codes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

2007
Universal Anytime Coding.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

ML decoding via mixed-integer adaptive linear programming.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Compound conditional source coding, Slepian-Wolf list decoding, and applications to media coding.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Using Distributed Source Coding to Secure Fingerprint Biometrics.
Proceedings of the IEEE International Conference on Acoustics, 2007

On Compression of Encrypted Video.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

2006
Stealing Bits From a Quantized Source.
IEEE Trans. Information Theory, 2006

Costs and benefits of fading for streaming media over wireless.
IEEE Network, 2006

Noisy feedback improves communication reliability.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On Rateless Coding over Fading Channels with Delay Constraints.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On Compression of Encrypted Images.
Proceedings of the International Conference on Image Processing, 2006

2005
A universal approach to queuing with distortion control.
IEEE Trans. Automat. Contr., 2005

Boosting reliability over AWGN networks with average power constraints and noiseless feedback.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Sequential random binning for streaming distributed source coding.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

On blind compression of encrypted data approaching the source entropy rate.
Proceedings of the 13th European Signal Processing Conference, 2005

2004
Side information aware coding strategies for sensor networks.
IEEE Journal on Selected Areas in Communications, 2004

Efficient variable length channel coding for unknown DMCs.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On interacting encoders and decoders in multiuser settings.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2002
Successive structuring of source coding algorithms for data fusion, buffering, and distribution in networks.
PhD thesis, 2002

Queuing with distortion-control for multimedia content.
Proceedings of the IEEE International Conference on Acoustics, 2002

Source Requantization: Successive Degradation and Bit Stealing.
Proceedings of the 2002 Data Compression Conference (DCC 2002), 2002


  Loading...