### Presentation Slides

### Shannon Information Theory and Beyond

Posted: Sunday, November 8, 2015### Distributed Computing Theory for Wireless Networks and Mobile Systems

Posted: Monday, April 8, 2013ABSTRACT: Nearly all modern computer systems are distributed. Most are based on platforms that change dynamically, and many rely on wireless communication. These systems must deal with complications such as...

### Distributed Computation in MANets (pptx)

Posted: Sunday, July 1, 2012### Communication Amid Uncertainty (ppsx)

Posted: Sunday, July 1, 2012Madhu Sudan's presentation Available as a PDF

### Brain-Machine Interfaces

Posted: Thursday, June 9, 2011### Compression of Graphical Structures

Posted: Tuesday, June 7, 2011Presentation accompanies the Compression of Graphical Structures Seminar.

### Using Information Theory to Understand Neural Systems

Posted: Tuesday, June 7, 2011The brain can be viewed as a complicated computational machine. It consists of several billion neurons, each of which functions as a nonlinear, dynamical analog-to-digital filter. These neurons are highly interconn...

### Computing and Communication

Posted: Thursday, June 2, 2011Despite the fact that computers and communication devices are highly integrated today, the theories remain separate. The result is a weak theory and ad-hoc practice. Existing devices end up being unreliable, vulner...

### What is Information?

Posted: Monday, May 16, 2011Information permeates every corner of our lives and shapes our universe. Understanding and harnessing information holds the potential for significant advances. The breadth and depth of underlying concepts of the sc...

### Non-Asymptotic Information Theory

Posted: Saturday, May 7, 2011Verdu, S., "Non-Asymptotic Information Theory", a Coordinated Science Laboratory Diamond Anniversary Lecture: University of Illinois at Urbana-Champaign, May 2, 2011.

### The Coming Era of Cyberphysical Systems

Posted: Friday, May 6, 2011Presented at the Industrial Partnership Roundtable. Discussing three paths to cyberphysical systems, foundational issues and information processing and much more.

### Emerging Frontiers of Science of Information: Overview of the NSF STC

Posted: Thursday, May 5, 2011All about the Center for Science of Information!

### Emerging Frontiers of Science of Information: Industry Open House

Posted: Thursday, May 5, 2011Presented at the Industry Partnership Roundtable event May, 2011.

### A Cross-Validation approach to Trajectory and Shape Reconstruction for Rigid Bodies

Posted: Sunday, May 1, 2011Yu, J., Zheng, H., Kulkarni, S.R., Poor, H.V., “A Cross-Validation approach to Trajectory and Shape Reconstruction for Rigid Bodies”, Proceedings of the 20th International Workshop on Machine Learning for Signa...

### The Impact of Constellation Cardinality on Gaussian Channel Capacity

Posted: Sunday, May 1, 2011Wu, Y. and Verdu, S., “The Impact of Constellation Cardinality on Gaussian Channel Capacity”, Forty-Eighth Annual Allerton Conference, University of Illinois at Urbana-Champaign, Monticello, Illinois, Sep. 29-Oct...

### Minimax Redundancy for Large Alphabets

Posted: Sunday, May 1, 2011Szpankowski, W. and Weinberger, M., “Minimax Redundancy for Large Alphabets”, 2010 International Symposium on Information Theory, Austin, 2010, 1488-1...

### Duress Detection for Authentication Attacks Against Multiple Administrators

Posted: Sunday, May 1, 2011Stefanov, E. and Atallah, M., “Duress Detection for Authentication Attacks Against Multiple Administrators”, 2010 ACM CCS Workshop in Insider Threats (WITS 10), Chicago, Oct. 2...

### Thomas Cover - The Natural Mathematics Arising in Information Theory and Investment

Posted: Sunday, May 1, 2011Optimizing the growth rate of investment is considered a controversial investment goal, perhaps because it is an asymptotic criterion or perhaps because its implementation requires maximizing the expected logarithm...

### Arimoto Channel Coding Converse and Rényi Divergence

Posted: Sunday, May 1, 2011Polyanskiy, Y. and Verdu, S., “Arimoto Channel Coding Converse and Rényi Divergence...

### Counting Markov Types

Posted: Sunday, May 1, 2011Jacquet, P., Knessl, C. and Szpankowski, W., “Counting Markov Types”, 2010 International Conference on Anaysis of Algorithms, Vienna, 2010, pp. 389-...

### Channel Dispersion and Moderate Deviations Limits for Memoryless Channels

Posted: Sunday, May 1, 2011Polyanskiy, Y. and Verdu, S., “Channel Dispersion and Moderate Deviations Limits for Memoryless Channels”, Forty-Eighth Annual Allerton Conference', University of Illinois at Urbana-Champaign, Monticello, Illinois...

### A Discrete Divide and Conquer Recurrence

Posted: Sunday, May 1, 2011Drmota, M. and Szpankowski, W., “A Discrete Divide and Conquer Recurrence”, Proc. SODA 2011, San Francisco, 2...

### Reliably Detecting Connectivity Using Local Graph Tarits

Posted: Sunday, May 1, 2011Cornejo, A. and Lynch, N., “Reliably Detecting Connectivity Using Local Graph Tarits”, International Conference on Principles of Distributed Systems (OPODIS), Tozeur, Tunisia, Dec. 2...

### Learning to Identify Students’ Relevant and Irrelevant Questions in a Micro-Blogging Supported Classroom

Posted: Sunday, May 1, 2011Cetintas, Si, L., Chakravarty, S., Aagard H., Bowen, K., “Learning to Identify Students’ Relevant and Irrelevant Questions in a Micro-Blogging Supported Classroom”, Twenty-Fourth Conferences on Artificial Inte...

### Probing Capacity

Posted: Sunday, May 1, 2011Asnani, H., Permuter, H., and Weissman, T., “Probing Capacity”, Allerton Conference, October 2...

### Predicting Correctness of Problem Solving in ITS with a Temporal Collaborative Filtering Approach

Posted: Sunday, May 1, 2011Cetintas, S., Si, L., Xin, Y.P., Hord, C., “Predicting Correctness of Problem Solving in ITS with a Temporal Collaborative Filtering Approach”, Twenty-Fourth Conferences on Artificial Intelligence (I...

### Cascade, Triangular, and Two Way Source Coding with Degraded Side Information at the Second User

Posted: Sunday, May 1, 2011Asnani, H., Permuter, H., and Weissman, T., “Cascade, Triangular, and Two Way Source Coding with Degraded Side Information at the Second User”, Allerton Conference, October 2...

### Identification of Regulatory Modules in Time Series Gene Expression Data

Posted: Wednesday, October 6, 2010Contributed by Shankar Subramaniam.

### Identification of Important Signaling Proteins and Stimulants for the Production of Cytokines in RAW 264.7 Macrophages

Posted: Wednesday, October 6, 2010Production and release of cytokines in macrophage Identification of significant correlations between signaling proteins and cytokines Quantitative input/output modeling using Principal Co...

### Numerical Matrices Method for Nonlinear System Identification and Description of Dynamics of Biochemical Reaction Networks

Posted: Wednesday, October 6, 2010Contributed by Shankar Subramaniam.

### A Systems Approach to Pathways and Networks Involved in Lipid Metabolism in Macrophage Activation

Posted: Wednesday, October 6, 2010Cellular Networks, The Lipid A (Endotoxin) Receptor, Layers of Replications and Measurements, Experimental Data, Lipidomics Data Display, Lipid Pathways and Networks, Integrated Lipids, Genes, and Pathways, Ligand ...

### An Introduction to Bioinformatics Algorithms

Posted: Wednesday, October 6, 2010Outline: History: Major Events in Molecular Biology What is Life Made Of? What is Genetic Material? What Do Genes Do? W...

### Data to Biology

Posted: Wednesday, October 6, 2010Intro to some types of data.

### Inferring Connection Maps from AfCS Experimental Data and Legacy Data

Posted: Wednesday, October 6, 2010### Dynamics of Overlapping Structures in Modular Networks

Posted: Wednesday, October 6, 2010by J. A. Almendral, I. Leyva, D. Li, I. Sendiña–Nadal, S. Havlin and S. Boccaletti Modularity is a fundamental feature of real networks, being intimately bounded to their functionality, i.e., to their capa...

### Four “Biology Driven” Challenges for the STC Researcher

Posted: Wednesday, October 6, 2010Discussing: Knowledge Extraction from Data Noisy Data Classification of Modularity from Data Dealing with Dynamical Data

### Darwin Channel?

Posted: Tuesday, September 14, 2010The ﬂow of genetic information can be potentially modeled by two information-theoretic channels, namely the mutation channel and the Darwin channel. The mutation channel is basically deletion channel, so in this ...

### Madhu Sudan - Towards Universal Semantic Communication

Posted: Monday, April 16, 2007Consider the following fantastic scenario: Earth has just started receiving some signals from outer space. These signals don't seem like usual cosmic noise. Potentially an intelligent alien civilization is trying t...

### Andrew Barron - The Interplay of Information Theory, Probability and Statistics

Posted: Monday, February 26, 2007Presented Feb. 26th, 2007 as part of the Prestige Lecture Series

### Nicholas Yannelis - Contracts Under Asymmetric Information

Posted: Monday, February 12, 2007In any society (economy) individuals who are privately informed write contracts. Can one make sure that the contract written is a "good" one? But what is a good contract? What properties should a good contract hav...

### Sergio Verdú - Information Theory Today

Posted: Monday, October 2, 2006Founded by Claude Shannon in 1948, information theory has taken on renewed vibrancy with technological advances that pave the way for attaining the fundamental limits of communication channels and information sourc...