default search action
John MacLaren Walsh
Person information
- affiliation: Drexel University, Philadelphia, PA, USA
- affiliation (PhD 2006): Cornell University, Ithaca, NY, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
2010 – 2019
- 2019
- [c45]Yirui Liu, John MacLaren Walsh:
On the Complexity of Computing the Shannon Outer Bound to a Network Coding Capacity Region. ISIT 2019: 206-210 - [c44]John MacLaren Walsh, Alexander Erick Trofimoff:
On Designing Probabilistic Supports to Map the Entropy Region. ITW 2019: 1-5 - 2017
- [j18]Congduan Li, Steven Weber, John MacLaren Walsh:
Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors. IEEE Trans. Inf. Theory 63(1): 230-251 (2017) - [j17]Nan Xie, John MacLaren Walsh, Steven Weber:
Properties of an Aloha-Like Stability Region. IEEE Trans. Inf. Theory 63(5): 3181-3208 (2017) - [j16]Congduan Li, Steven Weber, John MacLaren Walsh:
On Multi-Source Networks: Enumeration, Rate Region Computation, and Hierarchy. IEEE Trans. Inf. Theory 63(11): 7283-7303 (2017) - [i11]Congduan Li, Steven Weber, John MacLaren Walsh:
On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy. CoRR abs/1704.01891 (2017) - [i10]Jie Ren, Solmaz Torabi, John MacLaren Walsh:
A Framework for Rate Efficient Control of Distributed Discrete Systems. CoRR abs/1704.08931 (2017) - 2016
- [j15]Jie Ren, Bradford D. Boyle, Gwanmo Ku, Steven Weber, John MacLaren Walsh:
Overhead Performance Tradeoffs - A Resource Allocation Perspective. IEEE Trans. Inf. Theory 62(6): 3243-3269 (2016) - [j14]Bradford D. Boyle, Jie Ren, John MacLaren Walsh, Steven Weber:
Interactive Scalar Quantization for Distributed Resource Allocation. IEEE Trans. Signal Process. 64(5): 1243-1256 (2016) - [c43]Solmaz Torabi, John MacLaren Walsh:
Distributed lossy interactive function computation. Allerton 2016: 393-400 - [c42]Solmaz Torabi, Jie Ren, John MacLaren Walsh:
Interactive Quantization for Extremum Computation in Collocated Networks. DCC 2016: 634 - [c41]Solmaz Torabi, Jie Ren, John MacLaren Walsh:
Practical interactive scheme for extremum computation in distributed networks. ISIT 2016: 1088-1092 - [c40]Jayant Apte, Qi Chen, John MacLaren Walsh:
Symmetries in the entropy space. ITW 2016: 51-55 - [i9]Mengke Hu, David Cinciruk, John MacLaren Walsh:
Improving Automated Patent Claim Parsing: Dataset, System, and Experiments. CoRR abs/1605.01744 (2016) - [i8]Jayant Apte, John MacLaren Walsh:
Constrained Linear Representability of Polymatroids and Algorithms for Computing Achievability Proofs in Network Coding. CoRR abs/1605.04598 (2016) - [i7]Jayant Apte, John MacLaren Walsh:
Explicit Polyhedral Bounds on Network Coding Rate Regions via Entropy Function Region: Algorithms, Symmetry, and Computation. CoRR abs/1607.06833 (2016) - 2015
- [j13]Gwanmo Ku, John MacLaren Walsh:
Resource Allocation and Link Adaptation in LTE and LTE Advanced: A Tutorial. IEEE Commun. Surv. Tutorials 17(3): 1605-1633 (2015) - [j12]Gwanmo Ku, Jie Ren, John MacLaren Walsh:
Computing the Rate Distortion Region for the CEO Problem With Independent Sources. IEEE Trans. Signal Process. 63(3): 567-575 (2015) - [c39]Yunshu Liu, John MacLaren Walsh:
Non-isomorphic distribution supports for calculating entropic vectors. Allerton 2015: 634-641 - [c38]Jayant Apte, John MacLaren Walsh:
Symmetry in network coding. ISIT 2015: 376-380 - [c37]Congduan Li, Steven Weber, John MacLaren Walsh:
Network combination operations preserving the sufficiency of linear network codes. ITW Fall 2015: 44-48 - [c36]Jayant Apte, John MacLaren Walsh:
Exploiting symmetry in computing polyhedral bounds on network coding rate regions. NetCod 2015: 76-80 - [c35]Congduan Li, Steven Weber, John MacLaren Walsh:
Computer aided proofs for rate regions of independent distributed source coding problems. NetCod 2015: 81-85 - [i6]Bradford D. Boyle, Jie Ren, John MacLaren Walsh, Steven Weber:
Interactive Scalar Quantization for Distributed Extremization. CoRR abs/1505.04202 (2015) - [i5]Congduan Li, Steven Weber, John MacLaren Walsh:
On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy. CoRR abs/1507.05728 (2015) - [i4]Yunshu Liu, John MacLaren Walsh:
Mapping the Region of Entropic Vectors with Support Enumeration & Information Geometry. CoRR abs/1512.03324 (2015) - 2014
- [c34]Congduan Li, Steven Weber, John MacLaren Walsh:
Network embedding operations preserving the insufficiency of linear network codes. Allerton 2014: 1333-1340 - [c33]Jayant Apte, Congduan Li, John MacLaren Walsh, Steven Weber:
Exact repair problems with multiple sources. CISS 2014: 1-6 - [c32]Bradford D. Boyle, John MacLaren Walsh, Steven Weber:
Distributed scalar quantizers for subband allocation. CISS 2014: 1-6 - [c31]Jie Ren, John MacLaren Walsh:
Interactive communication for resource allocation. CISS 2014: 1-6 - [c30]Jayant Apte, Congduan Li, John MacLaren Walsh:
Algorithms for computing network coding rate regions via single element extensions of matroids. ISIT 2014: 2306-2310 - [i3]Congduan Li, Steven Weber, John MacLaren Walsh:
Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors. CoRR abs/1407.5659 (2014) - [i2]Nan Xie, John MacLaren Walsh, Steven Weber:
Properties of an Aloha-like stability region. CoRR abs/1408.3469 (2014) - [i1]Jie Ren, Bradford D. Boyle, Gwanmo Ku, Steven Weber, John MacLaren Walsh:
Overhead Performance Tradeoffs - A Resource Allocation Perspective. CoRR abs/1408.3661 (2014) - 2013
- [j11]Prathaban Mookiah, John M. Walsh, Rachel Greenstadt, Kapil R. Dandekar:
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c29]Congduan Li, John MacLaren Walsh, Steven Weber:
Matroid bounds on the region of entropic vectors. Allerton 2013: 796-803 - [c28]Bradford D. Boyle, John MacLaren Walsh, Steven Weber:
Channel dependent adaptive modulation and coding without channel state information at the transmitter. ICASSP 2013: 5090-5093 - [c27]Yunshu Liu, John MacLaren Walsh:
Bounding the entropic region via information geometry. ITW 2013: 1-5 - [c26]Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber:
A new computational approach for determining rate regions and optimal codes for coded networks. NetCod 2013: 1-6 - [c25]Nikhil Gulati, Rachel Greenstadt, Kapil R. Dandekar, John M. Walsh:
GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme. VTC Fall 2013: 1-6 - 2012
- [j10]Sivagnanasundaram Ramanan, John MacLaren Walsh:
Practical Codes for Collaborative Estimation. IEEE Trans. Signal Process. 60(6): 3203-3216 (2012) - [c24]Congduan Li, John MacLaren Walsh, Steven Weber:
A computational approach for determining rate regions and codes using entropic vector bounds. Allerton Conference 2012: 1580-1587 - [c23]Steven Weber, Congduan Li, John MacLaren Walsh:
Rate region for a class of delay mitigating codes and P2P networks. CISS 2012: 1-6 - 2011
- [j9]Ciira Wa Maina, John MacLaren Walsh:
Joint Speech Enhancement and Speaker Identification Using Approximate Bayesian Inference. IEEE Trans. Speech Audio Process. 19(6): 1517-1529 (2011) - [j8]John MacLaren Walsh, Steven Weber:
A Recursive Construction of the Set of Binary Entropy Vectors and Related Algorithmic Inner Bounds for the Entropy Region. IEEE Trans. Inf. Theory 57(10): 6356-6363 (2011) - [c22]Ciira Wa Maina, John MacLaren Walsh:
Approximate Bayesian robust speech processing. ACSCC 2011: 397-400 - [c21]Ciira Wa Maina, John MacLaren Walsh:
Compensating for noise and mismatch in speaker verification systems using approximate Bayesian inference. CISS 2011: 1-6 - [c20]Sivagnanasundaram Ramanan, John MacLaren Walsh:
Practical codes for lossy compression when side information may be absent. ICASSP 2011: 3048-3051 - [c19]Ciira Wa Maina, John MacLaren Walsh:
Log spectra enhancement using speaker dependent priors for speaker verification. ICASSP 2011: 4540-4543 - [c18]Gwanmo Ku, John M. Walsh:
Power amplifier nonlinearity effects on OFDM subcarrier transmit beamforming. WCNC 2011: 1954-1959 - 2010
- [j7]John MacLaren Walsh, Phillip A. Regalia:
On the Relationship Between Belief Propagation Decoding and Joint Maximum Likelihood Detection. IEEE Trans. Commun. 58(10): 2753-2758 (2010) - [j6]John MacLaren Walsh, Phillip A. Regalia:
Belief propagation, Dykstra's algorithm, and iterated information projections. IEEE Trans. Inf. Theory 56(8): 4114-4128 (2010) - [j5]Sivagnanasundaram Ramanan, John MacLaren Walsh:
Distributed estimation of channel gains in wireless sensor networks. IEEE Trans. Signal Process. 58(6): 3097-3107 (2010) - [c17]John MacLaren Walsh, Steven Weber:
Relationships among bounds for the region of entropic vectors in four variables. Allerton 2010: 1319-1326 - [c16]Ciira Wa Maina, John MacLaren Walsh:
Joint speech enhancement and speaker identification using approximate Bayesian inference. CISS 2010: 1-6
2000 – 2009
- 2009
- [j4]John MacLaren Walsh, Steven Weber, Ciira Wa Maina:
Optimal rate: delay tradeoffs and delay mitigating codes for multipath routed and network coded networks. IEEE Trans. Inf. Theory 55(12): 5491-5510 (2009) - [c15]John MacLaren Walsh, Steven Weber:
A recursive construction of the set of binary entropy vectors. Allerton 2009: 545-552 - [c14]Ciira Wa Maina, John MacLaren Walsh:
Joint speech enhancement and speaker identification using monte carlo methods. INTERSPEECH 2009: 1375-1378 - 2008
- [c13]Sivagnanasundaram Ramanan, John MacLaren Walsh:
Distributed estimation of channel gains in sensor networks. ACSCC 2008: 1953-1957 - [c12]Ciira Wa Maina, John MacLaren Walsh:
A cost function level analysis of Autocorrelation Minimization based blind adaptive channel shorteners. ACSCC 2008: 2193-2197 - [c11]John MacLaren Walsh, Steven Weber:
Capacity region of the permutation channel. Allerton 2008: 646-652 - [c10]John MacLaren Walsh, Phillip A. Regalia:
Belief propagation distributed estimation in sensor networks: An optimized energy accuracy tradeoff. ICASSP 2008: 2297-2300 - [c9]John MacLaren Walsh, Steven Weber, Ciira Wa Maina:
Optimal rate delay tradeoffs for multipath routed and network coded networks. ISIT 2008: 682-686 - [c8]Youngmoo E. Kim, John MacLaren Walsh, Travis M. Doll:
Comparison of a joint iterative method for multiple speaker identification with sequential blind source separation and speaker identification. Odyssey 2008: 8 - 2007
- [j3]Phillip A. Regalia, John MacLaren Walsh:
Optimality and Duality of the Turbo Decoder. Proc. IEEE 95(6): 1362-1377 (2007) - [c7]John MacLaren Walsh:
Density Evolution for Expectation Propagation. ICASSP (2) 2007: 545-548 - [c6]John MacLaren Walsh:
EXIT and Density Evolution Analysis for Homogeneous Expectation Propagation. ISIT 2007: 876-880 - 2006
- [j2]John MacLaren Walsh, Phillip A. Regalia, C. Richard Johnson Jr.:
Turbo Decoding as Iterative Constrained Maximum-Likelihood Sequence Detection. IEEE Trans. Inf. Theory 52(12): 5426-5437 (2006) - [c5]John MacLaren Walsh, Phillip A. Regalia:
Iterative Constrained Maximum Likelihood Estimation Via Expectation Propagation. ICASSP (5) 2006: 713-716 - 2005
- [j1]Richard K. Martin, John M. Walsh, C. Richard Johnson Jr.:
Low-complexity MIMO blind, adaptive channel shortening. IEEE Trans. Signal Process. 53(4): 1324-1334 (2005) - [c4]John M. Walsh, C. Richard Johnson Jr., Phillip A. Regalia:
A refined information geometric interpretation of turbo decoding. ICASSP (3) 2005: 481-484 - [c3]John MacLaren Walsh, Phillip A. Regalia, C. Richard Johnson Jr.:
A convergence proof for the turbo decoder as an instance of the gauss-seidel iteration. ISIT 2005: 734-738 - 2004
- [c2]John M. Walsh, C. Richard Johnson Jr.:
Series feedforward interconnected adaptive devices. ICASSP (2) 2004: 445-448 - [c1]Richard K. Martin, John M. Walsh, C. Richard Johnson Jr.:
Low complexity MIMO blind adaptive channel shortening. ICASSP (4) 2004: 1073-1076
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint