2025 ALLERTON: 61ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

6
6G
A
A Priori Optimization
Abstractions
Achievable Rates
active generative AI
active learning
Adaptive Optimization
Adversarial robustness
adversarial training
Age of Information
Age of Information
agent-based model
AI for Science
AI-enabled Cyber-Physical Systems
aleatoric uncertainty
Algorithms with predictions
Alpha-mutual information
Analytical Function Discovery
anomaly detection
Approximation Error
Artificial Intelligence
Artificial neural networks
Artificial parameter
asymmetric channels
asymptotic optimality
atomic norm
Attention
Autoencoder
automation
Autonomous systems
Average reward
B
balanced matching
batteries
Bayesian deep learning
Bayesian inference
Bayesian methods
Bayesian networks
Bayesian persuasion
Bayesian uncertainty quantification
Beamforming
Beamspace Processing
binary dot product
Binning
Biometric identification systems
biosystems design
Breakdown Point
broadcast channel
broadcast networks
Budget Constraints
C
caching network
Camera-based Perception
capacity region
Catastrophic Forgetting
causal discovery
causal inference
causal mixing
chain of thought
Change Detection
change-point
Change-point detection
Changepoint detection
channel coding
channel estimation
Channel simulation
channel with feedback
Classification
cloud computing
clustering of time series
Codec
coding techniques and applications
coding theory
combination network
Combinatorial design theory
Common randomness
Communication Systems
Complete Information
complex networked systems
Complexity
Compositional Verification
compressed sensing
Compression
compression
computation offloading
Computational complexity
Concentration
Conditional Value at Risk
Conjectural reasoning
consensus
Conservative Q-learning
Constellation Design
constrained Cramer-Rao bound
Constrained Markov Decision Process
Constraint satisfaction problem
content caching
Continual Learning
contraction theory
contrastive pre-training
Control
convergence of probability measures
Converses
convex minorant
convex optimization
coordination games
Copositive programming
coset states
Cost Optimization
Counterfactual Retrieval
cross technology communications
cross-sector partnership
CUSUM
cutting-plane methods
Cyber Deception
cyber-physical systems
cyclostationary
D
data acquisition
data assimilation
Data compression
data ecology
data markets
Data modeling
data-driven methods
dataflows
day-ahead
DC power flow
Dec-POMDP
Decentralized algorithms
Decoding
Deep Learning
Deep Neural Network Verification
deep reinforcement learning (DRL)
delay-optimal control
Delayed engagement decision
demand response
denoising
denoising score matching
dependent data
desalination
detection and estimation
detection delay
Differential entropy
Differential game
Differential Privacy
differential privacy
Differential Privacy
diffusion
diffusion model
Diffusion Models
Directional Modulation
discrete distribution estimation
distillation
distributed and large-scale systems
Distributed Computing
Distributed Energy Resources
distributed learning
distributed optimization
Distributed Storage Systems
Distribution Estimation
distribution-free algorithms
duty cycle constraint
Dynamic calibration
Dynamic information acquisition
Dynamic mechanism design
dynamic scheduling
dynamical systems
dynamical systems
E
echo state networks
electricity
electricity market
electricity markets
Encoding
Energy
Energy harvesting wireless networks
Entanglement-assisted communication
Entropy coding
Epidemiological modeling
epistemic uncertainty
Equilibrium selection
ergodic rate
Erlang-C
Error-correcting codes
Error-sensitive
Estimation
Estimation
Estimation bias
Evaluation
exploration
Exponential cost
externality
F
f-divergence inequalities
Failure discovery
Fairness
farsightedness
federated learning
Federated learning (FL)
Federated LLM Fine-Tuning
Fine-tuning LLMs
finite regime
flow-based models
Focal loss
Follow-the-Perturbed-Leader
Follow-the-Regularized-Leader
formal methods
formal verification
Foundation Models
Function Approximation
G
game theory
Gaussian Comparision Inequalities
generalized synchronization
generative AI
Generative modeling
generative models
Geometric Deep Learning
ghost modulation
Good-Turing estimator
Gossip Networks
graph neural network (GNN)
Graph Neural Networks
Graphon
group formation
Group Testing
groupcast
Guidance problem
H
hamming coding
Hardware Trojan
Heavy-Tailed Noise
Heavy-traffic analysis
heterogeneity
Heterogeneous stochastic systems
hierarchical models
high-dimensional data
High-Probability Bounds
Human–AI collaboration
Hypothesis testing
hypothesis testing
I
I-MMSE
identifiability
identification rate
image editing
Image restoration
impossibility upper bound
Incentivization
Incomplete information
Infinite Dimensional Optimization
Influence Function
information design
information freshness
Information Fusion
Information Fusion
Information structure
Information theoretic lower bounds
Information Theoretic Privacy
information theoretic security
Information Theory
information theory
Information-Theoretic Privacy
Integrated Sensing and Communication (ISAC)
interactive error-correcting codes
Interference Channel
Interference-powered networks
interim stability
Interpretable machine learning
interval Markov decision process
Inverse Constraint Learning
inverse problem
inverse problems
J
Join the Shortest Queue
joint communication and sensing
joint problems
K
Kernel Methods
kernel statistics
knapsack problem
Koopman
Kron Reduction
Kruskal's Algorithm
KV Cache
L
Language Models
Large language model
Large language models
Large language models (LLMs)
Large system analysis
Latency
Lattice
LDPC
Learned error-correcting codes
Learning in general games
learning linear dynamical systems
Learning to communicate
Learning-enabled Autonomous Systems
Learning-enabled Autonomy
Lifelong Learning
limit theorems
Linear Control
linear quadratic regulator
linearization
Link function
LLM
LLM Fine-Tuning
load balancing
local differential privacy
log-likelihood training
logic
Low-light
Lyapunov
Lyapunov Function
Lyapunov functions
Lyapunov methods
M
M-estimator
M-MMSE
machine faults
machine learning
machine learning and learning theory
machine learning representations
Majority-Logic Decoding
Majorization theory
Malliavin derivative
market power
Markov chain
Markov Chain Monte Carlo
Markov chains
Markov Decision Process
Markov Decision Process
Markov Games
martingale convergence theorem
Massive MIMO
Massive MIMO Radar
Matrix factorization
Matrix norms
Matrix Riccati Differential Equation
Mechanism Design
message-passing algorithm
Microgrid network
millimeter-wave
Minimax optimality
Minimum Spanning Tree
Minkowski sums
missing mass
Missing mass
Mixing
MMSE
model based RL
model collapse
model reduction
Model Selection
model structural uncertainty
model-form error
monogamy-of-entanglement
Monotone systems
Monte Carlo methods
Multi armed bandit (MAB)
Multi-agent Reinforcement Learning
Multi-arm bandit
multi-armed bandit
Multi-cell processing
multi-modal detection
multi-party computation
Multiple-Access Channel
multiplex networks
Multiplicative Noise
Multitask learning
multivariate time series
MVDR Beamforming
N
net metering
network coding
Network constraints
network control
network flow
network information theory
network topology
Neural Control Barrier Functions
neural differential equations
Neural Network Controllers
neural network verification
Neural Networks
Neural Operators
neural perception
neural stochastic differential equation
Non-binary
non-equilibrium statistical physics
Non-monetary mechanism
noncooperative dynamic games
Nonlinear control
nonlinear dynamic system
nonlinear dynamics
Nonlinear Systems
Nudges
numerical analysis
O
Oblivious Transfer
offline reinforcement learning
online algorithm
Online algorithms
online allocation
Online convex optimization
Online Learning
Online Linear Optimization
Online matching
Online Resource Allocation
opacity
Open questions
Operating Envelopes
Opinion dynamics
optimal battery placement
Optimal Control
optimal experimental design
optimal experimental design (OED)
Optimal stopping
Optimal Transport
Optimization
Optimization
optimization performance analysis
Optimization Theory
Outage constrained routing
outliers
P
P-MMSE
Partial Information
PDE
Perception models
Perishability
perturbation
Pessimism Principle
physical intelligence
Physical-Layer Security
Pilot contamination
Poincare
Poisson equation
Poisson functional representation
polyhedral cone
post-allocation service
posterior sampling
POVM optimization
Power electronic converters
Power Flow
Power Modulation
Power system operations
Power Systems
Pre-order preserving linear maps
Preferential attachment models
Preventive and reactive defense
Price optimization
pricing
privacy amplification
privacy costs
privacy preservation
private information retrieval
Private Information Retrieval
Probabilistic Minimum Spanning Tree Problem
probabilistic model checking
proof certification
proof generation and checking
Prophet inequalities
protein design
proxy assignments
Pulse Shaping filter
Pushing the Efficiency-Performance Trade-Off
Q
quality constraint
Quantile regression
quantum algorithms
Quantum capacity
quantum correlations
quantum games
Quantum relay channels
Quantum repeaters
Quasi cyclic
queue
Queueing systems
Queueing theory
quickest change detection
quickest detection
quickest quantum channel change detection
quickest quantum state change detection
R
random binning
random graph
Random Graphs
random matching markets
random matrices
Random matrix theory
Randomized algorithm
randomized cutting-plane method
Randomized Singular Value Decomposition
Randomized SVD
rate region
Rate-Distortion Theory
rate-distortion-perception
Rational Inattention
Reachability Analysis
real-time
reasoning
reasoning
reasoning models
Reconfigurable Antenna Arrays
rectified flow
recursive training
refugee matching
Regression
regret
Reinforcement Learning
reinforcement learning
Reinforcement Learning from Human Feedback (RLHF)
Reinforcement Learning with Symbolic Feedback
Relay-Channel
Reliability
reliability security and trust
Remote Estimation
renewable energy
reoptimization
representation alignment
Representation Learning
Reproducing Kernel Hilbert Space
reservoir computing
Resource allocation
resource pooling
Restless Bandits
restless multi armed bandits
Ridge regression
Risk-seeking Policy Optimization
RLHF
Robust MDP
Robust regression
robust reinforcement learning
robustness
Robustness quantification
rolling element bearing
ROPE
routing algorithms
RSVD
Rényi divergence
Rényi entropy
Rényi-divergence
S
Safe Autonomous Systems
Safety
Sample complexity
Sampling
sampling control
SAT/SMT Solvers
Scalability
Scalable pilot assignment
Scheduling
Scheduling Algorithm
score-based diffusion
Second-order Cone Power Flow Relaxation
Secrecy
secrecy capacity
security
self-driving laboratory
Semantic Communication
semantic communications
semantics
semidefinite programming
sequential change detection
Sequential decision making
Sequential decision-making
Sequential decision-making
sequential detection
sequential test
Series expansion
Service rate regions
SGD
shallow and wide networks
Shared resource allocation
side channels
Side information
Sign structure analysis
signaling mechanism
sketching
smart grid
Soft-decision decoding
source coding
source signal separation
Source-Channel Coding
spatial cohesion
Spatially correlated Rayleigh fading
Sphere-packing
SPIR
Spot Instances
Stability
Stackelberg games
Stackelberg Games
State space collapse
Statistical analysis
Stochastic Control
stochastic gradient algorithm
stochastic gradient descent
Stochastic Hybrid Systems
Stochastic linear bandits
stochastic localization
Stochastic Maximum Principle
stochastic optimal control
Stochastic Optimization
stochastic optimization
Stochastic Processes
stopping time
Storage vs Transport Capacity Tradeoffs
strategic communication
Strategic deception
strong data processing inequalities
strong duality
strong Nash equilibrium
structural system theory
Sub-quadratic
subspace
subspace permutations
subspace states
switch-type policies
Switchback experiments
Symbolic reasoning
Symbolic Transformer
Symmetric Private Information Retrieval
synthetic data
synthetic data augmentation
System Identification
T
Target Detection
target following
Tarski’s theorem
Tensor Product Attention
test-time scaling
Testing
text summarization
Thompson Sampling
time series forecasting
Time-reversal
time-varying constraints
timing synchronization
Traffic control
training dynamics
Transfer Reinforcement Learning
Transformers
Transport
Trojan Detectability
truncated epigraphs
trust
U
uncertain max flow
uncertain min cut
Uncertainty Quantification
uncertainty quantification (UQ)
unified approach
unit commitment
Unit commitment
universal adversarial attack
universal information theory
Unknown Distribution
Upper confidence bounds
User preferences and Actionability
V
value of data
variable max flow
variable maximum flow
variable min cut
variable minimum cut
Variable-length codes
Variational Inference
W
water-energy nexus
Watermarking
weak derivative estimator
Weakly coupled stochastic dynamic programs
Weakly-coupled MDPs
Wiener filter
Wireless Communication
Wireless networks
world models
Z
Z Channel
Zero Perception Error
zero-one law
Zero-One Laws
Zero-Shot Learning
zeroth-order optimization