Остановите войну!
for scientists:
default search action
Todd P. Coleman
- > Home > Persons > Todd P. Coleman
Publications
- 2023
- [j38]Negar Kiyavash, Elias Bareinboim, Todd P. Coleman, Alex Dimakis, Bernhard Schlkopf, Peter Spirtes, Kun Zhang, Robert Nowak:
Editorial Special Issue on Causality: Fundamental Limits and Applications. IEEE J. Sel. Areas Inf. Theory 4: iv (2023) - 2016
- [j21]Jalal Etesami, Negar Kiyavash, Todd P. Coleman:
Learning Minimal Latent Directed Information Polytrees. Neural Comput. 28(9): 1723-1768 (2016) - 2015
- [j18]Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
Directed Information Graphs. IEEE Trans. Inf. Theory 61(12): 6887-6909 (2015) - 2014
- [j17]Sanggyun Kim, Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
Dynamic and Succinct Statistical Analysis of Neuroscience Data. Proc. IEEE 102(5): 683-698 (2014) - 2013
- [j15]Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues:
A Timing Channel Spyware for the CSMA/CA Protocol. IEEE Trans. Inf. Forensics Secur. 8(3): 477-487 (2013) - [j13]Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
Efficient Methods to Compute Optimal Tree Approximations of Directed Information Graphs. IEEE Trans. Signal Process. 61(12): 3173-3182 (2013) - [c46]Christopher J. Quinn, Jalal Etesami, Negar Kiyavash, Todd P. Coleman:
Robust directed tree approximations for networks of stochastic processes. ISIT 2013: 2254-2258 - 2012
- [j12]Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman, Ira S. Moskowitz, Myong H. Kang:
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. IEEE Trans. Inf. Forensics Secur. 7(1): 64-75 (2012) - [c40]Jalal Etesami, Negar Kiyavash, Todd P. Coleman:
Learning minimal latent directed information trees. ISIT 2012: 2726-2730 - [i4]Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
Directed Information Graphs. CoRR abs/1204.2003 (2012) - 2011
- [j10]Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash, Nicholas G. Hatsopoulos:
Estimating the directed information to infer causal relationships in ensemble neural spike train recordings. J. Comput. Neurosci. 30(1): 17-44 (2011) - [c37]Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
A minimal approach to causal inference on topologies with bounded indegree. CDC/ECC 2011: 168-173 - [c34]Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman:
Equivalence between minimal generative model graphs and directed information graphs. ISIT 2011: 293-297 - [i2]Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:
Causal Dependence Tree Approximations of Joint Distributions for Multiple Random Processes. CoRR abs/1101.5108 (2011) - 2010
- [c24]Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:
Approximating discrete probability distributions with causal dependence trees. ISITA 2010: 100-105 - [c23]Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang:
Directed information and the NRL Network Pump. ISITA 2010: 343-348 - 2009
- [c21]Negar Kiyavash, Todd P. Coleman:
Covert timing channels codes for communication over interactive traffic. ICASSP 2009: 1485-1488 - [c20]Negar Kiyavash, Todd P. Coleman, Mavis Rodrigues:
Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels. ICC 2009: 1-5 - 2008
- [c16]Todd P. Coleman, Negar Kiyavash:
Sparse graph codes and practical decoding algorithms for communicating over packet timings in networks. CISS 2008: 447-452 - [c15]Todd P. Coleman, Negar Kiyavash, Vijay G. Subramanian:
The Rate-Distortion Function of a Poisson Process with a Queueing Distortion Measure. DCC 2008: 63-72 - [c11]Todd P. Coleman, Negar Kiyavash:
Practical codes for queueing channels: An algebraic, state-space, message-passing approach. ITW 2008: 318-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint