Convergence analysis of alternating direction method of multipliers for a family of nonconvex problems
The alternating direction method of multipliers (ADMM) is widely used to solve large-scale
linearly constrained optimization problems, convex or nonconvex, in many engineering …
linearly constrained optimization problems, convex or nonconvex, in many engineering …
A unified algorithmic framework for block-structured optimization involving big data: With applications in machine learning and signal processing
This article presents a powerful algorithmic framework for big data optimization, called the
block successive upper-bound minimization (BSUM). The BSUM includes as special cases …
block successive upper-bound minimization (BSUM). The BSUM includes as special cases …
Joint communication, computation, caching, and control in big data multi-access edge computing
The concept of Multi-access Edge Computing (MEC) has been recently introduced to
supplement cloud computing by deploying MEC servers to the network edge so as to reduce …
supplement cloud computing by deploying MEC servers to the network edge so as to reduce …
[BOOK][B] Modern nonconvex nondifferentiable optimization
Mathematical optimization has always been at the heart of engineering, statistics, and
economics. In these applied domains, optimization concepts and methods have often been …
economics. In these applied domains, optimization concepts and methods have often been …
Multi-UAV interference coordination via joint trajectory and power control
Recently, unmanned aerial vehicles (UAVs) have found growing applications in wireless
communications and sensor networks. One of the key challenges for UAV-based wireless …
communications and sensor networks. One of the key challenges for UAV-based wireless …
MIMO radar waveform design with PAPR and similarity constraints
The paper investigates the joint design of transmit waveform and receive filter for multiple-
input multiple-output radar in the presence of signal-dependent interference, subject to a …
input multiple-output radar in the presence of signal-dependent interference, subject to a …
Survey of security protocols and vulnerabilities in unmanned aerial vehicles
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have
increased in civil and military applications including rescue operations, disaster recovery …
increased in civil and military applications including rescue operations, disaster recovery …
Successive localization and beamforming in 5G mmWave MIMO communication systems
Beamforming is an attractive technique to improve the system performance for multi-input
multi-output (MIMO) communications. Previous works mainly focus on improving the data …
multi-output (MIMO) communications. Previous works mainly focus on improving the data …
Computing B-stationary points of nonsmooth DC programs
Motivated by a class of applied problems arising from physical layer based security in a
digital communication system, in particular, by a secrecy sum-rate maximization problem …
digital communication system, in particular, by a secrecy sum-rate maximization problem …
Iteration complexity analysis of block coordinate descent methods
In this paper, we provide a unified iteration complexity analysis for a family of general block
coordinate descent methods, covering popular methods such as the block coordinate …
coordinate descent methods, covering popular methods such as the block coordinate …