Modern day cellular mobile networks use Massive MIMO technology to extend range and service multiple devices within a cell. This has brought tremendous improvements in the high peak data rates that can be handled. Nevertheless, one of the characteri…
Valuation Approaches and Metrics focuses on the theory and practice of valuation of companies and stocks, providing an invaluable overview of the topic from both a practical and scholarly perspective. It reviews the finance literature on valuation a…
Recent years have witnessed enormous progress in AI-related fields such as computer vision, machine learning, and autonomous vehicles. As with any rapidly growing field, it becomes increasingly difficult to stay up-to-date or enter the field as a be…
Covariance matrices have found applications in many diverse areas. These include beamforming in array processing; portfolio analysis in finance; classification of data and the handling of high-frequency data. Structured Robust Covariance Estimation…
This monograph provides an overview of bandit algorithms inspired by various aspects of Information Retrieval (IR), such as click models, online ranker evaluation, personalization or the cold-start problem. Using a survey style, each chapter focuses…
Revenue Management: Advanced Strategies and Tools to Enhance Firm Profitability explores the role of marketing in revenue management (RM) in depth. While much of the past research on RM has focused on forecasting and optimization models and on adapt…
Despite remarkable advances in the algebraic and iterative codes used in modern communication systems, finding codes that operate at rates close to capacity; have low computational complexity; and have provable reliability guarantees was an elusive…
Bayesian Multivariate Time Series Methods for Empirical Macroeconomics provides a survey of the Bayesian methods used in modern empirical macroeconomics. These models have been developed to address the fact that most questions of interest to empiric…
Modular heap analysis techniques analyze a program by computing summaries for every procedure in the program that describes its effects on an input heap, using pre-computed summaries for the called procedures. In A Framework For Efficient Modular He…
Experimetrics comprises the body of econometric techniques that are customized to experimental applications. This monograph is aimed principally at two types of reader -- the experimental economist who is interested in expanding their skill set in e…
Mismatched decoding has long been studied and used when considering practical considerations such as channel uncertainty and implementation constraints that rule out the use of an optimal decoder in reliably transmitting over a communication channel…
Recent years have seen the advent of new large cyber-physical systems such as sensor and social networks. These network systems are typically spatially distributed over a large area and may consists of hundreds of agents in smart-sensor networks to…
There has been a recent marked increase in the amount of spatial data collected by smart phones, space telescopes, and medical devices, among others. The increased volume has brought into focus the need for specialized systems to handle big spatial…
Discrete Graphical Models: An Optimization Perspective is about discrete energy minimization for discrete graphical models. It considers graphical models, or, more precisely, maximum a posteriori inference for graphical models, purely as a combinato…
The goal of aggregated search is to provide integrated search across multiple heterogeneous search services in a unified interface-a single query box and a common presentation of results. In the web search domain, aggregated search systems are respo…
Quantum Proofs provides an overview of many of the known results concerning quantum proofs, computational models based on this concept, and properties of the complexity classes they define. In particular, it discusses non-interactive proofs and the…
After a long decline in American manufacturing in the 2000s - manufacturing employment fell by one third, 64,000 factories closed, manufacturing capital investment and output suffered, and the productivity rate dropped during this period. Simultaneo…
Recent advances in information and communication technologies, embedded systems and sensor networks have generated significant research activity in the development of so-called cyber-physical systems. An example of a large network of cyber-physical…
This monograph describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper…
This monograph comprises a series of ten lectures divided into two parts. Part 1, referred to as the Solar Lectures, focuses on the communication and computational complexity of computing an (approximate) Nash equilibrium. Part 2, the Lunar Lectures…
Addresses the question of how potential insurance buyers make decisions like these by considering the conceptual and empirical evidence that address the following theoretical and behavioral issues: the extent that consumers tend to follow the multip…
Inference in the Presence of Weak Instruments is concerned with inference in the linear simultaneous equations model. The ideas developed for this model have remained central to econometric practice, with the use of instrumental variables estimation…
In information retrieval, query auto completion (QAC), also known as type-ahead and auto-complete suggestion, refers to the following functionality: given a prefix consisting of a number of characters entered into a search box, the user interface pr…
Monte Carlo methods, in particular those based on Markov chains and on interacting particle systems, are by now tools that are routinely used in machine learning. These methods have had a profound impact on statistical inference in a wide range of a…
As experimental economics methods grow in prominence in marketing research, marketing researchers increasingly evolve experimental economics further, adding marketing flavors and theories, introducing new problems, discussing new ways of looking at…
Behavioral Economics and the Law begins with the early evolution of behavioral economics both outside and within legal policy analysis and then describes the central role of behavioral economics in such analysis today. The ""behavioral law and econo…
The automotive industry is at an inflection point between old and new technologies. More sensors are being incorporated into vehicles in an effort to realize safer and more efficient traffic. The increase in sensors and sensor complexity has a numbe…
Search has become ubiquitous but that does not mean that search has been solved. Enterprise Search, which is broadly speaking the use of information retrieval technology to find information within organisations, is a good example to illustrate this.…
Bioresources are becoming increasingly important and topical as the world is faced with growing food demand as well as increased pressure to provide energy and materials. This monograph discusses the current flows of bioresources, their inherent pro…
Crowdfunding has become an important aspect of society today. It has been said to have supplanted traditional financial institutions and has given new life to ventures. The intent of this monograph is to allow you to understand crowdfunding in its c…
Inventory Management provides a unique overview of inventory models, from single-item single-echelon models to multi-item multi-echelon models. Rather than starting with inventory models that are tractable from a mathematical point of view, the auth…
The Equity Home Bias Puzzle: A Survey puts into perspective one of the strongest and most persistent empirical phenomena in finance: equity home bias. The authors not only provide a thorough review of the competing Measures of home bias and the expl…
Corporate Entrepreneurship provides a thorough review of the literature on this topic and presents a model based on this literature. Corporate entrepreneurship (CE) is increasingly being recognized as a legitimate path to high levels of organization…
Sparse estimation methods are aimed at using or obtaining parsimonious representations of data or models. They were first dedicated to linear variable selection but numerous extensions have now emerged such as structured sparsity or kernel selection…
Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial a…
Economic Modeling in Networking is designed to provide engineering students who have a basic training in economic modeling and game theory an understanding of where and when game theoretic models are employed, the assumptions underpinning key models…
Capital Budgeting and Divisional Performance Measurement synthesizes recent work on the use of capital budgeting mechanisms to coordinate decentralized investment decisions in multi-division firms with a focus on two-stage investment problems. Divis…
A Survey of Augmented Reality summarizes almost fifty years of research and development in the field of Augmented Reality (AR). From early research in the 1960's until widespread availability by the 2010's, there has been steady progress towards the…
Nominal Game Semantics complements existing introductory literature to game semantics, which highlight the then new structural components necessary to model higher-order computation; for example, arenas, justification pointers, and innocence. In con…
Modern applications in engineering and data science are increasingly based on multidimensional data of exceedingly high volume, variety, and structural richness. However, standard machine learning and data mining algorithms typically scale exponenti…
The NP-completeness of SAT is a celebrated example of the power of bounded-depth computation: the core of the argument is a depth reduction establishing that any small non-deterministic circuit - an arbitrary NP computation on an arbitrary input - c…
Accounting is an Evolved Economic Institution starts by defining ""accounting history research"" and posing six big picture questions about historical accounting evolution. The book summarizes accounting history over the past ten thousand years - th…
Max-plus linear systems theory was inspired by and originated from classical linear systems theory more than three decades ago, with the purpose of dealing with nonlinear synchronization and delay phenomena in timed discrete event systems in a linea…
Binary detection is a ubiquitous problem in virtually all branches of science and technology. In many cases, binary detection must be carried out in a setting wherein the presence of an adversary aiming at inducing a wrong decision cannot be ruled o…
Domain adaptation is an active, emerging research area that attempts to address the changes in data distribution across training and testing datasets. With the availability of a multitude of image acquisition sensors, variations due to illumination…
Learning Representation and Control in Markov Decision Processes describes methods for automatically compressing Markov decision processes (MDPs) by learning a low-dimensional linear approximation defined by an orthogonal set of basis functions. A u…
The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a n…
The firm's capital structure - how it funds operations by raising capital from a variety of sources - has attracted considerable attention from both academics and practitioners. The empirical capital structure literature explores both the cross-sect…
Submodular functions are relevant to machine learning for at least two reasons: (1) some problems may be expressed directly as the optimization of submodular functions, and (2) the Lovasz extension of submodular functions provides a useful set of re…
The use of convex optimization in the fields of data science and engineering is becoming ubiquitous. But is has been recognized in the research community for more than a decade that significant efficiencies can be gained by acknowledging the latent…