default search action
50th CISS 2016: Princeton, NJ, USA
- 2016 Annual Conference on Information Science and Systems, CISS 2016, Princeton, NJ, USA, March 16-18, 2016. IEEE 2016, ISBN 978-1-4673-9457-4
- Om Prakash Verma, Rishi Raj Chopra, Abhinav Gupta:
An Adaptive Bacterial Foraging Algorithm for color image enhancement. 1-6 - Gordon Stein, Yuan Li, Yin Wang:
One sample per person facial recognition with local binary patterns and image sub-grids. 7-11 - Zhen Li, Fei Chen, Jialong He, Mingmin Zhu, Binbin Xu:
Signal processing of time domain load signals of CNC lathe based on improved Neighbor Block. 12-17 - Benjamin Johnen, Bernd Kuhlenkötter:
A Dynamic Time Warping algorithm for industrial robot motion analysis. 18-23 - Lav R. Varshney, Kush R. Varshney:
Fidelity loss in distribution-preserving anonymization and histogram equalization. 24-29 - Irem Koprulu, Yoora Kim, Ness B. Shroff:
Battle of opinions over evolving social networks. 30-35 - Ahmed A. Alabdel Abass, Mohammad Hajimirsadeghi, Narayan B. Mandayam, Zoran Gajic:
Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network. 36-41 - Sijia Liu, Yanzhi Wang, Makan Fardad, Pramod K. Varshney:
Optimal energy allocation and storage control for distributed estimation with sensor collaboration. 42-47 - Seifemichael B. Amsalu, Wondimu K. Zegeye, Dereje Hailemariam, Yacob Astatke:
Design and performance evaluation of an energy efficient routing protocol for Wireless Sensor Networks. 48-53 - Qingyu Yang, Rui Min, Dou An, Wei Yu, Xinyu Yang:
Towards optimal PMU placement against data integrity attacks in smart grid. 54-58 - George D. Sworo, Kapil R. Dandekar, Moshe Kam:
Performance of pattern diversity in reconfigurable antenna arrays. 59-63 - Anirudh M. Rangaswamy, Lorenzo Lo Monte, Michael C. Wicks:
Statistical analysis of measured ground penetrating radar data. 64-69 - Junyoung Nam, Young-Jo Ko:
Doubly opportunistic beamforming for downlink multiuser MIMO. 70-75 - Gozde Ozcan, Mustafa Cenk Gursoy:
Energy-efficient power control with finite discrete inputs under quality of service constraints. 76-81 - Hailu Belay Kassa, Tezera Yitbarek Chernet, Estifanos Yohannes, Dereje Hailemariam, Yacob Astatke, Farzad Moazzami, Wondimu K. Zegeye:
Investigation of RLS beamforming algorithm interms of energy efficiency. 82-86 - Hui Wang, Qingchun Chen, Yong Zhang:
On the LLR criterion based shortening design for LDPC codes. 87-92 - Sebastian Cammerer, Vahid Aref, Laurent Schmalen, Stephan ten Brink:
Triggering wave-like convergence of tail-biting spatially coupled LDPC codes. 93-98 - Marc Bauduin, Serge Massar, François Horlin:
Non-linear satellite channel equalization based on a low complexity Echo State Network. 99-104 - Sinem Unal, Aaron B. Wagner:
Vector Gaussian multi-decoder rate-distortion: Trace constraints. 105-110 - Rawan Naous, Mohammed Affan Zidan, Ahmed K. Sultan, Khaled Nabil Salama:
Channel equalization techniques for non-volatile memristor memories. 111-116 - Omid Javidbakht, Parv Venkitasubramaniam:
Differential privacy in networked data collection. 117-122 - Hafiz Imtiaz, Rogers F. Silva, Bradley T. Baker, Sergey M. Plis, Anand D. Sarwate, Vince D. Calhoun:
Privacy-preserving source separation for distributed data using independent component analysis. 123-127 - Peter Kairouz, Sewoong Oh, Pramod Viswanath:
Differentially private multi-party computation. 128-132 - Giulia Fanti, Pramod Viswanath:
Algorithmic advances in anonymous communication over networks. 133-138 - Zamiyad Dar, Koushik Kar, Joe H. Chow:
Store or sell? A threshold price policy for revenue maximization in windfarms with on-site storage. 139-144 - Chee Wei Tan, Pei-Duo Yu, Chun-Kiu Lai, Wenyi Zhang, Hung-Lin Fu:
Optimal detection of influential spreaders in online social networks. 145-150 - Husheng Li:
Interdependency analysis of communications and control in networked cyber physical systems: An entropy framework. 151-156 - Ananth V. Kini, Loïc Canonne-Velasquez, Mohsen Hosseinian, Marian Rudolf, Janet Stern-Berkowitz:
Wi-Fi-LAA coexistence: Design and evaluation of Listen Before Talk for LAA. 157-162 - Yanning Shen, Brian Baingana, Georgios B. Giannakis:
Nonlinear structural equation models for network topology inference. 163-168 - Patrick Rebeschini, Sekhar Tatikonda:
Decay of correlation in network flow problems. 169-174 - Chong Huang, Lalitha Sankar:
Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources. 175-180 - Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Advanced persistent threats: Behind the scenes. 181-186 - Abhishek Gupta:
Privacy-aware stochastic control with a "snoopy" adversary: A game-theoretic approach. 187-191 - Shinichiro Tomita, Yohei Watanabe, Junji Shikata:
Sequential aggregate authentication codes with information theoretic security. 192-197 - Charles Huber, Patrick D. McDaniel, Scott E. Brown, Lisa M. Marvel:
Cyber Fighter Associate: A Decision Support System for cyber agility. 198-203 - Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Defining perfect location privacy using anonymization. 204-209 - Ali Rakhshan, Hossein Pishro-Nik:
Packet success probability derivation in a vehicular ad hoc network for a highway scenario. 210-215 - Hongxiang Chu, Tetsuya Shimamura:
A new PTS method for OFDM signals without side information based on constellation reshaping. 216-221 - Cong Shen, Shun Lou, Chen Gong, Zhengyuan Xu:
User association with lighting constraints in visible light communication systems. 222-227 - Ratnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella:
Design and implementation of an underlay control channel for NC-OFDM-based networks. 228-233 - Ibrahim Issa, Sudeep Kamath, Aaron B. Wagner:
An operational measure of information leakage. 234-239 - Selma Belhadj Amor, Samir Medina Perlaza:
Decentralized simultaneous energy and information transmission in multiple access channels. 240-245 - Tewodros A. Zewde, Mustafa Cenk Gursoy:
Energy-efficient resource allocation for SWIPT in multiple access channels. 246-251 - Mohammad Hajimirsadeghi, Gokul Sridharan, Walid Saad, Narayan B. Mandayam:
Inter-network dynamic spectrum allocation via a Colonel Blotto game. 252-257 - Matthew Andrews, Lisa Zhang:
Tracking mobile users via standard routing engines. 258-261 - Xin Liu, Lei Ying:
Spatial-temporal routing for supporting end-to-end hard deadlines in multi-hop networks. 262-267 - Marco Giordani, Marco Mezzavilla, C. Nicolas Barati, Sundeep Rangan, Michele Zorzi:
Comparative analysis of initial access techniques in 5G mmWave cellular networks. 268-273 - Bryan Paul, Daniel W. Bliss:
Estimation information bounds using the I-MMSE formula and Gaussian mixture models. 274-279 - Hadi Kasasbeh, Lei Cao, Ramanarayanan Viswanathan:
Hard decision based distributed detection in multi-sensor system over noise correlated sensing channels. 280-285 - Osamah Ali Abdullah, Ikhlas Abdel-Qader, Bradley J. Bazuin:
A probability neural network-Jensen-Shannon divergence for a fingerprint based localization. 286-291 - Richard A. Metzger, John F. Doherty, David M. Jenkins:
Using Approximate Entropy as a speech quality measure for a speaker recognition system. 292-297 - Pushpendre Rastogi, Jingyi Zhu, James C. Spall:
Efficient implementation of enhanced adaptive simultaneous perturbation algorithms. 298-303 - Oghogho Ikponmwosa, Frederick O. Edeko, Joy Emagbeter:
Measurement and modelling of TCP downstream throughput dependence on SNR in an IEEE802.11b WLAN system. 304-308 - Mehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi:
Energy-aware optimization and mechanism design for cellular device-to-device local area networks. 309-314 - Sanam Sadr, Raviraj S. Adve:
Load statistics and required spectrum in multi-tier heterogeneous networks. 315-319 - Avik Sengupta, Ravi Tandon, Osvaldo Simeone:
Cache aided wireless networks: Tradeoffs between storage and latency. 320-325 - Xinyi Hu, Yuquan Shan, George Kesidis, Saswati Sarkar, Ravi Dhar, Serge Fdida:
Multiperiod subscription pricing for cellular wireless entrants. 326-330 - Yuewen Wang, Ali N. Akansu:
Symbol Alphabet Modifier for PAPR reduction in OFDM communications. 331-336 - John Hogan, Akbar M. Sayeed:
Beam selection for performance-complexity optimization in high-dimensional MIMO systems. 337-342 - Yang Syu, Yong-Yi Fanjiang, Jong-Yih Kuo, Jui-Lung Su:
Quality of Service timeseries forecasting for Web Services: A machine learning, Genetic Programming-based approach. 343-348 - Karla Hernandez:
Cyclic stochastic optimization via arbitrary selection procedures for updating parameters. 349-354 - Weiqiang Dong, Moshe Kam:
Integration of multiple adaptive algorithms for parallel decision fusion. 355-359 - Kyle Doty, Sandip Roy, Thomas R. Fischer:
State estimation for flag Hidden Markov Models with imperfect sensors. 360-365 - Lin Gao, Ming Tang, Haitian Pang, Jianwei Huang, Lifeng Sun:
Performance bound analysis for crowdsourced mobile video streaming. 366-371 - Shijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta:
Background traffic optimization for meeting deadlines in data center storage. 372-377 - Peijian Wang, Ying Zhang, Lei Deng, Minghua Chen, Xue Liu:
Second Chance works out better: Saving more for data center operator in open energy market. 378-383 - Debankur Mukherjee, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting:
Efficient load balancing in large-scale systems. 384-389 - Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin. 390-395 - Abbas Kazemipour, Behtash Babadi, Min Wu:
Sufficient conditions for stable recovery of sparse autoregressive models. 396-400 - Ji Wang, Sayandeep Acharya, Moshe Kam:
Adaptive decision fusion using genetic algorithm. 401-406 - Xiaohua Li, Jian Zheng:
Joint machine learning and human learning design with sequential active learning and outlier detection for linear regression problems. 407-411 - Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Strong coordination over a line when actions are Markovian. 412-417 - James Falt, Steven D. Blostein:
Two-sided change detection under unknown initial state. 418-423 - Ali Najdi Al-Shuwaili, Alireza Bagheri, Osvaldo Simeone:
Joint uplink/downlink and offloading optimization for mobile cloud computing with limited backhaul. 424-429 - Zhuo Chen, Roy D. Yates, Dipankar Raychaudhuri:
Dynamic node-disjoint multipath routing for millimeter wave networks using directional antennas. 430-435 - Yitong Li, Lin Dai:
Effect of fading on maximum sum rate of Aloha. 436-441 - Seyyed Mohammadreza Azimi, Osvaldo Simeone, Onur Sahin, Petar Popovski:
Ultra-reliable cloud mobile computing with service composition and superposition coding. 442-447 - Jonathan Stokes, Steven Weber:
A Markov chain model for the search time for max degree nodes in a graph using a biased random walk. 448-453 - Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Portfolio theory based sensor selection in Wireless Sensor Networks with unreliable observations. 454-459 - Benjamin Peiffer, Raghu Mudumbai, Anton Kruger, Amy Kumar, Soura Dasgupta:
Experimental demonstration of a distributed antenna array pre-synchronized for retrodirective transmission. 460-465 - Raghed El-Bardan, Walid Saad, Swastik Brahma, Pramod K. Varshney:
Matching theory for cognitive spectrum allocation in wireless networks. 466-471 - Silvija Kokalj-Filipovic, Joel Goodman, Crystal Bertoncini Acosta, George Stantchev:
I/O HSMM: Learning behavioral dynamics of a cognitive wireless network node from spectrum sensing. 472-477 - Giel J. Op 't Veld, Michael C. Gastpar:
Caching Gaussians: Minimizing total correlation on the Gray-Wyner network. 478-483 - Zhengwei Wu, Saleem A. Kassam:
Computationally efficient Toeplitz-constrained blind equalization based on independence. 484-489 - Roopashree Rajanna, Lei Cao, Ramanarayanan Viswanathan:
Divergence and Bayes error based soft decision for decentralized signal detection of correlated sensor data. 490-495 - Onur Yilmaz, Ali N. Akansu:
Performance analysis of eigenportfolios for AR(1) process. 496-499 - Reza Izanloo, Seyed Abolfazl Fakoorian, Hadi Sadoghi Yazdi, Dan Simon:
Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noise. 500-505 - Wei Jiang, Alexander M. Haimovich:
Cramer-Rao bound and approximate maximum likelihood estimation for non-coherent direction of arrival problem. 506-510 - Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Migration to a non-neutral internet: Economics modeling and analysis of impact. 511-516 - Ken J. Kerpez, Haleema Mehmood:
Multi-operator service optimization for Fixed Access Network Sharing (FANS). 517-522 - Mengyuan Zhang, Lei Yang, Xiaowen Gong, Junshan Zhang:
Impact of network effect and congestion effect on price competition among wireless service providers. 523-528 - Cheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian:
The impact of investment on small-cell resource allocation. 529-534 - William B. Levy, Harang Ju, Robert A. Baxter, Costa M. Colbert:
Controlling information flow and energy use via adaptive synaptogenesis. 535-538 - Hanlin Tang, Jedediah Singer, Matias Ison, Gnel Pivazyan, Melissa Romaine, Elizabeth Meller, Victoria Perron, Marlise Arlellano, Gabriel Kreiman, Adriana Boulin, Rosa Frias, James Carroll, Sarah Dowcett:
A machine learning approach to predict episodic memory formation. 539-544 - Thiago Mosqueiro, Martin Strube-Bloss, Rafael Tuma, Reynaldo D. Pinto, Brian H. Smith, Ramón Huerta:
Non-parametric change point detection for spike trains. 545-550 - Alireza Sheikhattar, Behtash Babadi:
Dynamic estimation of causal influences in sparsely-interacting neuronal ensembles. 551-556 - Pierre Sacré, Matthew S. D. Kerr, Sandya Subramanian, Kevin Kahn, Jorge Gonzalez-Martinez, Matthew A. Johnson, John T. Gale, Sridevi V. Sarma:
Winning versus losing during gambling and its neural correlates. 557-561 - Rahul Agarwal, Zhe Chen, Fabian Kloosterman, Matthew A. Wilson, Sridevi V. Sarma:
Neuronal encoding models of complex receptive fields: A comparison of nonparametric and parametric approaches. 562-567 - Ahmed Al Hilli, Laleh Najafizadeh, Athina P. Petropulu:
Generalized range space property for group sparsity of linear underdetermined systems. 568-571 - Dian Mo, Marco F. Duarte:
Compressive line spectrum estimation with clustering and interpolation. 572-577 - Ni An, Steven Weber:
On the performance overhead tradeoff of distributed principal component analysis via data partitioning. 578-583 - Irineo Cabreros, Emmanuel Abbe, Aristotelis Tsirigos:
Detecting community structures in Hi-C genomic data. 584-589 - Panagiotis A. Traganitis, Georgios B. Giannakis:
Efficient subspace clustering of large-scale data streams with misses. 590-595 - Keegan Kang, Giles Hooker:
Improving the recovery of principal components with semi-deterministic random projections. 596-601 - Shuo Shao, Tie Liu, Chao Tian:
Multilevel diversity coding with regeneration: Separate coding achieves the MBR point. 602-607 - Taehyeun Park, Walid Saad:
Learning with finite memory for machine type communication. 608-613 - Morteza Mehrnoush, Benjamin Belzer, Krishnamoorthy Sivakumar, Roger Wood:
EXIT chart based IRA code design for TDMR. 614-619 - Saeid Sahraei, Michael Gastpar:
K users caching two files: An improved achievable rate. 620-624 - Chris Duerden, Lik-Kwan Shark, Geoff Hall, Joe Howe:
Prediction of granular time-series energy consumption for manufacturing jobs from analysis and learning of historical data. 625-630 - Sindri Magnússon, Chinwendu Enyioha, Kathryn Heal, Na Li, Carlo Fischione, Vahid Tarokh:
Distributed resource allocation using one-way communication with applications to power networks. 631-636 - Justin Lloyd, Gerard G. L. Meyer:
A generalized Nash equilibrium model of a resource stockpile with independent market response dynamics. 637-642 - Youngmi Jin, Michiaki Hayashi:
Efficiency comparison between proportional fairness and dominant resource fairness with two different type resources. 643-648 - Eun Jee Lee, Sudeep Kamath, Emmanuel Abbe, Sanjeev R. Kulkarni:
Spectral bounds for independent cascade model with sensitive edges. 649-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.