default search action
51st CISS 2017: Baltimore, MD, USA
- 51st Annual Conference on Information Sciences and Systems, CISS 2017, Baltimore, MD, USA, March 22-24, 2017. IEEE 2017, ISBN 978-1-5090-4780-2
- Hassan Althobaiti, Chao Lu:
A survey on Arabic Optical Character Recognition and an isolated handwritten Arabic Character Recognition algorithm using encoded freeman chain code. 1-6 - Meng Wang:
Data quality management of synchrophasor data in power systems by exploiting low-dimensional models. 1-2 - Neal Master, Zhengyuan Zhou, Nicholas Bambos:
An infinite dimensional model for a many server priority queue. 1-6 - Shubham Dokania, Sunyam Bagga, Rohit Sharma:
Opportunistic Self Organizing Migrating Algorithm for real-time Dynamic Traveling Salesman Problem. 1-6 - Le Thanh Tan, Lei Ying, Daniel W. Bliss:
Power control and relay selection in Full-Duplex Cognitive Relay Networks: Coherent versus non-coherent scenarios. 1-6 - Brian C. Grubel, Daniel S. Vresilovic, Bryan T. Bosworth, Michael R. Kossey, Amy C. Foster, Mark A. Foster, A. Brinton Cooper:
Light transport through ultrafast chaotic micro-cavities for photonic physical unclonable functions. 1-6 - Lance Berlin, W. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard:
On the performance of antipode algorithms for the multivariable output feedback Hopf algebra. 1-6 - Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. 1-6 - Qasim M. Chaudhari, Brian S. Krongold:
Iterative carrier phase synchronization without reconstructing the soft symbols. 1-6 - Tobias Gruber, Sebastian Cammerer, Jakob Hoydis, Stephan ten Brink:
On deep learning-based channel decoding. 1-6 - Gabriel Ford, Sean Mason, Kevin Rigney, Moshe Kam:
Enhanced spectrum awareness using Bayesian nonparametric pattern recognition techniques. 1-6 - Zhong Zheng, Zygmunt J. Haas:
On the improvement of spectral efficiency in mobile networks: Rate and mobility analysis. 1-6 - Diego Goldsztajn, Andrés Ferragut, Fernando Paganini:
A feedback control approach to dynamic speed scaling in computing systems. 1-6 - Peter O. Taiwo, Arlene A. Cole-Rhodes:
MIMO equalization of 16-QAM signal blocks using an FFT-based alphabet-matched CMA. 1-6 - Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward. 1-6 - Luis A. Duffaut Espinosa, Mads Almassalkhi, Paul Hines, Shoeib Heydari, Jeff Frolik:
Towards a macromodel for Packetized Energy Management of resistive water heaters. 1-6 - Enrique Briglia, Sebastian Alaggia, Fernando Paganini:
Distribution network management based on optimal power flow: Integration of discrete decision variables. 1-6 - Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A simple construction of encryption for a tiny domain message. 1-6 - Tamal Mondal, Prithviraj Pramanik, Indrajit Bhattacharya, Arka Saha, Naiwrita Boral:
Towards development of FOPL based tweet summarization technique in a post disaster scenario: From survey to solution. 1-6 - W. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard:
Sensitivity of the left inverse of a SISO analytic nonlinear system. 1-6 - Sergey Bereg, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
Parallel Partition and Extension. 1-6 - Long Feng, Ruijun Ma, Lee H. Dicker:
Nonparametric maximum likelihood approximate message passing. 1-6 - Tong Wu, Raif M. Rustamov, Colin Goodall:
Distributed learning of human mobility patterns from cellular network data. 1-6 - Sarker T. Ahmed Rumee, Donggang Liu, Yu Lei:
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution. 1-6 - Dylan Poulsen, Shaun Ramsey, Nathaniel Schwartz:
The emergence of chaos on non-uniformly timed systems. 1-4 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Equilibrium strategies for an OFDM network that might be under a jamming attack. 1-6 - Aranya Chakrabortty:
Distributed cyber-physical algorithms for wide-area control of power systems. 1 - Carlos A. Rincon C., Albert M. K. Cheng:
Using information theory principles to schedule real-time tasks. 1-6 - Richard J. La:
Effects of degree variability and dependence on cascading failures: A case study of two interdependent systems. 1-6 - Majid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund, Panos Papadimitratos:
Optimal secure partial-repair in distributed storage systems. 1-5 - Hailu Belay Kassa, Yacob Astatke, Farzad Moazzami, Tezera Yitbarek Chernet, Estifanos Yohannes, Dereje H. Woldegebreal:
Energy efficient smart antenna system using Recursive Least Square algorithm and Kaiser side lobe cancellation technique. 1-5 - Hailu Wang, Junsuo Zhao, Fengge Wu:
Design of High-Resolution Space Imaging System on Sandroid CubeSat using camera array. 1-6 - Paul Cuff:
Wiretap channels with random states. 1 - Ashish Cherukuri, Jorge Cortés:
Decentralized Nash equilibrium seeking by strategic generators for DC optimal power flow. 1-6 - Baljinder Singh, Tejpreet Singh:
Modified EGSR for network security. 1-7 - Baljinder Singh, Tejpreet Singh, Hargun Singh Sachdeva:
Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNs. 1-7 - Sherin M. Mathews, Chandra Kambhamettu, Kenneth E. Barner:
Centralized class specific dictionary learning for wearable sensors based physical activity recognition. 1-6 - Olav Tirkkonen, Christoph Studer:
Subset-codebook precoding for 1-bit massive multiuser MIMO. 1-5 - Maroua Taghouti, Daniel E. Lucani, Frank H. P. Fitzek:
Random shift and XOR of unequal-sized packets (RaSOR) to shave off transmission overhead. 1-6 - Sayak Bhattacharya, Pablo A. Iglesias:
The triggering, curving and stopping of excitable waves during cell migration. 1-4 - Darren Emge, Zois Boukouvalas, Yuri Levin-Schwartz, Suchita Bhinge, Qunfang Long, Tülay Adali:
Power spectra constrained IVA for enhanced detection of SSVEP content. 1-5 - Hadi Kasasbeh, Lei Cao, Ramanarayanan Viswanathan:
Soft-decision based distributed detection over correlated sensing channels. 1-6 - Kenric P. Nelson:
Inference assessment on a probability scale. 1-5 - Zhe Chen:
Unfolding representations of trajectory coding in neuronal population spike activity. 1-6 - Qunfang Long, Suchita Bhinge, Yuri Levin-Schwartz, Vince D. Calhoun, Tülay Adali:
A graph theoretical approach for performance comparison of ICA for fMRI analysis. 1-6 - Kevin T. Wagner, Milos I. Doroslovacki:
Distributed linear prediction in the presence of noise and multipath. 1-5 - Robin M. Givens, Rex K. Kincaid, Weizhen Mao, Gexin Yu:
Mixed-weight open locating-dominating sets. 1-6 - Eirini-Eleni Tsiropoulou, Surya Teja Paruchuri, John S. Baras:
Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications. 1-6 - Jian Zheng, Cencen Xu, Ziang Zhang, Xiaohua Li:
Electric load forecasting in smart grids using Long-Short-Term-Memory based Recurrent Neural Network. 1-6 - Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks. 1-6 - Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
A game theory based secure model against Black hole attacks in Opportunistic Networks. 1-6 - Sairaj V. Dhople:
Control of low-inertia AC microgrids. 1-2 - Alborz Alavian, Michael C. Rotkowitz:
Improving ADMM-based optimization of Mixed Integer objectives. 1-6 - Irfan Lateef, Ali N. Akansu:
Link-level interpretation of eigenanalysis for network traffic flows. 1-6 - Rui Zhang, Quanyan Zhu:
A game-theoretic analysis of label flipping attacks on distributed support vector machines. 1-6 - Irina M. Winter-Arboleda, W. Steven Gray, Luis A. Duffaut Espinosa:
On global convergence of fractional Fliess operators with applications to bilinear systems. 1-6 - Jonathan Stokes, Steven Weber:
On the number of star samples to find a vertex or edge with given degree in a graph. 1-6 - Mohammad Hassan Lotfi, Saswati Sarkar:
The economics of competition and cooperation between MNOs and MVNOs. 1-6 - Ahmed Ben Said, Rachid Hadjidj, Sebti Foufou, Mongi A. Abidi:
Edge guided total variation for image denoising. 1-6 - Suchita Bhinge, Yuri Levin-Schwartz, Tülay Adali:
Estimation of common subspace order across multiple datasets: Application to multi-subject fMRI data. 1-5 - Mostafa El Gamal, Lifeng Lai:
On randomized distributed coordinate descent with quantized updates. 1-5 - Xi Zhang, Qixuan Zhu:
Spectrum efficiency maximization using primal-dual adaptive algorithm for distributed mobile devices caching over edge computing networks. 1-6 - Lingyao Meng, James C. Spall:
Efficient computation of the Fisher information matrix in the EM algorithm. 1-6 - Benedito J. B. Fonseca Jr.:
How conservative is a sensor detection system with the scan statistic designed using the union bound? 1-6 - Ahmed A. Alabdel Abass, Narayan B. Mandayam, Zoran Gajic:
An Evolutionary Game model for threat revocation in ephemeral networks. 1-5 - Amonrat Prasitsupparote, Norio Konno, Junji Shikata:
Numerical analysis of Elias's and Peres's deterministic extractors. 1-6 - Jorge A. Pires, Benjamin J. Belzer, Thomas R. Fischer:
A BCJR-based turbo equalizer for multicarrier time-varying fading channels. 1-6 - Nematollah Iri, Oliver Kosut:
Universal coding with point type classes. 1-6 - Guillaume Freche, Matthieu R. Bloch, Michel Barret:
Polar codes for covert communications over asynchronous Discrete Memoryless Channels. 1 - Fei Wang, Xi Zhang:
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users. 1-6 - Fei Wang, Xi Zhang:
Secure resource allocation and dynamic spectrum access for polarization-based green cooperative cognitive radio networks. 1-6 - Xi Zhang, Jingqing Wang:
Statistical QoS-driven power allocation for WiFi offloading over heterogeneous wireless networks. 1-6 - Xi Zhang, Fan Yang:
Spectrum utility driven WiFi offloading over NOMA-based cellular network edges. 1-6 - Kyle Whetzel, Matthew C. Valenti:
Complexity-aware scheduling for an LDPC encoded C-RAN uplink. 1-6 - Brian Hu, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur:
Head movements during visual exploration of natural images in virtual reality. 1-6 - Avhishek Chatterjee, Lav R. Varshney:
Energy-reliability limits in nanoscale neural networks. 1-6 - Davood Mardani, George K. Atia:
On sparse recovery with Structured Noise under sensing constraints. 1-6 - Sairam Goguri, Raghu Mudumbai, Anton Kruger:
Optimizing wireless power transfer with multiple transmitters. 1-5 - Wentao Huang, Xin Huang, Kechen Zhang:
Information-theoretic interpretation of tuning curves for multiple motion directions. 1-4 - Weiqiang Dong, Moshe Kam:
Detection performance vs. complexity in parallel decentralized Bayesian decision fusion. 1-6 - Eric Graves, Brian Kirby, Paul L. Yu:
Messages per secret bit when authentication and a min-entropy secrecy criterion are required. 1-6 - Pawan Setlur, Tariq R. Qureshi, Muralidhar Rangaswamy:
Random projections for reduced dimension radar space-time adaptive processing. 1-6 - Kaining Yang, Kunbo Wang, Chen Feng:
Finite-sample analysis of iterate averaging method for stochastic approximation with quadratic loss function. 1-6 - Jiyun Yao, Parv Venkitasubramaniam, Shalinee Kishore, Lawrence V. Snyder, Rick S. Blum:
Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks. 1-6 - Alireza Zaeemzadeh, Mohsen Joneidi, Nazanin Rahnavard:
Adaptive non-uniform compressive sampling for time-varying signals. 1-6 - Mingjian Zhang, Xiaohua Li, Jun Peng:
Blind source separation using joint canonical decomposition of two higher order tensors. 1-6 - Roya Norouzi Kandalan, Ramanpreet Singh, Kamesh Namuduri, Murali R. Varanasi, Bill P. Buckles:
Impact of mobility on convergence rate in a wireless sensor network. 1-4 - Ambaw B. Ambaw, Mohammad Bari, Milos Doroslovacki:
A case for stacked autoencoder based order recognition of continuous-phase FSK. 1-6 - Sunil Kumar Gaire, Saleh Faruque:
Performance analysis of orthogonal coded M-ary QAM modulation technique. 1-6 - Yasaman Ettefagh, Mohammad Hossein Moghaddam, Sajjad Eghbalian:
An adaptive neural network approach for automatic modulation recognition. 1-5 - Takahiro Yoshizawa, Yohei Watanabe, Junji Shikata:
Unconditionally secure searchable encryption. 1-6 - Hamza Anwar, Quanyan Zhu:
Minimax robust optimal control of multiscale linear-quadratic systems. 1-6 - Ashwija Reddy Korenda, Mohammad Zaeri-Amirani, Fatemeh Afghah:
A hierarchical Stackelberg-coalition formation game theoretic framework for cooperative spectrum leasing. 1-6 - Weixuan Lin, Eilyan Bitar:
The price of anarchy in networked supply function games. 1 - Jin Dong, P. Teja Kuruganti, Seddik M. Djouadi:
Very short-term photovoltaic power forecasting using uncertain basis function. 1-6 - Yunjian Xu, Desmond W. H. Cai, Subhonmesh Bose, Adam Wierman:
On the efficiency of networked Stackelberg competition. 1-6 - Ni An, Steven Weber:
Impact of sample size on false alarm and missed detection rates in PCA-based anomaly detection. 1-6 - Yuepei Li, Junsuo Zhao, Fengge Wu:
Artifact-free high dynamic range imaging based on Sandroid Cubesat with camera array. 1-6 - Amirsina Torfi, Sobhan Soleymani, Seyed Mehdi Iranmanesh, Hadi Kazemi, Rouzbeh A. Shirvani, Vahid Tabataba Vakili:
Polar coding for achieving the capacity of marginal channels in nonbinary-input setting. 1-6 - Yujie Tang, Krishnamurthy Dvijotham, Steven H. Low:
Real-time OPF based on quasi-Newton methods. 1 - Tewodros A. Zewde, Mustafa Cenk Gursoy:
Energy efficiency analysis for wireless-powered cellular networks. 1-6 - Joseph D. Hart, Rajarshi Roy, Thomas E. Murphy:
Optical random number generation - harvesting entropy from noise and chaos. 1 - Junan Zhu, Ryan Pilgrim, Dror Baron:
An overview of multi-processor approximate message passing. 1-6 - Haroon Raja, Waheed U. Bajwa:
Recent developments in distributed dictionary learning. 1 - Vishal Monga:
Sparsity constrained estimation via spike and slab priors. 1 - Galen Reeves, Harry Pfister:
Decoupling in random linear estimation. 1 - Chetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings, André van Schaik:
Inference in spiking Bayesian neurons using stochastic computation. 1-4 - Chetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings:
Real-time image segmentation using a spiking neuromorphic processor. 1-6 - Piya Pal:
Analyzing the role of correlation-awareness in sparse estimation and detection. 1 - Arian Maleki:
Moving beyond sparsity by transferring expert knowledge. 1 - Jiayang Chen, Yong Meng Sua, Zitong Zhao, Yu-Ping Huang:
Observation of quantum Zeno blockade on chip. 1 - Munther A. Dahleh:
Emulating batteries with deferrable energy demand. 1 - Shrikanth S. Narayanan:
Understanding individual-level speech variability: From novel speech production data to robust speaker recognition. 1 - Nathan Henry, Jacob B. Khurgin:
Time domain model for Quantum Cascade lasers generating frequency combs via stochastic frequency modulation. 1-2 - Daniel S. Weller:
Learning dictionaries for accelerated parallel MRI reconstruction. 1 - Kate D. Fischl, Gaspar Tognetti, Daniel R. Mendat, Garrick Orchard, John M. Rattray, Christos Sapsanis, Laura F. Campbell, Laxaviera Elphage, Tobias E. Niebur, Alejandro Pasciaroni, Valerie E. Rennoll, Heather Romney, Shamaria Walker, Philippe O. Pouliquen, Andreas G. Andreou:
Neuromorphic self-driving robot with retinomorphic vision and spike-based processing/closed-loop control. 1-6 - Daniel R. Mendat, James E. West, Sudarshan Ramenahalli, Ernst Niebur, Andreas G. Andreou:
Audio-Visual beamforming with the Eigenmike microphone array an omni-camera and cognitive auditory features. 1-4 - Jeff Craley, Thomas S. Murray, Daniel R. Mendat, Andreas G. Andreou:
Action recognition using micro-Doppler signatures and a recurrent neural network. 1-5 - Erik G. Larsson:
Massive MIMO for 5G: Overview and the road ahead. 1 - Yevgeniy Dodis:
Basing cryptography on biometrics and other noisy data. 1
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.