


default search action
51st CISS 2017: Baltimore, MD, USA
- 51st Annual Conference on Information Sciences and Systems, CISS 2017, Baltimore, MD, USA, March 22-24, 2017. IEEE 2017, ISBN 978-1-5090-4780-2
- Hassan Althobaiti
, Chao Lu:
A survey on Arabic Optical Character Recognition and an isolated handwritten Arabic Character Recognition algorithm using encoded freeman chain code. 1-6 - Meng Wang:
Data quality management of synchrophasor data in power systems by exploiting low-dimensional models. 1-2 - Neal Master, Zhengyuan Zhou, Nicholas Bambos:
An infinite dimensional model for a many server priority queue. 1-6 - Shubham Dokania, Sunyam Bagga, Rohit Sharma:
Opportunistic Self Organizing Migrating Algorithm for real-time Dynamic Traveling Salesman Problem. 1-6 - Le Thanh Tan
, Lei Ying
, Daniel W. Bliss:
Power control and relay selection in Full-Duplex Cognitive Relay Networks: Coherent versus non-coherent scenarios. 1-6 - Brian C. Grubel, Daniel S. Vresilovic, Bryan T. Bosworth, Michael R. Kossey, Amy C. Foster, Mark A. Foster, A. Brinton Cooper:
Light transport through ultrafast chaotic micro-cavities for photonic physical unclonable functions. 1-6 - Lance Berlin, W. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard
:
On the performance of antipode algorithms for the multivariable output feedback Hopf algebra. 1-6 - Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. 1-6 - Qasim M. Chaudhari, Brian S. Krongold:
Iterative carrier phase synchronization without reconstructing the soft symbols. 1-6 - Tobias Gruber
, Sebastian Cammerer, Jakob Hoydis, Stephan ten Brink:
On deep learning-based channel decoding. 1-6 - Gabriel Ford
, Sean Mason, Kevin Rigney, Moshe Kam:
Enhanced spectrum awareness using Bayesian nonparametric pattern recognition techniques. 1-6 - Zhong Zheng, Zygmunt J. Haas:
On the improvement of spectral efficiency in mobile networks: Rate and mobility analysis. 1-6 - Diego Goldsztajn, Andrés Ferragut, Fernando Paganini:
A feedback control approach to dynamic speed scaling in computing systems. 1-6 - Peter O. Taiwo
, Arlene A. Cole-Rhodes
:
MIMO equalization of 16-QAM signal blocks using an FFT-based alphabet-matched CMA. 1-6 - Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos
:
Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward. 1-6 - Luis A. Duffaut Espinosa, Mads Almassalkhi, Paul Hines, Shoeib Heydari
, Jeff Frolik:
Towards a macromodel for Packetized Energy Management of resistive water heaters. 1-6 - Enrique Briglia, Sebastian Alaggia, Fernando Paganini:
Distribution network management based on optimal power flow: Integration of discrete decision variables. 1-6 - Rashed Mazumder, Atsuko Miyaji
, Chunhua Su:
A simple construction of encryption for a tiny domain message. 1-6 - Tamal Mondal
, Prithviraj Pramanik
, Indrajit Bhattacharya, Arka Saha, Naiwrita Boral:
Towards development of FOPL based tweet summarization technique in a post disaster scenario: From survey to solution. 1-6 - W. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard
:
Sensitivity of the left inverse of a SISO analytic nonlinear system. 1-6 - Sergey Bereg, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
Parallel Partition and Extension. 1-6 - Long Feng
, Ruijun Ma, Lee H. Dicker:
Nonparametric maximum likelihood approximate message passing. 1-6 - Tong Wu, Raif M. Rustamov, Colin Goodall:
Distributed learning of human mobility patterns from cellular network data. 1-6 - Sarker T. Ahmed Rumee, Donggang Liu, Yu Lei:
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution. 1-6 - Dylan Poulsen
, Shaun Ramsey, Nathaniel Schwartz:
The emergence of chaos on non-uniformly timed systems. 1-4 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Equilibrium strategies for an OFDM network that might be under a jamming attack. 1-6 - Aranya Chakrabortty
:
Distributed cyber-physical algorithms for wide-area control of power systems. 1 - Carlos A. Rincon C., Albert M. K. Cheng
:
Using information theory principles to schedule real-time tasks. 1-6 - Richard J. La:
Effects of degree variability and dependence on cascading failures: A case study of two interdependent systems. 1-6 - Majid Gerami, Ming Xiao
, Somayeh Salimi, Mikael Skoglund, Panos Papadimitratos
:
Optimal secure partial-repair in distributed storage systems. 1-5 - Hailu Belay Kassa, Yacob Astatke, Farzad Moazzami, Tezera Yitbarek Chernet, Estifanos Yohannes, Dereje H. Woldegebreal:
Energy efficient smart antenna system using Recursive Least Square algorithm and Kaiser side lobe cancellation technique. 1-5 - Hailu Wang, Junsuo Zhao, Fengge Wu:
Design of High-Resolution Space Imaging System on Sandroid CubeSat using camera array. 1-6 - Paul Cuff:
Wiretap channels with random states. 1 - Ashish Cherukuri
, Jorge Cortés:
Decentralized Nash equilibrium seeking by strategic generators for DC optimal power flow. 1-6 - Baljinder Singh, Tejpreet Singh:
Modified EGSR for network security. 1-7 - Baljinder Singh, Tejpreet Singh, Hargun Singh Sachdeva:
Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNs. 1-7 - Sherin M. Mathews, Chandra Kambhamettu, Kenneth E. Barner:
Centralized class specific dictionary learning for wearable sensors based physical activity recognition. 1-6 - Olav Tirkkonen
, Christoph Studer:
Subset-codebook precoding for 1-bit massive multiuser MIMO. 1-5 - Maroua Taghouti, Daniel E. Lucani
, Frank H. P. Fitzek
:
Random shift and XOR of unequal-sized packets (RaSOR) to shave off transmission overhead. 1-6 - Sayak Bhattacharya, Pablo A. Iglesias:
The triggering, curving and stopping of excitable waves during cell migration. 1-4 - Darren Emge, Zois Boukouvalas, Yuri Levin-Schwartz, Suchita Bhinge, Qunfang Long, Tülay Adali:
Power spectra constrained IVA for enhanced detection of SSVEP content. 1-5 - Hadi Kasasbeh, Lei Cao
, Ramanarayanan Viswanathan:
Soft-decision based distributed detection over correlated sensing channels. 1-6 - Kenric P. Nelson:
Inference assessment on a probability scale. 1-5 - Zhe Chen:
Unfolding representations of trajectory coding in neuronal population spike activity. 1-6 - Qunfang Long, Suchita Bhinge, Yuri Levin-Schwartz, Vince D. Calhoun
, Tülay Adali:
A graph theoretical approach for performance comparison of ICA for fMRI analysis. 1-6 - Kevin T. Wagner, Milos I. Doroslovacki:
Distributed linear prediction in the presence of noise and multipath. 1-5 - Robin M. Givens
, Rex K. Kincaid, Weizhen Mao, Gexin Yu:
Mixed-weight open locating-dominating sets. 1-6 - Eirini-Eleni Tsiropoulou
, Surya Teja Paruchuri, John S. Baras:
Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications. 1-6 - Jian Zheng, Cencen Xu, Ziang Zhang, Xiaohua Li:
Electric load forecasting in smart grids using Long-Short-Term-Memory based Recurrent Neural Network. 1-6 - Anshuman Chhabra
, Vidushi Vashishth, Deepak Kumar Sharma:
SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks. 1-6 - Anshuman Chhabra
, Vidushi Vashishth, Deepak Kumar Sharma:
A game theory based secure model against Black hole attacks in Opportunistic Networks. 1-6 - Sairaj V. Dhople:
Control of low-inertia AC microgrids. 1-2 - Alborz Alavian, Michael C. Rotkowitz:
Improving ADMM-based optimization of Mixed Integer objectives. 1-6 - Irfan Lateef, Ali N. Akansu:
Link-level interpretation of eigenanalysis for network traffic flows. 1-6 - Rui Zhang, Quanyan Zhu:
A game-theoretic analysis of label flipping attacks on distributed support vector machines. 1-6 - Irina M. Winter-Arboleda, W. Steven Gray, Luis A. Duffaut Espinosa:
On global convergence of fractional Fliess operators with applications to bilinear systems. 1-6 - Jonathan Stokes, Steven Weber:
On the number of star samples to find a vertex or edge with given degree in a graph. 1-6 - Mohammad Hassan Lotfi, Saswati Sarkar:
The economics of competition and cooperation between MNOs and MVNOs. 1-6 - Ahmed Ben Said, Rachid Hadjidj, Sebti Foufou, Mongi A. Abidi:
Edge guided total variation for image denoising. 1-6 - Suchita Bhinge, Yuri Levin-Schwartz, Tülay Adali:
Estimation of common subspace order across multiple datasets: Application to multi-subject fMRI data. 1-5 - Mostafa El Gamal, Lifeng Lai:
On randomized distributed coordinate descent with quantized updates. 1-5 - Xi Zhang, Qixuan Zhu:
Spectrum efficiency maximization using primal-dual adaptive algorithm for distributed mobile devices caching over edge computing networks. 1-6 - Lingyao Meng, James C. Spall:
Efficient computation of the Fisher information matrix in the EM algorithm. 1-6 - Benedito J. B. Fonseca Jr.
:
How conservative is a sensor detection system with the scan statistic designed using the union bound? 1-6 - Ahmed A. Alabdel Abass, Narayan B. Mandayam, Zoran Gajic:
An Evolutionary Game model for threat revocation in ephemeral networks. 1-5 - Amonrat Prasitsupparote, Norio Konno, Junji Shikata:
Numerical analysis of Elias's and Peres's deterministic extractors. 1-6 - Jorge A. Pires, Benjamin J. Belzer, Thomas R. Fischer:
A BCJR-based turbo equalizer for multicarrier time-varying fading channels. 1-6 - Nematollah Iri, Oliver Kosut:
Universal coding with point type classes. 1-6 - Guillaume Freche, Matthieu R. Bloch, Michel Barret:
Polar codes for covert communications over asynchronous Discrete Memoryless Channels. 1 - Fei Wang, Xi Zhang:
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users. 1-6 - Fei Wang, Xi Zhang:
Secure resource allocation and dynamic spectrum access for polarization-based green cooperative cognitive radio networks. 1-6 - Xi Zhang, Jingqing Wang:
Statistical QoS-driven power allocation for WiFi offloading over heterogeneous wireless networks. 1-6 - Xi Zhang, Fan Yang:
Spectrum utility driven WiFi offloading over NOMA-based cellular network edges. 1-6 - Kyle Whetzel, Matthew C. Valenti:
Complexity-aware scheduling for an LDPC encoded C-RAN uplink. 1-6 - Brian Hu
, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur:
Head movements during visual exploration of natural images in virtual reality. 1-6 - Avhishek Chatterjee
, Lav R. Varshney:
Energy-reliability limits in nanoscale neural networks. 1-6 - Davood Mardani, George K. Atia:
On sparse recovery with Structured Noise under sensing constraints. 1-6 - Sairam Goguri, Raghu Mudumbai, Anton Kruger:
Optimizing wireless power transfer with multiple transmitters. 1-5 - Wentao Huang, Xin Huang, Kechen Zhang:
Information-theoretic interpretation of tuning curves for multiple motion directions. 1-4 - Weiqiang Dong
, Moshe Kam:
Detection performance vs. complexity in parallel decentralized Bayesian decision fusion. 1-6 - Eric Graves, Brian Kirby, Paul L. Yu:
Messages per secret bit when authentication and a min-entropy secrecy criterion are required. 1-6 - Pawan Setlur, Tariq R. Qureshi, Muralidhar Rangaswamy:
Random projections for reduced dimension radar space-time adaptive processing. 1-6 - Kaining Yang, Kunbo Wang, Chen Feng:
Finite-sample analysis of iterate averaging method for stochastic approximation with quadratic loss function. 1-6 - Jiyun Yao, Parv Venkitasubramaniam, Shalinee Kishore, Lawrence V. Snyder, Rick S. Blum
:
Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks. 1-6 - Alireza Zaeemzadeh
, Mohsen Joneidi, Nazanin Rahnavard:
Adaptive non-uniform compressive sampling for time-varying signals. 1-6 - Mingjian Zhang, Xiaohua Li, Jun Peng:
Blind source separation using joint canonical decomposition of two higher order tensors. 1-6 - Roya Norouzi Kandalan
, Ramanpreet Singh, Kamesh Namuduri
, Murali R. Varanasi, Bill P. Buckles:
Impact of mobility on convergence rate in a wireless sensor network. 1-4 - Ambaw B. Ambaw, Mohammad Bari, Milos Doroslovacki:
A case for stacked autoencoder based order recognition of continuous-phase FSK. 1-6 - Sunil Kumar Gaire
, Saleh Faruque:
Performance analysis of orthogonal coded M-ary QAM modulation technique. 1-6 - Yasaman Ettefagh, Mohammad Hossein Moghaddam, Sajjad Eghbalian:
An adaptive neural network approach for automatic modulation recognition. 1-5 - Takahiro Yoshizawa, Yohei Watanabe, Junji Shikata:
Unconditionally secure searchable encryption. 1-6 - Hamza Anwar, Quanyan Zhu:
Minimax robust optimal control of multiscale linear-quadratic systems. 1-6 - Ashwija Reddy Korenda, Mohammad Zaeri-Amirani, Fatemeh Afghah:
A hierarchical Stackelberg-coalition formation game theoretic framework for cooperative spectrum leasing. 1-6 - Weixuan Lin, Eilyan Bitar:
The price of anarchy in networked supply function games. 1 - Jin Dong
, P. Teja Kuruganti, Seddik M. Djouadi:
Very short-term photovoltaic power forecasting using uncertain basis function. 1-6 - Yunjian Xu, Desmond W. H. Cai, Subhonmesh Bose, Adam Wierman:
On the efficiency of networked Stackelberg competition. 1-6 - Ni An, Steven Weber:
Impact of sample size on false alarm and missed detection rates in PCA-based anomaly detection. 1-6 - Yuepei Li, Junsuo Zhao, Fengge Wu:
Artifact-free high dynamic range imaging based on Sandroid Cubesat with camera array. 1-6 - Amirsina Torfi
, Sobhan Soleymani, Seyed Mehdi Iranmanesh, Hadi Kazemi
, Rouzbeh A. Shirvani, Vahid Tabataba Vakili:
Polar coding for achieving the capacity of marginal channels in nonbinary-input setting. 1-6 - Yujie Tang, Krishnamurthy Dvijotham, Steven H. Low:
Real-time OPF based on quasi-Newton methods. 1 - Tewodros A. Zewde, Mustafa Cenk Gursoy:
Energy efficiency analysis for wireless-powered cellular networks. 1-6 - Joseph D. Hart, Rajarshi Roy, Thomas E. Murphy:
Optical random number generation - harvesting entropy from noise and chaos. 1 - Junan Zhu, Ryan Pilgrim, Dror Baron
:
An overview of multi-processor approximate message passing. 1-6 - Haroon Raja, Waheed U. Bajwa:
Recent developments in distributed dictionary learning. 1 - Vishal Monga:
Sparsity constrained estimation via spike and slab priors. 1 - Galen Reeves, Harry Pfister:
Decoupling in random linear estimation. 1 - Chetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings
, André van Schaik
:
Inference in spiking Bayesian neurons using stochastic computation. 1-4 - Chetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings
:
Real-time image segmentation using a spiking neuromorphic processor. 1-6 - Piya Pal:
Analyzing the role of correlation-awareness in sparse estimation and detection. 1 - Arian Maleki:
Moving beyond sparsity by transferring expert knowledge. 1 - Jiayang Chen, Yong Meng Sua, Zitong Zhao, Yu-Ping Huang:
Observation of quantum Zeno blockade on chip. 1 - Munther A. Dahleh:
Emulating batteries with deferrable energy demand. 1 - Shrikanth S. Narayanan:
Understanding individual-level speech variability: From novel speech production data to robust speaker recognition. 1 - Nathan Henry, Jacob B. Khurgin
:
Time domain model for Quantum Cascade lasers generating frequency combs via stochastic frequency modulation. 1-2 - Daniel S. Weller:
Learning dictionaries for accelerated parallel MRI reconstruction. 1 - Kate D. Fischl, Gaspar Tognetti, Daniel R. Mendat, Garrick Orchard
, John M. Rattray, Christos Sapsanis, Laura F. Campbell, Laxaviera Elphage, Tobias E. Niebur, Alejandro Pasciaroni, Valerie E. Rennoll, Heather Romney, Shamaria Walker, Philippe O. Pouliquen, Andreas G. Andreou
:
Neuromorphic self-driving robot with retinomorphic vision and spike-based processing/closed-loop control. 1-6 - Daniel R. Mendat, James E. West, Sudarshan Ramenahalli, Ernst Niebur, Andreas G. Andreou
:
Audio-Visual beamforming with the Eigenmike microphone array an omni-camera and cognitive auditory features. 1-4 - Jeff Craley, Thomas S. Murray, Daniel R. Mendat, Andreas G. Andreou
:
Action recognition using micro-Doppler signatures and a recurrent neural network. 1-5 - Erik G. Larsson:
Massive MIMO for 5G: Overview and the road ahead. 1 - Yevgeniy Dodis:
Basing cryptography on biometrics and other noisy data. 1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.