


default search action
52nd CISS 2018: Princeton, NJ, USA
- 52nd Annual Conference on Information Sciences and Systems, CISS 2018, Princeton, NJ, USA, March 21-23, 2018. IEEE 2018, ISBN 978-1-5386-0579-0

- Igor Stanojev, Osvaldo Simeone:

On the interplay between edge caching and HARQ in Fog-RAN. 1-6 - Neeraj Varshney, Aditya K. Jagannatham, Pramod K. Varshney:

On diffusive molecular communication with mobile nanomachines. 1-6 - Xuanyu Cao

, K. J. Ray Liu
:
An ADMM approach to dynamic sharing problems. 1-6 - Xuanyu Cao

, K. J. Ray Liu
:
Generic network cost minimization: A decentralized Newton's method. 1-6 - Rui Zhang, Quanyan Zhu:

Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning. 1-6 - Jitendra K. Tugnait

:
An edge exclusion test for graphical modeling of multivariate time series. 1-6 - Zhuoqi Zeng, Steven Liu

, Lei Wang:
UWB/IMU integration approach with NLOS identification and mitigation. 1-6 - Jonathan Stokes, Steven Weber:

Online estimation for finding a near-maximum value in a large list of numerical data. 1-6 - Theo Diamandis, Yonathan Murin, Andrea Goldsmith:

Ranking causal influence of financial markets via directed information graphs. 1-6 - Andrew S. Lan, Mung Chiang, Christoph Studer:

Linearized binary regression. 1-6 - Yiqiu Liu, Xin Liu, Lei Ying, R. Srikant:

Wireless scheduling with deadline and power constraints. 1-6 - Jing Guo

, Ahmad A. I. Ibrahim, Ameya Agaskar, David J. Love, Navid Yazdani:
Implementation of rate-adaptive integer forcing compression in distributed wireless relay networking. 1-6 - Zhen Xiang, David J. Miller:

Locally optimal, delay-tolerant predictive source coding. 1-6 - David S. R. Kondru, Mehmet Celenk

:
Predictive airborne target tracking using all-terrain fusion based mobile surveillance system. 1-6 - Shudipto Sekhar Roy, Akkas Uddin Haque, Jeremiah Neubert:

Automatic diagnosis of melanoma from dermoscopic image using real-time object detection. 1-5 - Jianing Xi

, Ao Li, Minghui Wang:
An efficient nonnegative matrix factorization model for finding cancer associated genes by integrating data from genome, transcriptome and interactome. 1-6 - Shahab Ghasemi-Goojani, Panos Papadimitratos

:
On the capacity of Gaussian "dirty" Z-interference channel with common state. 1-6 - John Franklin, A. Brinton Cooper:

Kronecker compressed sensing for massive MIMO. 1-6 - W. Steven Gray, G. S. Venkatesh:

Relative degree of interconnected SISO nonlinear control systems. 1-6 - Nazanin Takbiri, Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:

Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case. 1-6 - Gabriel Ford

, Rebecca Cargan, Ali Ahmed, Kevin Rigney, Christopher Berry
, Donald J. Bucci, Moshe Kam:
Wireless network traffic disaggregation using Bayesian nonparametric techniques. 1-6 - Mahesh Babu Vaddi, B. Sundar Rajan:

Optimal error correcting index codes for two classes of index coding problems. 1-5 - Ning Wu, Ao Tang:

End-to-end network throughput optimization through last-mile diversity. 1-6 - Angelo Coluccia, Giuseppe Ricci:

A random-signal approach to robust radar detection. 1-6 - Alessio Fascista

, Giovanni Ciccarese, Angelo Coluccia, Giuseppe Ricci:
A change-detection approach to mobile node localization in bounded domains. 1-6 - Tiexing Wang, Donald J. Bucci, Yingbin Liang, Biao Chen, Pramod K. Varshney:

Clustering under composite generative models. 1-6 - Audra McMillan, Anna C. Gilbert:

Local differential privacy for physical sensor data and sparse recovery. 1-6 - Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:

Privacy against matching under anonymization and obfuscation in the Gaussian case. 1-6 - Robin M. Givens

, Rex K. Kincaid, Weizhen Mao, Gexin Yu:
An integer linear program for mixed-weight open locating-dominating sets. 1-6 - Xinjie Lan, Kenneth E. Barner:

From MRFS to CNNS: A novel image restoration method. 1-5 - Mohammad Javad Khojasteh

, Mojtaba Hedayatpour, Jorge Cortés, Massimo Franceschetti:
Event-triggered stabilization of disturbed linear systems over digital channels. 1-6 - Enlong Hu, Hongya Ge:

The probability density function of SINR loss of the dominant mode rejection beamformer. 1-6 - Juntao Chen, Quanyan Zhu:

Security investment under cognitive constraints: A Gestalt Nash equilibrium approach. 1-6 - Brian Hu

, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur:
Head movements are correlated with other measures of visual attention at smaller spatial scales. 1-6 - Xi Zhang, Jingqing Wang:

Joint heterogeneous statistical-QoS/QoE provisionings for edge-computing based WiFi offloading over 5G mobile wireless networks. 1-6 - Mahdieh Zabihimayvan, Derek Doran:

Some (Non-)universal features of Web robot traffic. 1-6 - Alex Dunyak, Quanyan Zhu:

Understanding mean-field effects of large-population user data obfuscation in machine learning. 1-6 - Rebal Jurdi, Saeed R. Khosravirad

, Harish Viswanathan:
Variable-rate ultra-reliable and low-latency communication for industrial automation. 1-6 - Malcolm Egan

, Samir Medina Perlaza
:
Capacity approximation of continuous channels by discrete inputs. 1-6 - Ramina Ghods

, Andrew S. Lan, Tom Goldstein, Christoph Studer:
PhaseLin: Linear phase retrieval. 1-6 - Ali Taleb Zadeh Kasgari, Walid Saad:

Stochastic optimization and control framework for 5G network slicing with effective isolation. 1-6 - Ke Feng, Martin Haenggi:

A tunable base station cooperation scheme for poisson cellular networks. 1-6 - Pei-Duo Yu, Chee-Wei Tan

, Hung-Lin Fu:
Graph algorithms for preventing cascading failures in networks. 1-6 - Weiqiang Dong

, Moshe Kam:
Parallel decentralized detection with dependent randomization. 1-6 - Libin Liu, Arpan Chattopadhyay, Urbashi Mitra:

Exploiting policy structure for solving MDPs with large state space. 1-6 - Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:

A deep reinforcement learning-based framework for content caching. 1-6 - Abdulrahman Baknina, Sennur Ulukus:

Coded status updates in an energy harvesting erasure channel. 1-6 - Yufan Huang, Michelle Dai, Zhihao Zhang, Ruian Ke:

Network analysis of virus-innate immune interaction within a host. 1-6 - Venkata Sriram Siddhardh Nadendla

, Cedric Langbort:
On estimating multi-attribute choice preferences using private signals and matrix factorization. 1-6 - Shaohan Wu

, Brian L. Hughes:
Training-based joint channel and antenna impedance estimation. 1-6 - Youngbin Im, Prasanth Prahladan, Tae Hwan Kim, Yong Geun Hong, Sangtae Ha:

SNN-cache: A practical machine learning-based caching system utilizing the inter-relationships of requests. 1-6 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:

Stability of fair trade-off solution between radar and communication objectives on hostile interference. 1-6 - Georgia Murray, Alon Kipnis

, Andrea J. Goldsmith:
Lossy compression of decimated Gaussian random walks. 1-6 - Massieh Kordi Boroujeny

, Yariv Ephraim, Brian L. Mark:
Phase-type bounds on network performance. 1-6 - Boyu Wang, Jing Yang

:
Optimal electric vehicle charging scheduling with time-varying profits. 1-6 - Soheil Eshghi

, Leandros Tassiulas:
Innovation, cheating, and whistleblowing - A game theoretic perspective. 1-6 - Yue Zhao:

Solar energy sharing in net metered community microgrids: Can the social goals be achieved? 1-6 - Alexander N. Tait, Thomas Ferreira de Lima, Philip Y. Ma, Matthew P. Chang, Mitchell A. Nahmias, Bhavin J. Shastri

, Prateek Mittal, Paul R. Prucnal:
Blind source separation in the physical layer. 1-6 - Ling-Hua Chang, Carol Wang, Po-Ning Chen

, Vincent Y. F. Tan, Yunghsiang S. Han:
Applications of an exact formula for the largest minimum distance of block codes. 1 - C. Richard Johnson Jr.:

WImBo - Watermark imaging box project: A digital art history data acquisition tool. 1-6 - Fabian Steiner, Patrick Schulte, Georg Bocherer:

Approaching waterfilling capacity of parallel channels by higher order modulation and probabilistic amplitude shaping. 1-6 - Andrew C. Weislogel, C. Richard Johnson Jr., Amanda House, Katarina Martucci, Samantha Siegler, So Jeong Lim, Katrina Ferreira, Margaret Canfield:

The WIRE project at Cornell: An interactive decision tree approach for the rapid identification of watermarks in Rembrandt's Etchings. 1-6 - Ananth Narayan Samudrala, Rick S. Blum

:
On the estimation and secrecy capabilities of stochastic encryption for parameter estimation in IoT. 1-6 - Bingwen Zhang, Jun Geng, Weiyu Xu, Lifeng Lai:

Communication efficient distributed learning with feature partitioned data. 1-6 - Siamak K. Sorooshyari

, Stephen A. Baccus:
A communication-theoretic formulation of a continuous linear-nonlinear model of retinal ganglion cells. 1-5 - Ahmed A. Zewail, Aylin Yener:

Cache-aided combination networks with secrecy guarantees. 1-6 - Alejandro Lancho, Tobias Koch

, Giuseppe Durisi
:
Normal approximations for fading channels. 1-6 - Daniela Tuninetti

:
On inputs achieving the cardinality-constrained capacity on the real Gaussian noise channel. 1-5 - Anelia Somekh-Baruch, Jonathan Scarlett, Albert Guillen i Fabregas:

The error exponent of random gilbert-varshamov codes. 1-2 - Hsuan-Yin Lin, Stefan M. Moser, Po-Ning Chen

:
The r-wise hamming distance and its operational interpretation for block codes. 1-6 - Longguang Li, Stefan M. Moser, Ligong Wang, Michèle A. Wigger:

The MISO free-space optical channel at low and moderate SNR. 1-6 - Tong Huang, Nikolaos M. Freris, P. R. Kumar, Le Xie

:
Localization of forced oscillations in the power grid under resonance conditions. 1-5 - Guido Carlo Ferrante, Johan Östman, Giuseppe Durisi

, Kittipong Kittichokechai:
Pilot-assisted short-packet transmission over multiantenna fading channels: A 5G case study. 1-6 - Josep Font-Segura

, Gonzalo Vazquez-Vilar, Alfonso Martinez
, Albert Guillen i Fabregas, Alejandro Lancho:
Saddlepoint approximations of lower and upper bounds to the error probability in channel coding. 1-6 - Kevin Wu, Eric Wu, Gabriel Kreiman

:
Learning scene gist with convolutional neural networks to improve object recognition. 1-6 - Alex Dytso

, Mario Goldenbaum, H. Vincent Poor, Shlomo Shamai Shitz
:
When are discrete channel inputs optimal? - Optimization techniques and some new results. 1-6 - Arpan Chattopadhyay, Urbashi Mitra:

Attack detection and secure estimation under false data injection attack in cyber-physical systems. 1-6 - Yi-Peng Wei, Karim A. Banawan

, Sennur Ulukus:
Private information retrieval with partially known private side information. 1-6 - Ting-Yi Wu, Xiou Ge

, Lav R. Varshney:
Surprising sequences for communication and conversation. 1-6 - Yilun Zhang, David B. Kastner, Stephen A. Baccus, Tatyana O. Sharpee

:
Optimal information transmission by overlapping retinal cell mosaics. 1-6 - Paul Messier, Emily B. Frank:

Art into data | engineering WImBo. 1-4 - Emily B. Frank, Margaret Holben Ellis, Lydia Aikenhead, Paul Messier:

The computational analysis of watermarks: Setting the stage for the development of a Watermark Imaging Box (WImBo). 1-4 - Nicolas Boumal, Tamir Bendory

, Roy R. Lederman, Amit Singer
:
Heterogeneous multireference alignment: A single pass approach. 1-6 - Yize Chen, Pan Li, Baosen Zhang:

Bayesian renewables scenario generation via deep generative networks. 1-6 - Yanina Y. Shkel

, Rick S. Blum
, H. Vincent Poor:
Secure lossless compression. 1-6 - Topi Halme, Visa Koivunen, H. Vincent Poor:

Nonparametric distributed detection using bootstrapping and fisher's method. 1-6 - Saurabh Sihag

, Javad Heydari, Ali Tajer:
Sequential estimation of distributed parameters in networks. 1-5 - Zhengwei Ni, Mehul Motani:

On Gaussian mixture noise channels with minimum and peak amplitude constraints. 1-6 - Drew Linsley, Jeremy W. Linsley, Tarun Sharma

, Nathan Meyers, Thomas Serre:
Learning to predict action potentials end-to-end from calcium imaging data. 1-6 - Richard Chow, Hsin-Mu Tsai:

Securing the visual channel: How my car saw the light and stopped learning. 1-6 - John K. Delaney, Murray H. Loew:

Use of infrared hyperspectral imaging (960-1680 nm) and low energy x-radiography to visualize watermarks. 1-4 - Neil Slighton, Jose M. Rico, Emily Kallfelz, Ji Qi, Christopher G. Brinton

:
A network-driven approach to modeling the spread of Ebola-type epidemics. 1-6 - Madhumitha Shridharan, Ashley Willingham, Jonathan C. Spencer, Tsung-Yen Yang, Christopher G. Brinton

:
Predictive learning analytics for video-watching behavior in MOOCs. 1-6 - Vincent Xia, Kavirath Jain, Akshay Krishna, Christopher G. Brinton

:
A network-driven methodology for sports ranking and prediction. 1-6 - Connor Bridges

, James Jared, Joshua Weissmann, Astrid Montanez-Garay, Jonathan C. Spencer, Christopher G. Brinton
:
Course recommendation as graphical analysis. 1-6 - Arjun Nitin Bhagoji

, Daniel Cullina
, Chawin Sitawarin
, Prateek Mittal:
Enhancing robustness of machine learning systems via data transformations. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














