


Остановите войну!
for scientists:


default search action
GlobalSIP 2013: Austin, TX, USA
- IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013. IEEE 2013, ISBN 978-1-4799-0248-4
- Robert W. Heath Jr.
, Ahmed H. Tewfik:
General chairs' welcome. - Charles A. Bouman, Robert D. Nowak, Anna Scaglione:
Technical program overview. - Nima Bigdely Shamlo, Kenneth Kreutz-Delgado, Kay Robbins, Makoto Miyakoshi
, Marissa Westerfield, Tarik Bel-Bahar, Christian Kothe, Jessica Hsi, Scott Makeig:
Hierarchical Event Descriptor (HED) tags for analysis of event-related EEG studies. 1-4 - Thomas Rognon, Rebecca Strautman, Lauren Jett, Nima Bigdely Shamlo, Scott Makeig, Tony Johnson, Kay Robbins:
CTAGGER: Semi-structured community tagging for annotation and data-mining in event-rich contexts. 5-8 - Philip Davis, Charles D. Creusere, Jim Kroger:
EEG and the human perception of video quality: Impact of channel selection on discrimination. 9-12 - Ervin Sejdic
, Luis F. Chaparro:
A compressive sampling approach for brain-machine interfaces based on transcranial Doppler sonography: A case study of resting-state maximal cerebral blood velocity signals. 13-16 - Kyungmin Su, Kay A. Robbins:
Content-based EEG database retrieval using a multiclass SVM classifier. 17-20 - Kareem Shabaik, Vijay Aditya Tadipatri, Ahmed H. Tewfik:
Using feedback in long term trajectory decoding from Local Field Potentials. 21-24 - Nima Bigdely Shamlo, Kenneth Kreutz-Delgado, Christian Kothe, Scott Makeig:
Towards an EEG search engine. 25-28 - Amir Hossein Harati Nejad Torbati, Sung Choi, Masih Tabrizi, Iyad Obeid
, Joseph Picone, Mercedes P. Jacobson:
The Temple University Hospital EEG corpus. 29-32 - Shaheen Ahmed, Lenis Mauricio Merino, Zijing Mao, Jia Meng
, Kay Robbins, Yufei Huang:
A Deep Learning method for classification of images RSVP events with EEG data. 33-36 - Arash Golibagh Mahyari, Selin Aviyente
:
Two-dimensional SVD for event detection in dynamic functional brain networks. 37-40 - Xiaodong Cui, Jia Meng
, Manjeet K. Rao, Yidong Chen, Yufei Huang:
Differential analysis of rna methylation sequencing data. 41-42 - Minji Kim, Jonathan G. Ligo, Amin Emad, Farzad Farnoud
, Olgica Milenkovic, Venugopal V. Veeravalli:
MetaPar: Metagenomic sequence assembly via iterative reclassification. 43-46 - Xian Fan, Luay Nakhleh, Ken Chen
:
Integrated genotyping of structural variation. 47-48 - Zhuoyi Huang, Jin Yu
, Fuli Yu:
Cloud processing of 1000 genomes sequencing data using Amazon Web Service. 49-52 - Boris Grinshpun, Jennifer Sims, Peter Canoll, Jeffrey N. Bruce, Peter Sims, Yufeng Shen:
Analyzing T cell repertoire diversity by high-throughput sequencing. 53-56 - Amin Zollanvari
, Edward R. Dougherty:
Application of double asymptotics and random matrix theory in error estimation of regularized linear discriminant analysis. 57-59 - David Haughton, Félix Balado:
Security study of keyed DNA data embedding. 60-63 - Soyeon Ahn, Haris Vikalo:
Deterministic sequential Monte Carlo for haplotype inference. 64 - Lori A. Dalton:
Optimal Bayesian feature selection. 65-68 - Arvind Rao:
Exploring relationships between multivariate radiological phenotypes and genetic features: A case-study in Glioblastoma using the Cancer Genome Atlas. 69-72 - Xin Yin, Zhao Song, Karin S. Dorman, Aditya Ramamoorthy:
PREMIER Turbo: Probabilistic error-correction using Markov inference in errored reads using the turbo principle. 73-76 - Tzu-Yu Liu, Ami Wiesel, Alfred O. Hero III:
A sparse multi-class classifier for biomarker screening. 77-80 - Ulisses M. Braga-Neto:
Particle filtering approach to state estimation in Boolean dynamical systems. 81-84 - Ali Sobhi-Afshar, Joseph Xu, John Goutsias:
Identifying deregulated TF/miRNA negative and double-negative feedback loops in prostate cancer. 85-88 - Yijie Wang, Xiaoning Qian:
Identifying overlapping functional modules in biological networks by Markov random walk. 89-92 - Anwoy Kumar Mohanty, Aniruddha Datta, Jijayanagaram Venkatraj:
On the modeling of heterogeneity in cancer tissue. 93 - Navadon Khunlertgit
, Byung-Jun Yoon:
Finding robust subnetwork markers that improve cross-dataset performance of cancer classification. 94 - Saad Haider, Ranadip Pal
:
Inference of tumor inhibition pathways from drug perturbation data. 95-98 - Lijun Qian, Xiangfang Li, Edward R. Dougherty:
Robust identification of molecularly targeted drug effect coefficient using H∞ filter. 99-102 - Yong-Jun Shin:
Parallel computing for adaptive multi-cellular gene network modeling. 103-104 - Mohammadmahdi R. Yousefi, Ivan Ivanov:
Optimal control of gene regulatory networks with uncertain intervention effects. 105-108 - Vinay Varadan, Vartika Agrawal, Lyndsay N. Harris, Nevenka Dimitrova:
Identification and characterization of gene fusions in breast cancer - A non-trivial pursuit. 109-112 - Nitin K. Singh, Aishwarya Sundaresan, Mathukumalli Vidyasagar:
A sparse Bayesian learning based approach to Inferring Gene Regulatory Networks. 113-116 - D. Tunon, T. Taghavi, Jean-François Chamberland
, Gregory H. Huff
:
Localization of a single source with orientation-aware smart devices. 117-120 - Charles C. Castello, Joshua R. New
, Matt K. Smith:
Autonomous correction of sensor data applied to building technologies using filtering methods. 121-124 - George K. Atia, Shuchin Aeron:
Controlled sensing for sequential estimation. 125-128 - Earnest Akofor, Biao Chen:
On optimal fusion architecture for a two-sensor tandem distributed detection system. 129-132 - Lucas W. Krakow
, Ramin Zahedi, Edwin K. P. Chong, Ali Pezeshki:
Adaptive compressive sensing in the presence of noise and erasure. 133-136 - Sijia Liu, Makan Fardad, Engin Masazade
, Pramod K. Varshney:
On optimal periodic sensor scheduling for field estimation in wireless sensor networks. 137-140 - Chris Kreucher
, Benjamin Shapo:
CRB-optimal sensor placement for multiple passive acoustic arrays. 141-144 - Di Li, Lifeng Lai, Shuguang Cui:
Quickest change detection and identification across a sensor array. 145-148 - Stephan Schlupkothen
, Guido Dartmann, Gerd Ascheid:
Exploration with massive sensor swarms. 149-152 - Dionysios S. Kalogerias, Athina P. Petropulu:
MC-MIMO radar: Recoverability and performance bounds. 153-156 - Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
An incentive-based mechanism for location estimation in wireless sensor networks. 157-160 - Theodoros Tsiligkaridis, Brian M. Sadler
, Alfred O. Hero III:
Blind collaborative 20 questions for target localization. 161-164 - Zaher M. Kassas, Todd E. Humphreys
:
The price of anarchy in active signal landscape map building. 165-168 - Shuangjiang Li, Hairong Qi:
Pattern-based compressed phone sensing. 169-172 - Chong Ding, Jay A. Farrell
, Amit K. Roy-Chowdhury:
Capturing high fidelity images in PTZ camera networks. 173-176 - Brian Beck
, Robert J. Baxley, Xiaoli Ma:
Regularization techniques for floor plan estimation in Radio Tomographic Imaging. 177-180 - David M. Jun, Douglas L. Jones:
The value of sleeping: A rollout algorithm for sensor scheduling in HMMs. 181-184 - Nithin Sugavanam, Emre Ertin:
Sensor selection and placement in adversarial environment. 185-188 - Dennis L. Wei, Alfred O. Hero III:
A performance guarantee for adaptive estimation of sparse signals. 189-192 - Daphney-Stavroula Zois
, Urbashi Mitra:
On the properties of nonlinear POMDPs for active state tracking. 193-196 - Sofia Suvorova
, William Moran, Stephen D. Howard, Douglas Cochran:
Control of sensing by navigation on information gradients. 197-200 - Yixuan Zhai, Qing Zhao:
Dynamic search under false alarms. 201-204 - Vikram Krishnamurthy:
Social learning and controlled sensing. 205-208 - Tara Javidi
:
Information Acquisition and Utilization Problems. 209-212 - Yue M. Lu:
A framework for adaptive parameter estimation with finite memory. 213-216 - Kyle D. Wesson, Brian L. Evans, Todd E. Humphreys
:
A combined symmetric difference and power monitoring GNSS anti-spoofing technique. 217-220 - Kobi Cohen
, Qing Zhao, Ananthram Swami:
Optimal index policies for quickest localization of anomaly in cyber networks. 221-224 - Mauro Barni, Benedetta Tondi:
The Security Margin: A measure of source distinguishability under adversarial conditions. 225-228 - Richard Al-Bayaty, Patrick Caldwell, O. Patrick Kreidl:
On trusting introductions from a reputable source: A utility-maximizing probabilistic approach. 229-232 - Simon Oya, Carmela Troncoso
, Fernando Pérez-González
:
Meet the family of statistical disclosure attacks. 233-236 - João Almeida, Gerhard Maierbacher, João Barros
:
Designing scalar quantizers with secrecy constraints. 237-240 - Ye Wang, Shantanu Rane, Prakash Ishwar
:
On unconditionally secure multiparty computation for realizing correlated equilibria in games. 241-244 - Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate
:
Stochastic gradient descent with differentially private updates. 245-248 - Yousof Erfani, Ramin Pichevar, Jean Rouat:
Audio tampering localization using modified iss watermarking in sparse-domain. 249-252 - Amani A. Alahmadi, Muhammad Hussain, Hatim A. Aboalsamh
, Muhammad Ghulam
, George Bebis:
Splicing image forgery detection based on DCT and Local Binary Pattern. 253-256 - James B. Wendt, Miodrag Potkonjak:
The bidirectional polyomino partitioned PPUF as a hardware security primitive. 257-260 - Oliver Kosut:
Malicious data attacks against dynamic state estimation in the presence of random noise. 261-264 - Hari Ravi, Anoosheh Heidarzadeh, Tracey Ho:
Practical improvements to bus-based strategies for reliable anonymous networking. 265-268 - Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data. 269-272 - Mohamed S. Nafea, Aylin Yener:
Degrees of freedom of the single antenna gaussian wiretap channel with a helper irrespective of the number of antennas at the eavesdropper. 273-276 - Remi A. Chou
, Matthieu R. Bloch:
Secret-key generation with arbitrarily varying eavesdropper's channel. 277-280 - Bing-Rong Lin, Daniel Kifer:
Geometry of privacy and utility. 281-284 - Marc Lichtman, Jeffrey H. Reed, T. Charles Clancy, Mark Norton:
Vulnerability of LTE to hostile interference. 285-288 - Tsung-Hui Chang
, Angelia Nedic
, Anna Scaglione
:
Distributed sparse regression by consensus-based primal-dual perturbation optimization. 289-292 - Stanley H. Chan, Thiago B. Costa, Edoardo M. Airoldi
:
Estimation of exchangeable graph models by stochastic blockmodel approximation. 293-296 - Disa Mhembere, William R. Gray Roncal, Daniel L. Sussman
, Carey E. Priebe, Rex E. Jung
, Sephira Ryman, R. Jacob Vogelstein, Joshua T. Vogelstein, Randal C. Burns
:
Computing scalable multivariate glocal invariants of large (brain-) graphs. 297-300 - Wuqiong Luo, Wee-Peng Tay
:
Estimating infection sources in a network with incomplete observations. 301-304 - Ameya Agaskar, Yue M. Lu:
ALARM: A logistic auto-regressive model for binary processes on networks. 305-308 - Chunxiao Jiang, Yan Chen, Yang Gao, K. J. Ray Liu
:
Indian Buffet Game with non-Bayesian social learning. 309-312 - William R. Gray Roncal, Zachary H. Koterba, Disa Mhembere, Dean M. Kleissas, Joshua T. Vogelstein, Randal C. Burns
, Anita R. Bowles, Dimitrios K. Donavos, Sephira Ryman, Rex E. Jung
, Lei Wu, Vince D. Calhoun
, R. Jacob Vogelstein
:
MIGRAINE: MRI Graph Reliability Analysis and Inference for Connectomics. 313-316 - Patricia Reynaud-Bouret, Vincent Rivoirard, Christine Tuleau-Malot:
Inference of functional connectivity in Neurosciences via Hawkes processes. 317-320 - Yuejie Chi
:
Sparse MIMO radar via structured matrix completion. 321-324 - Lalitha Sankar:
Competitive privacy: Distributed computation with privacy guarantees. 325-328 - Angelia Nedic
, Alex Olshevsky:
Distributed optimization of strongly convex functions on directed time-varying graphs. 329-332 - Divya Alok Sharma, Mark Coates:
Contact graph based routing in opportunistic networks. 333-336 - David T. H. Kao:
How local can a node's view be and still guarantee sum-capacity in interference networks? 337-340 - James Sharpnack:
A path algorithm for localizing anomalous activity in graphs. 341-344 - Imtiaz Ahmed, Aïssa Ikhlef, Derrick Wing Kwan Ng
, Robert Schober:
Optimal resource allocation for energy harvesting two-way relay systems with channel uncertainty. 345-348 - Zheng Guo, Teng Joon Lim
, Mehul Motani
:
Base station energy cooperation in green cellular networks. 349-352 - Rahul Vaze:
Transmission capacity of wireless ad hoc networks with energy harvesting nodes. 353-358 - Rajeev Gangula, David Gesbert
, Deniz Gündüz
:
Optimizing feedback in energy harvesting MISO communication channels. 359-362 - Arin Minasian, Raviraj S. Adve, Shahram ShahbazPanahi
:
Optimal resource allocation in energy harvesting amplify-and-forward relay networks. 363-366 - Roy D. Yates, Hajar Mahdavi-Doost:
Energy harvesting receivers: Optimal sampling and decoding policies. 367-370 - Burak Varan, Aylin Yener:
The energy harvesting two-way decode-and-forward relay channel with stochastic data arrivals. 371-374 - Dan Zhao, Chuan Huang, Yue Chen, Shuguang Cui:
Competitive analysis of online throughput maximization schemes for multiple access channels with a shared renewable energy source. 375-378 - Nassar Ksairi, Philippe Ciblat, Christophe J. Le Martret:
Optimal resource allocation for Type-II-HARQ-based OFDMA ad hoc networks. 379-382 - Nikolaos Pappas
, Marios Kountouris, Jeongho Jeon, Anthony Ephremides, Apostolos Traganitis:
Network-level cooperation in energy harvesting wireless networks. 383-386 - John Sarik, Kanghwan Kim, Maria Gorlatova, Ioannis Kymissis, Gil Zussman:
More than meets the eye - A portable measurement unit for characterizing light energy availability. 387-390 - Ghada Saleh, Can Emre Koksal, Ness B. Shroff:
Optimal SINR based resource allocation for simultaneous energy and information transfer. 391-394 - Jing Yang:
Optimal collaborative sensing scheduling with energy harvesting nodes. 395-398 - Burak Varan, Aylin Yener:
Two-hop networks with energy harvesting: The (non-)impact of buffer size. 399-402 - Bo Bai, Wei Chen, Zhigang Cao:
Energy-spectral efficient transmission policy for energy harvesting nodes with rate requirement. 403-406 - Mustafa Ozmen, Mustafa Cenk Gursoy:
Energy-efficient power control policies in fading channels with Markov arrivals and QoS constraints. 407-410 - Mohammad Reza Gholami, Erik G. Ström, Ali H. Sayed:
Diffusion estimation over cooperative networks with missing data. 411-414 - Amin Kheradmand, Peyman Milanfar:
A general framework for kernel similarity-based image denoising. 415-418 - David K. Hammond, Yaniv Gur, Chris R. Johnson:
Graph diffusion distance: A difference measure for weighted graphs based on the graph Laplacian exponential kernel. 419-422 - Venkatesan N. Ekambaram, Giulia Fanti, Babak Ayazifar, Kannan Ramchandran:
Wavelet-regularized graph semi-supervised learning. 423-426 - Siheng Chen, Aliaksei Sandryhaila, José M. F. Moura, Jelena Kovacevic:
Adaptive graph filtering: Multiresolution classification on graphs. 427-430 - Moncef Hidane, Olivier Lézoray
, Abderrahim Elmoataz:
Lifting scheme on graphs with application to image representation. 431-434 - Shu Yang, Lisa Pham, Lisa M. Christadore, Scott E. Schaus, Eric D. Kolaczyk:
Multiscale gene sets from protein interaction networks. 435-438 - Mohammad Aghagolzadeh, Hayder Radha:
Transitivity based community analysis and detection. 439-442