default search action
52nd CISS 2018: Princeton, NJ, USA
- 52nd Annual Conference on Information Sciences and Systems, CISS 2018, Princeton, NJ, USA, March 21-23, 2018. IEEE 2018, ISBN 978-1-5386-0579-0
- Igor Stanojev, Osvaldo Simeone:
On the interplay between edge caching and HARQ in Fog-RAN. 1-6 - Neeraj Varshney, Aditya K. Jagannatham, Pramod K. Varshney:
On diffusive molecular communication with mobile nanomachines. 1-6 - Xuanyu Cao, K. J. Ray Liu:
An ADMM approach to dynamic sharing problems. 1-6 - Xuanyu Cao, K. J. Ray Liu:
Generic network cost minimization: A decentralized Newton's method. 1-6 - Rui Zhang, Quanyan Zhu:
Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning. 1-6 - Jitendra K. Tugnait:
An edge exclusion test for graphical modeling of multivariate time series. 1-6 - Zhuoqi Zeng, Steven Liu, Lei Wang:
UWB/IMU integration approach with NLOS identification and mitigation. 1-6 - Jonathan Stokes, Steven Weber:
Online estimation for finding a near-maximum value in a large list of numerical data. 1-6 - Theo Diamandis, Yonathan Murin, Andrea Goldsmith:
Ranking causal influence of financial markets via directed information graphs. 1-6 - Andrew S. Lan, Mung Chiang, Christoph Studer:
Linearized binary regression. 1-6 - Yiqiu Liu, Xin Liu, Lei Ying, R. Srikant:
Wireless scheduling with deadline and power constraints. 1-6 - Jing Guo, Ahmad A. I. Ibrahim, Ameya Agaskar, David J. Love, Navid Yazdani:
Implementation of rate-adaptive integer forcing compression in distributed wireless relay networking. 1-6 - Zhen Xiang, David J. Miller:
Locally optimal, delay-tolerant predictive source coding. 1-6 - David S. R. Kondru, Mehmet Celenk:
Predictive airborne target tracking using all-terrain fusion based mobile surveillance system. 1-6 - Shudipto Sekhar Roy, Akkas Uddin Haque, Jeremiah Neubert:
Automatic diagnosis of melanoma from dermoscopic image using real-time object detection. 1-5 - Jianing Xi, Ao Li, Minghui Wang:
An efficient nonnegative matrix factorization model for finding cancer associated genes by integrating data from genome, transcriptome and interactome. 1-6 - Shahab Ghasemi-Goojani, Panos Papadimitratos:
On the capacity of Gaussian "dirty" Z-interference channel with common state. 1-6 - John Franklin, A. Brinton Cooper:
Kronecker compressed sensing for massive MIMO. 1-6 - W. Steven Gray, G. S. Venkatesh:
Relative degree of interconnected SISO nonlinear control systems. 1-6 - Nazanin Takbiri, Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case. 1-6 - Gabriel Ford, Rebecca Cargan, Ali Ahmed, Kevin Rigney, Christopher Berry, Donald J. Bucci, Moshe Kam:
Wireless network traffic disaggregation using Bayesian nonparametric techniques. 1-6 - Mahesh Babu Vaddi, B. Sundar Rajan:
Optimal error correcting index codes for two classes of index coding problems. 1-5 - Ning Wu, Ao Tang:
End-to-end network throughput optimization through last-mile diversity. 1-6 - Angelo Coluccia, Giuseppe Ricci:
A random-signal approach to robust radar detection. 1-6 - Alessio Fascista, Giovanni Ciccarese, Angelo Coluccia, Giuseppe Ricci:
A change-detection approach to mobile node localization in bounded domains. 1-6 - Tiexing Wang, Donald J. Bucci, Yingbin Liang, Biao Chen, Pramod K. Varshney:
Clustering under composite generative models. 1-6 - Audra McMillan, Anna C. Gilbert:
Local differential privacy for physical sensor data and sparse recovery. 1-6 - Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Privacy against matching under anonymization and obfuscation in the Gaussian case. 1-6 - Robin M. Givens, Rex K. Kincaid, Weizhen Mao, Gexin Yu:
An integer linear program for mixed-weight open locating-dominating sets. 1-6 - Xinjie Lan, Kenneth E. Barner:
From MRFS to CNNS: A novel image restoration method. 1-5 - Mohammad Javad Khojasteh, Mojtaba Hedayatpour, Jorge Cortés, Massimo Franceschetti:
Event-triggered stabilization of disturbed linear systems over digital channels. 1-6 - Enlong Hu, Hongya Ge:
The probability density function of SINR loss of the dominant mode rejection beamformer. 1-6 - Juntao Chen, Quanyan Zhu:
Security investment under cognitive constraints: A Gestalt Nash equilibrium approach. 1-6 - Brian Hu, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur:
Head movements are correlated with other measures of visual attention at smaller spatial scales. 1-6 - Xi Zhang, Jingqing Wang:
Joint heterogeneous statistical-QoS/QoE provisionings for edge-computing based WiFi offloading over 5G mobile wireless networks. 1-6 - Mahdieh Zabihimayvan, Derek Doran:
Some (Non-)universal features of Web robot traffic. 1-6 - Alex Dunyak, Quanyan Zhu:
Understanding mean-field effects of large-population user data obfuscation in machine learning. 1-6 - Rebal Jurdi, Saeed R. Khosravirad, Harish Viswanathan:
Variable-rate ultra-reliable and low-latency communication for industrial automation. 1-6 - Malcolm Egan, Samir Medina Perlaza:
Capacity approximation of continuous channels by discrete inputs. 1-6 - Ramina Ghods, Andrew S. Lan, Tom Goldstein, Christoph Studer:
PhaseLin: Linear phase retrieval. 1-6 - Ali Taleb Zadeh Kasgari, Walid Saad:
Stochastic optimization and control framework for 5G network slicing with effective isolation. 1-6 - Ke Feng, Martin Haenggi:
A tunable base station cooperation scheme for poisson cellular networks. 1-6 - Pei-Duo Yu, Chee-Wei Tan, Hung-Lin Fu:
Graph algorithms for preventing cascading failures in networks. 1-6 - Weiqiang Dong, Moshe Kam:
Parallel decentralized detection with dependent randomization. 1-6 - Libin Liu, Arpan Chattopadhyay, Urbashi Mitra:
Exploiting policy structure for solving MDPs with large state space. 1-6 - Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
A deep reinforcement learning-based framework for content caching. 1-6 - Abdulrahman Baknina, Sennur Ulukus:
Coded status updates in an energy harvesting erasure channel. 1-6 - Yufan Huang, Michelle Dai, Zhihao Zhang, Ruian Ke:
Network analysis of virus-innate immune interaction within a host. 1-6 - Venkata Sriram Siddhardh Nadendla, Cedric Langbort:
On estimating multi-attribute choice preferences using private signals and matrix factorization. 1-6 - Shaohan Wu, Brian L. Hughes:
Training-based joint channel and antenna impedance estimation. 1-6 - Youngbin Im, Prasanth Prahladan, Tae Hwan Kim, Yong Geun Hong, Sangtae Ha:
SNN-cache: A practical machine learning-based caching system utilizing the inter-relationships of requests. 1-6 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Stability of fair trade-off solution between radar and communication objectives on hostile interference. 1-6 - Georgia Murray, Alon Kipnis, Andrea J. Goldsmith:
Lossy compression of decimated Gaussian random walks. 1-6 - Massieh Kordi Boroujeny, Yariv Ephraim, Brian L. Mark:
Phase-type bounds on network performance. 1-6 - Boyu Wang, Jing Yang:
Optimal electric vehicle charging scheduling with time-varying profits. 1-6 - Soheil Eshghi, Leandros Tassiulas:
Innovation, cheating, and whistleblowing - A game theoretic perspective. 1-6 - Yue Zhao:
Solar energy sharing in net metered community microgrids: Can the social goals be achieved? 1-6 - Alexander N. Tait, Thomas Ferreira de Lima, Philip Y. Ma, Matthew P. Chang, Mitchell A. Nahmias, Bhavin J. Shastri, Prateek Mittal, Paul R. Prucnal:
Blind source separation in the physical layer. 1-6 - Ling-Hua Chang, Carol Wang, Po-Ning Chen, Vincent Y. F. Tan, Yunghsiang S. Han:
Applications of an exact formula for the largest minimum distance of block codes. 1 - C. Richard Johnson Jr.:
WImBo - Watermark imaging box project: A digital art history data acquisition tool. 1-6 - Fabian Steiner, Patrick Schulte, Georg Bocherer:
Approaching waterfilling capacity of parallel channels by higher order modulation and probabilistic amplitude shaping. 1-6 - Andrew C. Weislogel, C. Richard Johnson Jr., Amanda House, Katarina Martucci, Samantha Siegler, So Jeong Lim, Katrina Ferreira, Margaret Canfield:
The WIRE project at Cornell: An interactive decision tree approach for the rapid identification of watermarks in Rembrandt's Etchings. 1-6 - Ananth Narayan Samudrala, Rick S. Blum:
On the estimation and secrecy capabilities of stochastic encryption for parameter estimation in IoT. 1-6 - Bingwen Zhang, Jun Geng, Weiyu Xu, Lifeng Lai:
Communication efficient distributed learning with feature partitioned data. 1-6 - Siamak K. Sorooshyari, Stephen A. Baccus:
A communication-theoretic formulation of a continuous linear-nonlinear model of retinal ganglion cells. 1-5 - Ahmed A. Zewail, Aylin Yener:
Cache-aided combination networks with secrecy guarantees. 1-6 - Alejandro Lancho, Tobias Koch, Giuseppe Durisi:
Normal approximations for fading channels. 1-6 - Daniela Tuninetti:
On inputs achieving the cardinality-constrained capacity on the real Gaussian noise channel. 1-5 - Anelia Somekh-Baruch, Jonathan Scarlett, Albert Guillen i Fabregas:
The error exponent of random gilbert-varshamov codes. 1-2 - Hsuan-Yin Lin, Stefan M. Moser, Po-Ning Chen:
The r-wise hamming distance and its operational interpretation for block codes. 1-6 - Longguang Li, Stefan M. Moser, Ligong Wang, Michèle A. Wigger:
The MISO free-space optical channel at low and moderate SNR. 1-6 - Tong Huang, Nikolaos M. Freris, P. R. Kumar, Le Xie:
Localization of forced oscillations in the power grid under resonance conditions. 1-5 - Guido Carlo Ferrante, Johan Östman, Giuseppe Durisi, Kittipong Kittichokechai:
Pilot-assisted short-packet transmission over multiantenna fading channels: A 5G case study. 1-6 - Josep Font-Segura, Gonzalo Vazquez-Vilar, Alfonso Martinez, Albert Guillen i Fabregas, Alejandro Lancho:
Saddlepoint approximations of lower and upper bounds to the error probability in channel coding. 1-6 - Kevin Wu, Eric Wu, Gabriel Kreiman:
Learning scene gist with convolutional neural networks to improve object recognition. 1-6 - Alex Dytso, Mario Goldenbaum, H. Vincent Poor, Shlomo Shamai Shitz:
When are discrete channel inputs optimal? - Optimization techniques and some new results. 1-6 - Arpan Chattopadhyay, Urbashi Mitra:
Attack detection and secure estimation under false data injection attack in cyber-physical systems. 1-6 - Yi-Peng Wei, Karim A. Banawan, Sennur Ulukus:
Private information retrieval with partially known private side information. 1-6 - Ting-Yi Wu, Xiou Ge, Lav R. Varshney:
Surprising sequences for communication and conversation. 1-6 - Yilun Zhang, David B. Kastner, Stephen A. Baccus, Tatyana O. Sharpee:
Optimal information transmission by overlapping retinal cell mosaics. 1-6 - Paul Messier, Emily B. Frank:
Art into data | engineering WImBo. 1-4 - Emily B. Frank, Margaret Holben Ellis, Lydia Aikenhead, Paul Messier:
The computational analysis of watermarks: Setting the stage for the development of a Watermark Imaging Box (WImBo). 1-4 - Nicolas Boumal, Tamir Bendory, Roy R. Lederman, Amit Singer:
Heterogeneous multireference alignment: A single pass approach. 1-6 - Yize Chen, Pan Li, Baosen Zhang:
Bayesian renewables scenario generation via deep generative networks. 1-6 - Yanina Y. Shkel, Rick S. Blum, H. Vincent Poor:
Secure lossless compression. 1-6 - Topi Halme, Visa Koivunen, H. Vincent Poor:
Nonparametric distributed detection using bootstrapping and fisher's method. 1-6 - Saurabh Sihag, Javad Heydari, Ali Tajer:
Sequential estimation of distributed parameters in networks. 1-5 - Zhengwei Ni, Mehul Motani:
On Gaussian mixture noise channels with minimum and peak amplitude constraints. 1-6 - Drew Linsley, Jeremy W. Linsley, Tarun Sharma, Nathan Meyers, Thomas Serre:
Learning to predict action potentials end-to-end from calcium imaging data. 1-6 - Richard Chow, Hsin-Mu Tsai:
Securing the visual channel: How my car saw the light and stopped learning. 1-6 - John K. Delaney, Murray H. Loew:
Use of infrared hyperspectral imaging (960-1680 nm) and low energy x-radiography to visualize watermarks. 1-4 - Neil Slighton, Jose M. Rico, Emily Kallfelz, Ji Qi, Christopher G. Brinton:
A network-driven approach to modeling the spread of Ebola-type epidemics. 1-6 - Madhumitha Shridharan, Ashley Willingham, Jonathan C. Spencer, Tsung-Yen Yang, Christopher G. Brinton:
Predictive learning analytics for video-watching behavior in MOOCs. 1-6 - Vincent Xia, Kavirath Jain, Akshay Krishna, Christopher G. Brinton:
A network-driven methodology for sports ranking and prediction. 1-6 - Connor Bridges, James Jared, Joshua Weissmann, Astrid Montanez-Garay, Jonathan C. Spencer, Christopher G. Brinton:
Course recommendation as graphical analysis. 1-6 - Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal:
Enhancing robustness of machine learning systems via data transformations. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.