default search action
48th CISS 2014: Princeton University, NJ, USA
- 48th Annual Conference on Information Sciences and Systems, CISS 2014, Princeton, NJ, USA, March 19-21, 2014. IEEE 2014
- Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan:
Transmission of partitioning information over non-adaptive multi-access Boolean channel. 1-6 - Seok-Hwan Park, Osvaldo Simeone, Onur Sahin, Shlomo Shamai:
On remote radio head selection for the downlink of backhaul constrained network MIMO systems. 1-5 - Christopher Griffin, George Kesidis:
Behavior in a shared resource game with cooperative, greedy, and vigilante players. 1-6 - Fatih Kocak, David J. Miller, George Kesidis:
Detecting anomalous latent classes in a batch of network traffic flows. 1-6 - Varun S. Jog, Venkat Anantharam:
Convex relative entropy decay in Markov chains. 1-6 - Milind Rao, Francisco Javier López-Martínez, Andrea Goldsmith:
Statistics and system performance metrics for the Two Wave with Diffuse Power fading model. 1-6 - Anand Guruswamy, Rick S. Blum, Shalinee Kishore, Mark Bordogna:
Performance bounds for phase offset estimation in IEEE 1588 synchronization. 1-6 - Jayaprakash Rajasekharan, Visa Koivunen:
Production equilibrium in cooperative smart hybrid renewable minigrids. 1-6 - Antonios Argyriou, Dimitrios Kosmanos, Leandros Tassiulas:
Optimizing interference cancellation in cooperative wireless networks with relay selection. 1-5 - Yicheng Lin, Wei Yu:
Joint spectrum partition and user association in multi-tier heterogeneous networks. 1-6 - Kliti Kodra, Maja Skataric, Zoran Gajic:
Controllability and observability grammians for balancing linear singularly perturbed systems. 1-6 - Tadesse Ghirmai:
Distributed particle filter using Gaussian approximated likelihood function. 1-5 - Shahadate Rezvy, Shahedur Rahman, Aboubaker Lasebae, Jonathan Loo:
System capacity improvement by on request channel allocation in LTE cellular network. 1-5 - Jungseul Ok, Youngmi Jin, Jaeyoung Choi, Jinwoo Shin, Yung Yi:
Influence maximization over strategic diffusion in social networks. 1-5 - Omid Javidbakht, Parv Venkitasubramaniam:
Rate allocation for Multihop routing in anonymous networking. 1-6 - Zhe Cui, Raviraj Adve:
Joint user association and resource allocation in small cell networks with backhaul constraints. 1-6 - Nicolò Michelusi, Sahand Pirbadian, Mohamed Y. El-Naggar, Urbashi Mitra:
A model for electron transfer and cell energetics in bacterial cables. 1-6 - Yingxiang Yang, Narayan B. Mandayam:
Impact of end-user decisions on pricing in wireless networks. 1-6 - Brian Swenson, Soummya Kar, João Manuel Freitas Xavier:
Strong convergence to mixed equilibria in fictitious play. 1-6 - Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang:
Techniques for polar coding over multiple access channels. 1-6 - Eran Simhon, David Starobinski:
Game-theoretic analysis of advance reservation services. 1-6 - Donald J. Bucci, Sayandeep Acharya, Timothy J. Pleskac, Moshe Kam:
Subjective confidence and source reliability in soft data fusion. 1-6 - Lu Li, Javier Garcia-Frías:
Hybrid analog-digital coding scheme based on parallel concatenation of linear random projections and LDGM codes. 1-6 - Weihao Gao, Yury Polyanskiy:
On the bit error rate of repeated error-correcting codes. 1-6 - Chiunlin Lim, Ki Suh Lee, Han Wang, Hakim Weatherspoon, Ao Tang:
Packet clustering introduced by routers: Modeling, analysis and experiments. 1-6 - Marc Reinhardt, Benjamin Noack, Uwe D. Hanebeck:
Reconstruction of joint covariances in networked linear systems. 1-6 - Andreas Winkelbauer, Gerald Matz:
Rate-information-optimal Gaussian channel output compression. 1-5 - Donald Richard Brown, Rui Wang, Soura Dasgupta:
Asymptotic oscillator tracking performance analysis for distributed massive MIMO systems. 1-6 - Arnob Ghosh, Saswati Sarkar:
Quality sensitive price competition in spectrum oligopoly over multiple locations. 1-6 - Christopher G. Brinton, Mung Chiang:
Social learning networks: A brief survey. 1-6 - Hamdi Jamel Bouchech, Sebti Foufou, Mongi A. Abidi:
Dynamic best spectral bands selection for face recognition. 1-6 - Mainak Chowdhury, Alexandros Manolakos, Andrea J. Goldsmith:
Design and performance of noncoherent massive SIMO systems. 1-6 - Michael A. Tope, Joel M. Morris:
SCHEME: Stochastically convergent heuristical Expectation Maximization estimation. 1-6 - Hadis Dashtestani, Paul Cotae, Ira S. Moskowitz:
Joint optimal placement and energy allocation of underwater sensors in a tree topology. 1-6 - Ishanu Chattopadhyay, Hod Lipson:
Computing entropy rate of symbol sources & a distribution-free limit theorem. 1-6 - James R. Cruise, Richard J. Gibbens, Stan Zachary:
Optimal control of storage for arbitrage, with applications to energy systems. 1-6 - Mandoye Ndoye, John M. M. Anderson:
An Iterative ℓ1-regularized least absolute deviation algorithm for robust GPR Imaging. 1-5 - Maice Costa, Anthony Ephremides:
Energy efficiency in cooperative cognitive wireless networks. 1-6 - Hajar Mahdavi-Doost, Roy D. Yates:
Fading channels in energy-harvesting receivers. 1-6 - Yi Li, Gozde Ozcan, Mustafa Cenk Gursoy, Senem Velipasalar:
Energy efficiency of hybrid-ARQ systems under QoS constraints. 1-6 - Bo Li, Athina P. Petropulu:
Efficient target estimation in distributed MIMO radar via the ADMM. 1-5 - Xiaowen Gong, Xu Chen, Junshan Zhang:
Social group utility maximization in mobile networks: From altruistic to malicious behavior. 1-6 - Zhen Chen, Kai Zhu, Lei Ying:
Detecting multiple information sources in networks under the SIR model. 1-4 - Sébastien Bubeck, Che-Yu Liu:
Prior-free and prior-dependent regret bounds for Thompson Sampling. 1-9 - Wanrong Tang, Ying Jun Zhang:
Online electric vehicle charging control with multistage stochastic programming. 1-6 - A. Bolognino, Umberto Spagnolini:
Cooperative estimation for under-determined linear systems. 1-5 - Matthew Andrews, Glenn Bruns, Hyoseop Lee:
Calculating the benefits of sponsored data for an individual content provider. 1-6 - Longji Sun, Qi Cheng:
Indoor multiple sound source localization using a novel data selection scheme. 1-6 - Fernando Paganini, Pablo Belzarena, Pablo Monzón:
Decision making in forward power markets with supply and demand uncertainty. 1-6 - Kenneth J. Kerpez, George Ginis:
Software-Defined Access Network (SDAN). 1-6 - Jin Tan, Dror Baron, Liyi Dai:
Signal estimation with low infinity-norm error by minimizing the mean p-norm error. 1-5 - Amir Hossein Harati Nejad Torbati, Joseph Picone, Marc Sobel:
A left-to-right HDP-HMM with HDPM emissions. 1-6 - Dimitris S. Papailiopoulos, Megasthenis Asteris, Alexandros G. Dimakis:
Combinatorial QPs via a low-dimensional subspace sampling. 1-3 - Haoshu Tian, Weinan E:
Fire sale in financial networks. 1-5 - Dionysios S. Kalogerias, Athina P. Petropulu:
RIP bounds for naively subsampled Scrambled Fourier sensing matrices. 1-6 - Ritesh Kolte, Ayfer Özgür, Haim H. Permuter:
Deterministic Z-interference channels with unidirectional partial cribbing. 1-6 - Shweta Sagari, Larry J. Greenstein, Wade Trappe:
Emulating co-channel interference in wireless networks using equivalent low-tap filters. 1-6 - Weihe Wang, Vijay G. Subramanian, Dongning Guo:
Low complexity scheduling algorithms for wireless networks with full duplex state exchange. 1-6 - Abouzar Ghavami, Koushik Kar:
Nonlinear pricing for social optimality of PEV charging under uncertain user preferences. 1-6 - Bahador Amiri, Hamid R. Sadjadpour:
A cross-layer metric for application-constrained MAC-aware capacity optimization. 1-6 - Arya Mazumdar, Olgica Milenkovic:
Smooth representation of rankings. 1-4 - Bo Lu, Javier Garcia-Frías:
Analog mappings for flexible rate transmission of Gaussian sources with side information. 1-6 - Victor M. Preciado, Michael Zargham, David Sun:
A convex framework to control spreading processes in directed networks. 1-6 - Pedro A. Forero:
Broadband underwater source localization via multitask learning. 1-6 - Mohammed Al-Qizwini, Hayder Radha:
Fast smooth rank approximation for tensor completion. 1-5 - Rafael F. Schaefer, Ashish Khisti:
Secure broadcasting of a common message with independent secret keys. 1-6 - Ankit Singh Rawat, Arya Mazumdar, Sriram Vishwanath:
On cooperative local repair in distributed storage. 1-5 - Yuri Levin-Schwartz, Vince D. Calhoun, Tülay Adali:
Data-driven fusion of EEG, functional and structural MRI: A comparison of two models. 1-6 - Saeed Hajizadeh, Mostafa Monemizadeh, Elham Bahmani:
State-dependent Z channel. 1-5 - Fatemeh Afghah, Abolfazl Razi, Ali Abedi:
Power allocation in parallel relay channels using a near-potential game theoretical approach. 1-6 - Alekh Agarwal, Sahand N. Negahban, Martin J. Wainwright:
Stochastic optimization and sparse statistical recovery: An optimal algorithm for high dimensions. 1-2 - Basel Alnajjab, Rick S. Blum:
After-attack performance of parameter estimation systems. 1-6 - Ayse Ünsal, Raymond Knopp:
Transmission of correlated Gaussian samples over a multiple-access channel. 1-6 - Venkat Chandrasekaran, Parikshit Shah:
Conic geometric programming. 1-4 - Azadeh Sheikholeslami, Hossein Pishro-Nik, Majid Ghaderi, Dennis Goeckel:
On the impact of dynamic jamming on end-to-end delay in linear wireless networks. 1-6 - Yunyun Yang, Yi Zhao, Boying Wu, Hongpeng Wang:
Unsupervised active contour model for multiphase inhomogeneous image segmentation. 1-5 - Hassan Naseri, Mário Costa, Visa Koivunen:
A generalized formulation for harmonic retrieval in correlated noise. 1-5 - Tadilo Endeshaw Bogale, Long Bao Le:
Pilot optimization and channel estimation for multiuser massive MIMO systems. 1-6 - Mahdi Zamanighomi, Zhengdao Wang, Konstantinos Slavakis, Georgios B. Giannakis:
Linear minimum mean-square error estimation based on high-dimensional data with missing values. 1-5 - Ain Ul Aisha, Lifeng Lai, Yingbin Liang:
On fading poisson channels with varying noise levels. 1-5 - Sanjay Karmakar, Mahesh K. Varanasi:
Capacity region of a class of strong MIMO IC. 1-6 - Timothy S. Phan, John K.-J. Li:
Propagation of uncertainty and analysis of signal-to-noise in nonlinear compliance estimations of an arterial system model. 1-6 - Jonathan Laney, Kelly Westlake, Sai Ma, Elizabeth Woytowicz, Tülay Adali:
Capturing subject variability in data driven fMRI analysis: A graph theoretical comparison. 1-6 - Hamid R. Sadjadpour:
A new design for Information Centric Networks. 1-6 - Sreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank:
New codes and inner bounds for exact repair in distributed storage systems. 1 - Chang Liu, Randall A. Berry:
Competition with licensed shared spectrum. 1-6 - Amir Ali Ahmadi, Anirudha Majumdar:
DSOS and SDSOS optimization: LP and SOCP-based alternatives to sum of squares optimization. 1-5 - Jiangfan Zhang, Rick S. Blum:
Distributed estimation in the presence of attacks for large scale sensor networks. 1-6 - Michael Zargham, Victor M. Preciado:
Worst-case scenarios for greedy, centrality-based network protection strategies. 1-6 - Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge H. Koymen, Narayan B. Mandayam:
Wireless backhaul node placement for small cell networks. 1-6 - Vu Nguyen Ha, Long Bao Le, Ngoc-Dung Dào:
Energy-efficient coordinated transmission for Cloud-RANs: Algorithm design and trade-off. 1-6 - Uwe D. Hanebeck:
Kernel-based deterministic blue-noise sampling of arbitrary probability density functions. 1-6 - Yunyun Yang, Yi Zhao, Boying Wu:
Improved segmentation model combining region and edge information for inhomogeneous images. 1-5 - Raghed El-Bardan, Swastik Brahma, Pramod K. Varshney:
Power control with jammer location uncertainty: A Game Theoretic perspective. 1-6 - Subhonmesh Bose, Dennice F. Gayme, K. Mani Chandy, Steven H. Low:
Solving quadratically constrained quadratic programs on acyclic graphs with application to optimal power flow. 1-5 - Wenwen Tu, Lifeng Lai:
On secret key generation from finite source observations. 1-6 - Marian Bica, Visa Koivunen:
Frequency Agile Generalized Multicarrier Radar. 1-6 - Jie Ren, John MacLaren Walsh:
Interactive communication for resource allocation. 1-6 - Mehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa:
Capacity analysis of a discrete-time bufferless timing channel. 1-6 - Mohamed Hassanin, Javier Garcia-Frías:
A hybrid digital-analog scheme for the Multiple Access Channel. 1-5 - Sami Akin:
Security in cognitive radio networks. 1-6 - Ahmad Chaddad:
Brain function evaluation using enhanced fNIRS signals extraction. 1-4 - Chee Wei Tan:
Wireless network optimization by Perron-Frobenius theory. 1-6 - Abhishek Mishra, Parv Venkitasubramaniam:
Encompassing anonymity in signaling games. 1-6 - Fan Yang, Xi Zhang:
Adaptive transmission of VoIP packets using TTI bundling in LTE uplink. 1-5 - Kuo-Lun Huang, Vincent C. Gaudet, Masoud Salehi:
Output decisions for stochastic LDPC decoders. 1-5 - Chiunlin Lim, Ning Wu, Ao Tang:
Congestion-free routing reconfiguration: Formulation and examples. 1-6 - Abolfazl Razi, Ali Abedi, Anthony Ephremides:
Delay minimization with channel-adaptive packetization policy for random data traffic. 1-6 - Larry Yueli Zhang, Peter Marbach:
Microscopic generative models for complex networks. 1-6 - Ahmad Chaddad, Pascal O. Zinn, Rivka R. Colen:
Brain tumor identification using Gaussian Mixture Model features and Decision Trees classifier. 1-4 - Jingbo Liu, Emmanuel Abbe:
Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. 1-6 - Lennart Gerdes, Lorenz Weiland, Maximilian Riemensberger, Wolfgang Utschick:
Optimal partial decode-and-forward rates for stochastically degraded Gaussian relay channels. 1-5 - Mina Karzand, Lizhong Zheng:
Achievability of nonlinear degrees of freedom in correlatively changing fading channels. 1-6 - Yao Tang, Ahmad Abu Al Haija, Mai Vu:
Exhaustive message splitting for partial decode-forward in single-source single-destination relay networks. 1-6 - Seok-Hwan Park, Osvaldo Simeone, Onur Sahin, Shlomo Shamai:
Performance evaluation of multiterminal backhaul compression for cloud radio access networks. 1-6 - Duy H. N. Nguyen, Long Bao Le, Tho Le-Ngoc:
Power scheduling for MSE minimization with peak and average power constraints. 1-5 - Bradford D. Boyle, John MacLaren Walsh, Steven Weber:
Distributed scalar quantizers for subband allocation. 1-6 - Yana Zhang, Cheng Yang, Qi Zhang, Pamela C. Cosman:
Primal sketch based adaptive perceptual JND model for digital watermarking. 1-6 - Justin Ziniel, Philip Schniter, Per Sederberg:
Binary linear classification and feature selection via generalized approximate message passing. 1-6 - Kevin G. Jamieson, Robert D. Nowak:
Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting. 1-6 - Se-Young Yun, Alexandre Proutière:
Distributed load balancing in heterogenous systems. 1-6 - S. Alireza Banani, Andrew W. Eckford, Raviraj S. Adve:
Required number of small-cells in heterogenous networks with non-uniform traffic distribution. 1-6 - Man Hon Cheung, Richard Southwell, Jianwei Huang:
Congestion-aware network selection and data offloading. 1-6 - Jayant Apte, Congduan Li, John MacLaren Walsh, Steven Weber:
Exact repair problems with multiple sources. 1-6 - Ehsan Karamad, Raviraj S. Adve:
Distributed power control subject to channel and interference estimation errors. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.