


default search action
53rd CISS 2019: Baltimore, MD, USA
- 53rd Annual Conference on Information Sciences and Systems, CISS 2019, Baltimore, MD, USA, March 20-22, 2019. IEEE 2019, ISBN 978-1-7281-1151-3

- Robert A. Baxter, William B. Levy:

Multilayered Neural Networks With Sparse, Data-driven Connectivity and Balanced Information and Energy Efficiency. 1-6 - Andy S. Peng, Ahmet Turkmen, Brian Eickhoff, Mark Finta, Paul Gerads:

Design of a Ground Sampling Distance Graphical User Interface for an Unmanned Aerial Vehicle System. 1-6 - Thibaud Tonnellier

, Adam Cavatassi, Warren J. Gross:
Length-Compatible Polar Codes: A Survey : (Invited Paper). 1-6 - Syed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar:

Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication. 1-6 - Ananth Narayan Samudrala, M. Hadi Amini, Soummya Kar

, Rick S. Blum
:
Optimal Sensor Placement for Topology Identification in Smart Power Grids. 1-6 - Daiki Mitsumoto, Takeshi Hori, Shigeki Sagayama, Hidenori Yamasue, Keiho Owada, Masaki Kojima

, Keiko Ochi
, Nobutaka Ono
:
Autism Spectrum Disorder Discrimination Based on Voice Activities Related to Fillers and Laughter. 1-6 - Theodoros Mamalis, Subhonmesh Bose, Lav R. Varshney:

Business-to-Peer Carsharing Systems with Electric Vehicles. 1-6 - Haider Al-Lawati

, Nuwan S. Ferdinand, Stark C. Draper
:
Anytime Minibatch with Stale Gradients : (Invited Paper). 1-5 - Li Li, Milos Doroslovacki, Murray H. Loew:

Discriminant Analysis Deep Neural Networks. 1-6 - Debarnab Mitra, Himanshu Asnani, Sibi Raj B. Pillai:

On the Sum-capacity of Compound MAC Models with Distributed CSI and Unknown Fading Statistics. 1-6 - Xiaowei Song

:
An intuitive and most efficient Ll-norm principal component analysis algorithm for big data. 1-4 - Carsten H. Botts:

A Note on the Limiting Properties of the Extended Kalman Filter's Estimates : Invited Presentation. 1-6 - Asia Mason, Michel Reece, Gian Claude, Willie L. Thompson, Kevin T. Kornegay

:
Analysis of Wireless Signature Feature Sets for Commercial IoT Devices : Invited Presentation. 1-4 - Matsuto Hori, Christoph M. Wilk, Shigeki Sagayama:

Piano Practice Evaluation and Visualization by HMM for Arbitrary Jumps and Mistakes. 1-5 - Shunsuke Horii, Tota Suko:

A Note on the Estimation Method of Intervention Effects based on Statistical Decision Theory. 1-6 - Massieh Kordi Boroujeny

, Brian L. Mark, Yariv Ephraim:
Tail-Limited Phase-Type Burstiness Bounds for Network Traffic. 1-6 - Huber Nieto-Chaupis:

The Feynman-Kac Formula to Estimate the Very Beginning of the Diabetic Nephropathy. 1-4 - Marius Arvinte

, Marcos Tavares, Dragan Samardzija:
Beam Management in 5G NR using Geolocation Side Information. 1-6 - K. Bendjilali, Fethi Belkhouche:

On the problem of weight factors and functions in fusion applications. 1-6 - Khaled Alshehri

, Mariola Ndrio, Subhonmesh Bose, Tamer Basar:
The Impact of Aggregating Distributed Energy Resources on Electricity Market Efficiency. 1-6 - Harry Shaw, Nagarajan Pattabiraman, Deborah Preston, Tatiana Ammosova

, Yuri Obukhov, Sergei Nekhai, Ajit Kumar:
Information theory and signal processing methodology to identify nucleic acid-protein binding sequences in RNA-protein interactions. 1-6 - Dimche Kostadinov, Behrooz Razeghi

, Shideh Rezaeifar, Slava Voloshynovskiy
:
Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features. 1-6 - S. Andrew Lanham, Travis C. Cuvelier, Corey I. Ostrove, Brian R. La Cour

, Granville E. Ott, Robert W. Heath Jr.
:
A Noncoherent Space-Time Code from Quantum Error Correction. 1-6 - Yingjie Bi, Ao Tang:

Uncertainty-Aware optimization for Network Provisioning and Routing. 1-6 - Arun Asokan Nair, Trac D. Tran, Austin Reiter, Muyinatu A. Lediju Bell:

A Generative Adversarial Neural Network for Beamforming Ultrasound Images Invited Presentation. 1-6 - Karelia Pena-Pena

, Gonzalo R. Arce
:
Channel Coding Optimization for Visually Pleasant QR Codes : Invited Presentation. 1-4 - Samer S. Saab, Khaled Kamal Saab, Samer S. Saab:

Shuffled Linear Regression with Erroneous Observations. 1-6 - Qasem Abu Al-Haija

, Swastik Brahma:
Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components. 1-6 - Botong Qiu, Yida Lin, Ebuka S. Arinze, Arlene Chiu, Lulin Li, Susanna M. Thon:

Controlling spectral selectivity in optoelectronics via photonic band engineering in absorbing media. 1-5 - Andrey Garnaev, Wade Trappe

:
A Prospect Theoretical Extension of a Communication Game Under Jamming. 1-6 - Bryce Simmons, Pasham Adwani, Huong Pham, Yazeed Alhuthaifi, Artur Wolek:

Training a Remote-Control Car to Autonomously Lane-Follow using End-to-End Neural Networks. 1-6 - Shahab Bahrami, Yu Christine Chen, Vincent W. S. Wong:

An Online Algorithm for Data Center Demand Response. 1-6 - Quan Huu Cap

, Hiroki Tani, Hiroyuki Uga, Satoshi Kagiwada
, Hitoshi Iyatomi
:
Super-Resolution for Practical Automated Plant Disease Diagnosis System. 1-6 - Yanliang Zhou, Hua Sun, Shengli Fu:

On the Randomness Cost of Linear Secure Computation : (Invited Presentation). 1-6 - Alireza Sheikh, Alexandre Graell i Amat

, Gianluigi Liva:
Binary Message Passing Decoding of Product Codes Based on Generalized Minimum Distance Decoding : (Invited Paper). 1-5 - Gaspar Tognetti, Jonah Sengupta, Philippe O. Pouliquen, Andreas G. Andreou

:
Characterization of a pseudo-DRAM Crossbar Computational Memory Array in 55nm CMOS : (Invited Paper). 1-5 - Derek Allman, Fabrizio Assis, Jonathan Chrispin, Muyinatu A. Lediju Bell:

Deep learning to detect catheter tips in vivo during photoacoustic-guided catheter interventions : Invited Presentation. 1-3 - Luoluo Liu, Sang Peter Chin, Trac D. Tran:

Reducing Sampling Ratios and Increasing Number of Estimates Improve Bagging in Sparse Regression. 1-5 - Zisheng Wang, Rick S. Blum

:
Topology Attack Detection in Natural Gas Delivery Networks. 1-6 - Dimitris Perdios, Adrien Besson, Florian Martinez, Manuel Vonlanthen, Marcel Arditi, Jean-Philippe Thiran

:
On Problem Formulation, Efficient Modeling and Deep Neural Networks for High-Quality Ultrasound Imaging : Invited Presentation. 1-4 - Chunying Jia, Mohammad A. B. S. Akhonda, Qunfang Long, Vince D. Calhoun

, Shari Waldstein, Tülay Adali:
C-ICT for Discovery of Multiple Associations in Multimodal Imaging Data: Application to Fusion of fMRI and DTI Data. 1-5 - Peter O. Taiwo

, Arlene A. Cole-Rhodes
:
Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited Presentation. 1-6 - Zeyu Zhou, Bruce E. Hajek:

Per-Flow Cardinality Estimation Based On Virtual LogLog Sketching. 1-6 - Jessica Maghakian, Joshua Comden, Zhenhua Liu:

Online optimization in the Non-Stationary Cloud: Change Point Detection for Resource Provisioning (Invited Paper). 1-6 - Huber Nieto-Chaupis:

Bacteria Nano Communications Described by a Machine Learning Theory Based on the Feynman Path Integral. 1-4 - Hassan Yazdani, Azadeh Vosoughi:

On the Spectrum Sensing, Beam Selection and Power Allocation in Cognitive Radio Networks Using Reconfigurable Antennas. 1-7 - Sebastian Cammerer, Xiaojie Wang, Yingyan Ma, Stephan ten Brink:

Spatially Coupled LDPC Codes and the Multiple Access Channel. 1-6 - Kechao Cai, John C. S. Lui:

An Online Learning Multi-path Selection Framework for Multi-path Transmission Protocols. 1-2 - Nicolás Rodríguez, Pedro Julián

, Eduardo E. Paolini
:
A Simplicial Piecewise Linear Approach for Efficient Hardware Realization of Neural Networks : (Invited Presentation). 1-3 - Daniel Salmond:

Blind estimation of wireless network topology and throughput. 1-6 - Di Wang, Jinhui Xu, Yang He:

Estimating Sparse Covariance Matrix Under Differential Privacy via Thresholding. 1-5 - Keith Hermiston:

The Largest Critical Sets of Latin Squares. 1-6 - Ali Koochakzadeh, Piya Pal:

On flattening of symmetric tensors and identification of latent factors. 1-2 - W. Steven Gray, G. S. Venkatesh, Luis A. Duffaut Espinosa:

Discrete-time Chen Series for Time Discretization and Machine Learning. 1-6 - Teresa M. Lebair, Jinglai Shen:

Minimax Lower Bound of k-Monotone Estimation in the Sup-norm. 1-6 - Philippe Jacquod, Laurent Pagnier:

Optimal placement of inertia and primary control in high voltage power grids. 1-6 - Jiangnan Cheng

, Shih-Hao Tseng, Ao Tang:
Worst-Case Latency Performance Of Load Balancing Through Distributed Waterfilling Algorithm. 1-6 - Rajeev Sahay, Rehana Mahfuz, Aly El Gamal:

Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach. 1-6 - Hailu Belay Kassa, Kevin T. Kornegay

, Ebrima N. Ceesay:
Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm. 1-5 - Sujay Bhatt, Alec Koppel, Vikram Krishnamurthy:

Policy Gradient using Weak Derivatives for Reinforcement Learning. 1-3 - Bishwarup Mondal, Victor Sergeev, Avik Sengupta, Gregory Ermolaev

, Alexei Davydov, Eddy Kwon, Seunghee Han, Apostolos Papathanassiou:
MU-MIMO and CSI Feedback Performance of NR/LTE. 1-6 - Afrooz Jalilzadeh, Uday V. Shanbhag:

Smoothed First-order Algorithms for Expectation-valued Constrained Problems. 1 - John Franklin, A. Brinton Cooper:

Compressive Sensing for Indoor Millimeter Wave Massive MIMO : (Invited Paper). 1-6 - Mariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías

:
Non-Linear Rate Compatible Modulation : Invited Presentation. 1-5 - Mohamed A. Suliman, Wei Dai:

Exact Three-Dimensional Estimation in Blind Super-Resolution via Convex Optimization. 1-9 - Hossein Valavi, Peter J. Ramadge:

Multi-dataset Low-rank Matrix Factorization. 1-5 - Rebecca Chen

, Abhinav B. Das, Lav R. Varshney
:
Registration for Image-Based Transcriptomics: Parametric Signal Features and Multivariate Information Measures. 1-6 - Henri Hentila, Visa Koivunen, H. Vincent Poor, Rick S. Blum

:
Secure Key Generation for Distributed Inference in IoT Invited Presentation. 1-6 - Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:

Asymptotic Limits of Privacy in Bayesian Time Series Matching. 1-6 - Shigeichi Hirasawa, Hideki Yagi, Manabu Kobayashi, Masao Kasahara:

Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two. 1-6 - Ali N. Akansu, Anqi Xiong:

Design of Eigenportfolios for US Equities Using Exponential Correlation Model. 1-5 - Liyuan Song, Qin Huang, Jiayi Rui:

Construction and Analysis for Minimum Storage Regenerating Codes Based Parity-Check Matrices : Invited Presentation. 1-6 - Kate D. Fischl, Adam B. Cellon, Terrence C. Stewart, Timothy K. Horiuchi

, Andreas G. Andreou
:
Socio-Emotional Robot with Distributed Multi-Platform Neuromorphic Processing : (Invited Presentation). 1-6 - Kaiqing Zhang, Alec Koppel, Hao Zhu, Tamer Basar:

Policy Search in Infinite-Horizon Discounted Reinforcement Learning: Advances through Connections to Non-Convex Optimization : Invited Presentation. 1-3 - Dustin Scheinost

:
Motion correction for fetal functional magnetic resonance imaging. 1 - Pan Zhong, Zhengdao Wang

:
Characterization and Design of Generalized Convolutional Neural Network. 1-6 - Shuyu Liu, Yingze Hou, James C. Spall:

Distribution Estimation for Stochastic Approximation in Finite Samples Using A Surrogate Stochastic Differential Equation Method. 1-6 - Shafkat Islam

, Abolfazl Razi:
A Path Planning Algorithm for Collective Monitoring Using Autonomous Drones. 1-6 - Mariem Ben Fadhel, Kofi Nyarko:

GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics. 1-5 - Willie L. Thompson, Michael F. Talley:

Deep Learning for IoT Communications : Invited Presentation. 1-4 - Sima Azizi, Arash Komaee:

Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength. 1-6 - Robert J. Thompson, Xiaohua Li:

Integrating Volterra Series Model and Deep Neural Networks to Equalize Nonlinear Power Amplifiers. 1-6 - Fatemeh Hosseinigoki, Oliver Kosut:

Capacity of Gaussian Arbitrarily-Varying Fading Channels. 1-6 - Christopher Ratto, Waseem Malik, Iman Kabir, Robert Newsome:

Cost-Constrained Classifier Cascade using Sparse Probit Models : Invited Presentation. 1-6 - Ziyu Liu, James C. Spall:

Error Estimation for the Particle Filter. 1-6 - Maryam Eslami Rasekh, Mohammed Abdelghany, Upamanyu Madhow, Mark J. W. Rodwell:

Phase noise analysis for mmwave massive MIMO: a design framework for scaling via tiled architectures. 1-6 - Jay Jemal, Kevin T. Kornegay:

Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation. 1-4 - Anqi Xiong, Ali N. Akansu:

Performance Comparison of Minimum Variance, Market and Eigen Portfolios for US Equities. 1-5 - You Li, Christoph M. Wilk, Takeshi Hori, Shigeki Sagayama:

Automatic Piano Reduction of Orchestral Music Based on Musical Entropy. 1-5 - Brian Hu

, Salman Khan, Ernst Niebur, Bryan P. Tripp:
Figure-ground representation in deep neural networks. 1-6 - Huber Nieto-Chaupis:

Formalisms of Quantization in High Intensity Fields: Quantum Mechanics Meets Classical Electrodynamics. 1-4 - Sudeshna Dasgupta, Smita Sadhu, Tapan Kumar Ghoshal:

Disturbance Observers for Nonlinear MIMO Systems- An Alternative Design Approach. 1-6 - Sushanth G. Sathyanarayana, Bo Ning, Song Hu, John A. Hossack:

Comparison of dictionary learning methods for reverberation suppression in photoacoustic microscopy : Invited presentation. 1-4 - Tharindu Adikari, Stark C. Draper

:
Efficient learning of neighbor representations for boundary trees and forests. 1-6 - Mohammad A. B. S. Akhonda, Qunfang Long, Suchita Bhinge, Vince D. Calhoun

, Tülay Adali:
Disjoint Subspaces for Common and Distinct Component Analysis: Application to Task FMRI Data. 1-6 - Adam Blakney, Jingyi Zhu:

A Comparison of the Finite Difference and Simultaneous Perturbation Gradient Estimation Methods with Noisy Function Evaluations. 1-6 - Sota Akaishi, Ryuya Uda:

Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence. 1-6 - Wondimu K. Zegeye, Farzad Moazzami:

Authentication of IoT Devices for WiFi Connectivity from the Cloud. 1-6 - Alexandru Dominic Git, Balázs Matuz, Fabian Steiner:

Protograph-Based LDPC Code Design for Probabilistic Shaping with On-Off Keying. 1-6 - Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum

:
Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation. 1-6 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

Statistical QoS-Driven Energy-Efficiency optimization for URLLC Over 5G Mobile Wireless Networks in the Finite Blocklength Regime. 1-6 - Wei Zhou, Michael Lentmaier:

Improving Short-Length LDPC Codes with a CRC and Iterative Ordered Statistic Decoding : (Invited Paper). 1-6 - Jonah Sengupta, Gaspar Tognetti, Philippe O. Pouliquen, Andreas G. Andreou

:
Multilevel Storage Cell Characterization and Behavior Modeling of a Crossbar Computational Array in ESF3 Flash Technology : (Invited Paper). 1-5 - Annan Dong, Osvaldo Simeone, Alexander M. Haimovich, Jason A. Dabin:

Sparse Dictionary Learning and Per-source Filtering for Blind Radio Source Separation. 1-5 - Lin Yang, Mohammad Hassan Hajiesmaili, Wing Shing Wong:

Online Linear Programming with Uncertain Constraints : (Invited Paper). 1-6 - Hein Tun, Sergey Lupin, Ko Ko Oo, Myat Min Oo:

Petri Net Approach for Estimation the Information Systems Security Level in Any Logic Environment. 1-6 - Mariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías

:
Discretized Density Evolution for Rate Compatible Modulation : Invited Presentation. 1-6 - Shahadate Rezvy, Yuan Luo, Miltos Petridis, Aboubaker Lasebae, Tahmina Zebin

:
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














