


default search action
48th CISS 2014: Princeton University, NJ, USA
- 48th Annual Conference on Information Sciences and Systems, CISS 2014, Princeton, NJ, USA, March 19-21, 2014. IEEE 2014

- Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan:

Transmission of partitioning information over non-adaptive multi-access Boolean channel. 1-6 - Seok-Hwan Park, Osvaldo Simeone

, Onur Sahin, Shlomo Shamai
:
On remote radio head selection for the downlink of backhaul constrained network MIMO systems. 1-5 - Christopher Griffin

, George Kesidis:
Behavior in a shared resource game with cooperative, greedy, and vigilante players. 1-6 - Fatih Kocak, David J. Miller, George Kesidis:

Detecting anomalous latent classes in a batch of network traffic flows. 1-6 - Varun S. Jog, Venkat Anantharam:

Convex relative entropy decay in Markov chains. 1-6 - Milind Rao, Francisco Javier López-Martínez

, Andrea Goldsmith:
Statistics and system performance metrics for the Two Wave with Diffuse Power fading model. 1-6 - Anand Guruswamy, Rick S. Blum, Shalinee Kishore, Mark Bordogna:

Performance bounds for phase offset estimation in IEEE 1588 synchronization. 1-6 - Jayaprakash Rajasekharan, Visa Koivunen:

Production equilibrium in cooperative smart hybrid renewable minigrids. 1-6 - Antonios Argyriou

, Dimitrios Kosmanos, Leandros Tassiulas:
Optimizing interference cancellation in cooperative wireless networks with relay selection. 1-5 - Yicheng Lin, Wei Yu:

Joint spectrum partition and user association in multi-tier heterogeneous networks. 1-6 - Kliti Kodra, Maja Skataric, Zoran Gajic:

Controllability and observability grammians for balancing linear singularly perturbed systems. 1-6 - Tadesse Ghirmai:

Distributed particle filter using Gaussian approximated likelihood function. 1-5 - Shahadate Rezvy, Shahedur Rahman, Aboubaker Lasebae, Jonathan Loo

:
System capacity improvement by on request channel allocation in LTE cellular network. 1-5 - Jungseul Ok, Youngmi Jin, Jaeyoung Choi, Jinwoo Shin, Yung Yi:

Influence maximization over strategic diffusion in social networks. 1-5 - Omid Javidbakht, Parv Venkitasubramaniam

:
Rate allocation for Multihop routing in anonymous networking. 1-6 - Zhe Cui, Raviraj Adve:

Joint user association and resource allocation in small cell networks with backhaul constraints. 1-6 - Nicolò Michelusi

, Sahand Pirbadian, Mohamed Y. El-Naggar, Urbashi Mitra:
A model for electron transfer and cell energetics in bacterial cables. 1-6 - Yingxiang Yang, Narayan B. Mandayam:

Impact of end-user decisions on pricing in wireless networks. 1-6 - Brian Swenson, Soummya Kar

, João Manuel Freitas Xavier:
Strong convergence to mixed equilibria in fictitious play. 1-6 - Hessam Mahdavifar, Mostafa El-Khamy

, Jungwon Lee, Inyup Kang:
Techniques for polar coding over multiple access channels. 1-6 - Eran Simhon, David Starobinski:

Game-theoretic analysis of advance reservation services. 1-6 - Donald J. Bucci, Sayandeep Acharya

, Timothy J. Pleskac, Moshe Kam:
Subjective confidence and source reliability in soft data fusion. 1-6 - Lu Li, Javier Garcia-Frías

:
Hybrid analog-digital coding scheme based on parallel concatenation of linear random projections and LDGM codes. 1-6 - Weihao Gao, Yury Polyanskiy:

On the bit error rate of repeated error-correcting codes. 1-6 - Chiunlin Lim, Ki Suh Lee, Han Wang, Hakim Weatherspoon, Ao Tang:

Packet clustering introduced by routers: Modeling, analysis and experiments. 1-6 - Marc Reinhardt, Benjamin Noack, Uwe D. Hanebeck:

Reconstruction of joint covariances in networked linear systems. 1-6 - Andreas Winkelbauer, Gerald Matz:

Rate-information-optimal Gaussian channel output compression. 1-5 - Donald Richard Brown, Rui Wang, Soura Dasgupta:

Asymptotic oscillator tracking performance analysis for distributed massive MIMO systems. 1-6 - Arnob Ghosh, Saswati Sarkar:

Quality sensitive price competition in spectrum oligopoly over multiple locations. 1-6 - Christopher G. Brinton

, Mung Chiang:
Social learning networks: A brief survey. 1-6 - Hamdi Jamel Bouchech, Sebti Foufou

, Mongi A. Abidi:
Dynamic best spectral bands selection for face recognition. 1-6 - Mainak Chowdhury, Alexandros Manolakos, Andrea J. Goldsmith:

Design and performance of noncoherent massive SIMO systems. 1-6 - Michael A. Tope, Joel M. Morris:

SCHEME: Stochastically convergent heuristical Expectation Maximization estimation. 1-6 - Hadis Dashtestani, Paul Cotae

, Ira S. Moskowitz:
Joint optimal placement and energy allocation of underwater sensors in a tree topology. 1-6 - Ishanu Chattopadhyay

, Hod Lipson
:
Computing entropy rate of symbol sources & a distribution-free limit theorem. 1-6 - James R. Cruise, Richard J. Gibbens, Stan Zachary:

Optimal control of storage for arbitrage, with applications to energy systems. 1-6 - Mandoye Ndoye, John M. M. Anderson:

An Iterative ℓ1-regularized least absolute deviation algorithm for robust GPR Imaging. 1-5 - Maice Costa, Anthony Ephremides:

Energy efficiency in cooperative cognitive wireless networks. 1-6 - Hajar Mahdavi-Doost, Roy D. Yates:

Fading channels in energy-harvesting receivers. 1-6 - Yi Li, Gozde Ozcan, Mustafa Cenk Gursoy, Senem Velipasalar:

Energy efficiency of hybrid-ARQ systems under QoS constraints. 1-6 - Bo Li, Athina P. Petropulu:

Efficient target estimation in distributed MIMO radar via the ADMM. 1-5 - Xiaowen Gong, Xu Chen, Junshan Zhang:

Social group utility maximization in mobile networks: From altruistic to malicious behavior. 1-6 - Zhen Chen, Kai Zhu, Lei Ying:

Detecting multiple information sources in networks under the SIR model. 1-4 - Sébastien Bubeck, Che-Yu Liu:

Prior-free and prior-dependent regret bounds for Thompson Sampling. 1-9 - Wanrong Tang

, Ying Jun Zhang
:
Online electric vehicle charging control with multistage stochastic programming. 1-6 - A. Bolognino, Umberto Spagnolini

:
Cooperative estimation for under-determined linear systems. 1-5 - Matthew Andrews, Glenn Bruns, Hyoseop Lee:

Calculating the benefits of sponsored data for an individual content provider. 1-6 - Longji Sun, Qi Cheng

:
Indoor multiple sound source localization using a novel data selection scheme. 1-6 - Fernando Paganini, Pablo Belzarena, Pablo Monzón

:
Decision making in forward power markets with supply and demand uncertainty. 1-6 - Kenneth J. Kerpez, George Ginis:

Software-Defined Access Network (SDAN). 1-6 - Jin Tan, Dror Baron

, Liyi Dai:
Signal estimation with low infinity-norm error by minimizing the mean p-norm error. 1-5 - Amir Hossein Harati Nejad Torbati, Joseph Picone, Marc Sobel:

A left-to-right HDP-HMM with HDPM emissions. 1-6 - Dimitris S. Papailiopoulos, Megasthenis Asteris, Alexandros G. Dimakis:

Combinatorial QPs via a low-dimensional subspace sampling. 1-3 - Haoshu Tian, Weinan E:

Fire sale in financial networks. 1-5 - Dionysios S. Kalogerias, Athina P. Petropulu:

RIP bounds for naively subsampled Scrambled Fourier sensing matrices. 1-6 - Ritesh Kolte

, Ayfer Özgür
, Haim H. Permuter
:
Deterministic Z-interference channels with unidirectional partial cribbing. 1-6 - Shweta Sagari, Larry J. Greenstein, Wade Trappe:

Emulating co-channel interference in wireless networks using equivalent low-tap filters. 1-6 - Weihe Wang, Vijay G. Subramanian

, Dongning Guo:
Low complexity scheduling algorithms for wireless networks with full duplex state exchange. 1-6 - Abouzar Ghavami, Koushik Kar:

Nonlinear pricing for social optimality of PEV charging under uncertain user preferences. 1-6 - Bahador Amiri, Hamid R. Sadjadpour:

A cross-layer metric for application-constrained MAC-aware capacity optimization. 1-6 - Arya Mazumdar, Olgica Milenkovic:

Smooth representation of rankings. 1-4 - Bo Lu, Javier Garcia-Frías

:
Analog mappings for flexible rate transmission of Gaussian sources with side information. 1-6 - Victor M. Preciado, Michael Zargham, David Sun:

A convex framework to control spreading processes in directed networks. 1-6 - Pedro A. Forero:

Broadband underwater source localization via multitask learning. 1-6 - Mohammed Al-Qizwini, Hayder Radha:

Fast smooth rank approximation for tensor completion. 1-5 - Rafael F. Schaefer, Ashish Khisti:

Secure broadcasting of a common message with independent secret keys. 1-6 - Ankit Singh Rawat

, Arya Mazumdar, Sriram Vishwanath:
On cooperative local repair in distributed storage. 1-5 - Yuri Levin-Schwartz, Vince D. Calhoun

, Tülay Adali:
Data-driven fusion of EEG, functional and structural MRI: A comparison of two models. 1-6 - Saeed Hajizadeh, Mostafa Monemizadeh, Elham Bahmani

:
State-dependent Z channel. 1-5 - Fatemeh Afghah, Abolfazl Razi, Ali Abedi

:
Power allocation in parallel relay channels using a near-potential game theoretical approach. 1-6 - Alekh Agarwal, Sahand N. Negahban, Martin J. Wainwright

:
Stochastic optimization and sparse statistical recovery: An optimal algorithm for high dimensions. 1-2 - Basel Alnajjab, Rick S. Blum:

After-attack performance of parameter estimation systems. 1-6 - Ayse Ünsal, Raymond Knopp:

Transmission of correlated Gaussian samples over a multiple-access channel. 1-6 - Venkat Chandrasekaran, Parikshit Shah:

Conic geometric programming. 1-4 - Azadeh Sheikholeslami, Hossein Pishro-Nik, Majid Ghaderi, Dennis Goeckel:

On the impact of dynamic jamming on end-to-end delay in linear wireless networks. 1-6 - Yunyun Yang, Yi Zhao, Boying Wu, Hongpeng Wang:

Unsupervised active contour model for multiphase inhomogeneous image segmentation. 1-5 - Hassan Naseri, Mário Costa, Visa Koivunen:

A generalized formulation for harmonic retrieval in correlated noise. 1-5 - Tadilo Endeshaw Bogale, Long Bao Le

:
Pilot optimization and channel estimation for multiuser massive MIMO systems. 1-6 - Mahdi Zamanighomi, Zhengdao Wang

, Konstantinos Slavakis, Georgios B. Giannakis
:
Linear minimum mean-square error estimation based on high-dimensional data with missing values. 1-5 - Ain Ul Aisha, Lifeng Lai, Yingbin Liang:

On fading poisson channels with varying noise levels. 1-5 - Sanjay Karmakar, Mahesh K. Varanasi:

Capacity region of a class of strong MIMO IC. 1-6 - Timothy S. Phan, John K.-J. Li:

Propagation of uncertainty and analysis of signal-to-noise in nonlinear compliance estimations of an arterial system model. 1-6 - Jonathan Laney, Kelly Westlake

, Sai Ma, Elizabeth Woytowicz, Tülay Adali:
Capturing subject variability in data driven fMRI analysis: A graph theoretical comparison. 1-6 - Hamid R. Sadjadpour:

A new design for Information Centric Networks. 1-6 - Sreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank:

New codes and inner bounds for exact repair in distributed storage systems. 1 - Chang Liu, Randall A. Berry

:
Competition with licensed shared spectrum. 1-6 - Amir Ali Ahmadi, Anirudha Majumdar:

DSOS and SDSOS optimization: LP and SOCP-based alternatives to sum of squares optimization. 1-5 - Jiangfan Zhang, Rick S. Blum:

Distributed estimation in the presence of attacks for large scale sensor networks. 1-6 - Michael Zargham, Victor M. Preciado:

Worst-case scenarios for greedy, centrality-based network protection strategies. 1-6 - Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge H. Koymen, Narayan B. Mandayam:

Wireless backhaul node placement for small cell networks. 1-6 - Vu Nguyen Ha

, Long Bao Le
, Ngoc-Dung Dào:
Energy-efficient coordinated transmission for Cloud-RANs: Algorithm design and trade-off. 1-6 - Uwe D. Hanebeck:

Kernel-based deterministic blue-noise sampling of arbitrary probability density functions. 1-6 - Yunyun Yang, Yi Zhao, Boying Wu:

Improved segmentation model combining region and edge information for inhomogeneous images. 1-5 - Raghed El-Bardan, Swastik Brahma, Pramod K. Varshney:

Power control with jammer location uncertainty: A Game Theoretic perspective. 1-6 - Subhonmesh Bose, Dennice F. Gayme, K. Mani Chandy, Steven H. Low:

Solving quadratically constrained quadratic programs on acyclic graphs with application to optimal power flow. 1-5 - Wenwen Tu, Lifeng Lai:

On secret key generation from finite source observations. 1-6 - Marian Bica

, Visa Koivunen:
Frequency Agile Generalized Multicarrier Radar. 1-6 - Jie Ren, John MacLaren Walsh:

Interactive communication for resource allocation. 1-6 - Mehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa:

Capacity analysis of a discrete-time bufferless timing channel. 1-6 - Mohamed Hassanin, Javier Garcia-Frías

:
A hybrid digital-analog scheme for the Multiple Access Channel. 1-5 - Sami Akin:

Security in cognitive radio networks. 1-6 - Ahmad Chaddad

:
Brain function evaluation using enhanced fNIRS signals extraction. 1-4 - Chee Wei Tan

:
Wireless network optimization by Perron-Frobenius theory. 1-6 - Abhishek Mishra, Parv Venkitasubramaniam

:
Encompassing anonymity in signaling games. 1-6 - Fan Yang, Xi Zhang:

Adaptive transmission of VoIP packets using TTI bundling in LTE uplink. 1-5 - Kuo-Lun Huang, Vincent C. Gaudet

, Masoud Salehi
:
Output decisions for stochastic LDPC decoders. 1-5 - Chiunlin Lim, Ning Wu, Ao Tang:

Congestion-free routing reconfiguration: Formulation and examples. 1-6 - Abolfazl Razi, Ali Abedi, Anthony Ephremides:

Delay minimization with channel-adaptive packetization policy for random data traffic. 1-6 - Larry Yueli Zhang

, Peter Marbach:
Microscopic generative models for complex networks. 1-6 - Ahmad Chaddad

, Pascal O. Zinn
, Rivka R. Colen:
Brain tumor identification using Gaussian Mixture Model features and Decision Trees classifier. 1-4 - Jingbo Liu, Emmanuel Abbe:

Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. 1-6 - Lennart Gerdes, Lorenz Weiland, Maximilian Riemensberger, Wolfgang Utschick

:
Optimal partial decode-and-forward rates for stochastically degraded Gaussian relay channels. 1-5 - Mina Karzand, Lizhong Zheng:

Achievability of nonlinear degrees of freedom in correlatively changing fading channels. 1-6 - Yao Tang, Ahmad Abu Al Haija, Mai Vu:

Exhaustive message splitting for partial decode-forward in single-source single-destination relay networks. 1-6 - Seok-Hwan Park, Osvaldo Simeone

, Onur Sahin, Shlomo Shamai
:
Performance evaluation of multiterminal backhaul compression for cloud radio access networks. 1-6 - Duy H. N. Nguyen, Long Bao Le

, Tho Le-Ngoc:
Power scheduling for MSE minimization with peak and average power constraints. 1-5 - Bradford D. Boyle, John MacLaren Walsh, Steven Weber:

Distributed scalar quantizers for subband allocation. 1-6 - Yana Zhang, Cheng Yang, Qi Zhang, Pamela C. Cosman

:
Primal sketch based adaptive perceptual JND model for digital watermarking. 1-6 - Justin Ziniel, Philip Schniter, Per Sederberg:

Binary linear classification and feature selection via generalized approximate message passing. 1-6 - Kevin G. Jamieson, Robert D. Nowak:

Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting. 1-6 - Se-Young Yun, Alexandre Proutière:

Distributed load balancing in heterogenous systems. 1-6 - S. Alireza Banani, Andrew W. Eckford, Raviraj S. Adve:

Required number of small-cells in heterogenous networks with non-uniform traffic distribution. 1-6 - Man Hon Cheung, Richard Southwell, Jianwei Huang:

Congestion-aware network selection and data offloading. 1-6 - Jayant Apte, Congduan Li, John MacLaren Walsh, Steven Weber:

Exact repair problems with multiple sources. 1-6 - Ehsan Karamad, Raviraj S. Adve:

Distributed power control subject to channel and interference estimation errors. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














