Abstract is missing.
- Applying chaos theory for runtime Hardware Trojan detectionHong Zhao, Kevin Kwiat, Charles A. Kamhoua, Manuel Rodriguez. 1-6 [doi]
- Spiking-based matrix computation by leveraging memristor crossbar arrayHai Helen Li, Chenchen Liu, Bonan Yan, Chaofei Yang, Linghao Song, Zheng Li, Yiran Chen, Weijie Zhu, Qing Wu, Hao Jiang. 1-4 [doi]
- Non-parametric feature generation for RF-fingerprinting on ZigBee devicesHiren Patel. 1-5 [doi]
- Probabilistic graphical models for multi-source fusion from text sourcesGeorgiy Levchuk, Erik Blasch. 1-10 [doi]
- Design and analysis of neuromemristive echo state networks with limited-precision synapsesColin Donahue, Cory E. Merkel, Qutaiba Saleh, Levs Dolgovs, Yu Kee Ooi, Dhireesha Kudithipudi, Bryant T. Wysocki. 1-6 [doi]
- Semi-autonomous management of multiple ad-hoc teams of UAVsRichard Loe, Christopher Maracchion, Andrew L. Drozd. 1-4 [doi]
- Ternary trust metric for mobile ad-hoc networksGustave Anderson, David J. Dorsey. 1-9 [doi]
- Robust collaborative learning by multi-agentsBalakumar Balasingam, Krishna R. Pattipati, Georgiy Levchuck, John C. Romano. 1-5 [doi]
- Exploring transfer function nonlinearity in echo state networksAlireza Goudarzi, Alireza Shabani, Darko Stefanovic. 1-8 [doi]
- Using computational swarm intelligence for real-time asset allocationJoshua Reynolds, Lauren A. Christopher, Russ Eberhart, Patrick Shaffer. 1-5 [doi]
- Risk sensitive optimal synchronization of coupled stochastic neural networks with chaotic phenomenaZiqian Liu. 1-7 [doi]
- A trace abstraction approach for host-based anomaly detectionSyed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Stephane Gagnon. 1-8 [doi]
- Neuromorphic encoding system design with chaos based CMOS analog neuronChenyuan Zhao, Wafi Danesh, Bryant T. Wysocki, Yang Yi. 1-6 [doi]
- Integrating complementary/contradictory information into fuzzy-based VoI determinationsSheng Miao, Robert J. Hammell II, Ziying Tang, Timothy Hanratty, John Dumer, John Richardson. 1-7 [doi]
- Highlights on analyzing one-way traffic using different toolsEray Balkanli, A. Nur Zincir-Heywood. 1-8 [doi]
- Evolving spiking neural networks: A novel growth algorithm corrects the teacherJ. David Schaffer. 1-8 [doi]
- An extendable multi-purpose 3D neuromorphic fabric using nanoscale memristorsHarika Manem, Karsten Beckmann, Min Xu, Robert Carroll, Robert E. Geer, Nathaniel C. Cady. 1-8 [doi]
- Memristive computational architecture of an echo state network for real-time speech-emotion recognitionQutaiba Saleh, Cory E. Merkel, Dhireesha Kudithipudi, Bryant T. Wysocki. 1-5 [doi]
- Framework for automatic signal classification techniques (FACT) for software defined radiosJithin Jagannath, Hanne M. Saarinen, Andrew L. Drozd. 1-7 [doi]
- Rigorous sensor resource management: Methodology and evolutionary optimizationBoris Kovalerchuk, Leonid I. Perlovsky. 1-8 [doi]
- Evaluating model drift in machine learning algorithmsKevin Nelson, George Corbin, Mark Anania, Matthew Kovacs, Jeremy Tobias, Misty K. Blowers. 1-8 [doi]
- Design of experiments based empirical models to support cognitive radio decision makingAshwin E. Amanna, Daniel Ali, David Gonzalez Fitch, Jeffrey H. Reed. 1-7 [doi]
- Dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environmentGopi Vinod Avvari, David Sidoti, Manisha Mishra, Lingyi Zhang, Bala Kishore Nadella, Krishna R. Pattipati, James A. Hansen. 1-6 [doi]
- Detecting Push to Talk radios using two tone intermodulation distortionMatthew Kane, Daniel Bennett. 1-7 [doi]
- Channel estimation in wireless OFDM systems using reservoir computingWafi Danesh, Chenyuan Zhao, Bryant T. Wysocki, Michael J. Medley, Ngwe Thawdar, Yang Yi. 1-5 [doi]
- Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approachLaurent Yamen Njilla, Niki Pissinou. 1-6 [doi]
- Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadataCarlo Schafer. 1-6 [doi]
- On the use of design diversity in fault tolerant and secure systems: A qualitative analysisManuel Rodriguez, Kevin A. Kwiat, Charles A. Kamhoua. 1-8 [doi]