Abstract is missing.
- An Adaptive Bacterial Foraging Algorithm for color image enhancementOm Prakash Verma, Rishi Raj Chopra, Abhinav Gupta. 1-6 [doi]
- One sample per person facial recognition with local binary patterns and image sub-gridsGordon Stein, Yuan Li, Yin Wang. 7-11 [doi]
- Signal processing of time domain load signals of CNC lathe based on improved Neighbor BlockZhen Li, Fei Chen, Jialong He, Mingmin Zhu, Binbin Xu. 12-17 [doi]
- A Dynamic Time Warping algorithm for industrial robot motion analysisBenjamin Johnen, Bernd Kuhlenkötter. 18-23 [doi]
- Fidelity loss in distribution-preserving anonymization and histogram equalizationLav R. Varshney, Kush R. Varshney. 24-29 [doi]
- Battle of opinions over evolving social networksIrem Koprulu, Yoora Kim, Ness B. Shroff. 30-35 [doi]
- Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless networkAhmed A. Alabdel Abass, Mohammad Hajimirsadeghi, Narayan B. Mandayam, Zoran Gajic. 36-41 [doi]
- Optimal energy allocation and storage control for distributed estimation with sensor collaborationSijia Liu, Yanzhi Wang, Makan Fardad, Pramod K. Varshney. 42-47 [doi]
- Design and performance evaluation of an energy efficient routing protocol for Wireless Sensor NetworksSeifemichael B. Amsalu, Wondimu K. Zegeye, Dereje Hailemariam, Yacob Astatke. 48-53 [doi]
- Towards optimal PMU placement against data integrity attacks in smart gridQingyu Yang, Rui Min, Dou An, Wei Yu 0002, Xinyu Yang. 54-58 [doi]
- Performance of pattern diversity in reconfigurable antenna arraysGeorge D. Sworo, Kapil R. Dandekar, Moshe Kam. 59-63 [doi]
- Statistical analysis of measured ground penetrating radar dataAnirudh M. Rangaswamy, Lorenzo Lo Monte, Michael C. Wicks. 64-69 [doi]
- Doubly opportunistic beamforming for downlink multiuser MIMOJunyoung Nam, Young-Jo Ko. 70-75 [doi]
- Energy-efficient power control with finite discrete inputs under quality of service constraintsGozde Ozcan, Mustafa Cenk Gursoy. 76-81 [doi]
- Investigation of RLS beamforming algorithm interms of energy efficiencyHailu Belay Kassa, Tezera Yitbarek Chernet, Estifanos Yohannes, Dereje Hailemariam, Yacob Astatke, Farzad Moazzami, Wondimu K. Zegeye. 82-86 [doi]
- On the LLR criterion based shortening design for LDPC codesHui Wang, Qingchun Chen, Yong Zhang. 87-92 [doi]
- Triggering wave-like convergence of tail-biting spatially coupled LDPC codesSebastian Cammerer, Vahid Aref, Laurent Schmalen, Stephan ten Brink. 93-98 [doi]
- Non-linear satellite channel equalization based on a low complexity Echo State NetworkM. Bauduin, Serge Massar, François Horlin. 99-104 [doi]
- Vector Gaussian multi-decoder rate-distortion: Trace constraintsSinem Unal, Aaron B. Wagner. 105-110 [doi]
- Channel equalization techniques for non-volatile memristor memoriesRawan Naous, Mohammed Affan Zidan, Ahmed Sultan, Khaled Nabil Salama. 111-116 [doi]
- Differential privacy in networked data collectionOmid Javidbakht, Parv Venkitasubramaniam. 117-122 [doi]
- Privacy-preserving source separation for distributed data using independent component analysisHafiz Imtiaz, Rogers F. Silva, Bradley T. Baker, Sergey M. Plis, Anand D. Sarwate, Vince D. Calhoun. 123-127 [doi]
- Differentially private multi-party computationPeter Kairouz, Sewoong Oh, Pramod Viswanath. 128-132 [doi]
- Algorithmic advances in anonymous communication over networksGiulia C. Fanti, Pramod Viswanath. 133-138 [doi]
- Store or sell? A threshold price policy for revenue maximization in windfarms with on-site storageZamiyad Dar, Koushik Kar, Joe H. Chow. 139-144 [doi]
- Optimal detection of influential spreaders in online social networksChee-Wei Tan, Pei-Duo Yu, Chun-Kiu Lai, Wenyi Zhang, Hung-Lin Fu. 145-150 [doi]
- Interdependency analysis of communications and control in networked cyber physical systems: An entropy frameworkHusheng Li. 151-156 [doi]
- Wi-Fi-LAA coexistence: Design and evaluation of Listen Before Talk for LAAAnanth V. Kini, Loïc Canonne-Velasquez, Mohsen Hosseinian, Marian Rudolf, Janet Stern-Berkowitz. 157-162 [doi]
- Nonlinear structural equation models for network topology inferenceYanning Shen, Brian Baingana, Georgios B. Giannakis. 163-168 [doi]
- Decay of correlation in network flow problemsPatrick Rebeschini, Sekhar Tatikonda. 169-174 [doi]
- Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sourcesChong Huang, Lalitha Sankar. 175-180 [doi]
- Advanced persistent threats: Behind the scenesMartin Ussath, David Jaeger, Feng Cheng 0002, Christoph Meinel. 181-186 [doi]
- Privacy-aware stochastic control with a "snoopy" adversary: A game-theoretic approachAbhishek Gupta. 187-191 [doi]
- Sequential aggregate authentication codes with information theoretic securityShinichiro Tomita, Yohei Watanabe, Junji Shikata. 192-197 [doi]
- Cyber Fighter Associate: A Decision Support System for cyber agilityCharles Huber, Patrick Drew McDaniel, Scott E. Brown, Lisa M. Marvel. 198-203 [doi]
- Defining perfect location privacy using anonymizationZarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik. 204-209 [doi]
- Packet success probability derivation in a vehicular ad hoc network for a highway scenarioAli Rakhshan, Hossein Pishro-Nik. 210-215 [doi]
- A new PTS method for OFDM signals without side information based on constellation reshapingHongxiang Chu, Tetsuya Shimamura. 216-221 [doi]
- User association with lighting constraints in visible light communication systemsCong Shen, Shun Lou, Chen Gong, Zhengyuan Xu. 222-227 [doi]
- Design and implementation of an underlay control channel for NC-OFDM-based networksRatnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella. 228-233 [doi]
- An operational measure of information leakageIbrahim Issa, Sudeep Kamath, Aaron B. Wagner. 234-239 [doi]
- Decentralized simultaneous energy and information transmission in multiple access channelsSelma Belhadj Amor, Samir Medina Perlaza. 240-245 [doi]
- Energy-efficient resource allocation for SWIPT in multiple access channelsTewodros A. Zewde, Mustafa Cenk Gursoy. 246-251 [doi]
- Inter-network dynamic spectrum allocation via a Colonel Blotto gameMohammad Hajimirsadeghi, Gokul Sridharan, Walid Saad, Narayan B. Mandayam. 252-257 [doi]
- Tracking mobile users via standard routing enginesMatthew Andrews, Lisa Zhang. 258-261 [doi]
- Spatial-temporal routing for supporting end-to-end hard deadlines in multi-hop networksXin Liu, Lei Ying. 262-267 [doi]
- Comparative analysis of initial access techniques in 5G mmWave cellular networksMarco Giordani, Marco Mezzavilla, C. Nicolas Barati, Sundeep Rangan, Michele Zorzi. 268-273 [doi]
- Estimation information bounds using the I-MMSE formula and Gaussian mixture modelsBryan Paul, Daniel W. Bliss. 274-279 [doi]
- Hard decision based distributed detection in multi-sensor system over noise correlated sensing channelsHadi Kasasbeh, Lei Cao, Ramanarayanan Viswanathan. 280-285 [doi]
- A probability neural network-Jensen-Shannon divergence for a fingerprint based localizationO. Abdullah, Ikhlas Abdel-Qader, Bradley J. Bazuin. 286-291 [doi]
- Using Approximate Entropy as a speech quality measure for a speaker recognition systemRichard A. Metzger, John F. Doherty, David M. Jenkins. 292-297 [doi]
- Efficient implementation of enhanced adaptive simultaneous perturbation algorithmsPushpendre Rastogi, Jingyi Zhu, James C. Spall. 298-303 [doi]
- Measurement and modelling of TCP downstream throughput dependence on SNR in an IEEE802.11b WLAN systemOghogho Ikponmwosa, Frederick O. Edeko, Joy Emagbeter. 304-308 [doi]
- Energy-aware optimization and mechanism design for cellular device-to-device local area networksMehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi. 309-314 [doi]
- Load statistics and required spectrum in multi-tier heterogeneous networksSanam Sadr, Raviraj S. Adve. 315-319 [doi]
- Cache aided wireless networks: Tradeoffs between storage and latencyAvik Sengupta, Ravi Tandon, Osvaldo Simeone. 320-325 [doi]
- Multiperiod subscription pricing for cellular wireless entrantsX. Hu, Y. Shan, George Kesidis, Saswati Sarkar, R. Dhar, Serge Fdida. 326-330 [doi]
- Symbol Alphabet Modifier for PAPR reduction in OFDM communicationsYuewen Wang, Ali N. Akansu. 331-336 [doi]
- Beam selection for performance-complexity optimization in high-dimensional MIMO systemsJohn Hogan, Akbar Sayeed. 337-342 [doi]
- Quality of Service timeseries forecasting for Web Services: A machine learning, Genetic Programming-based approachYang Syu, Yong-Yi Fanjiang, Jong-Yih Kuo, Jui-Lung Su. 343-348 [doi]
- Cyclic stochastic optimization via arbitrary selection procedures for updating parametersKarla Hernandez. 349-354 [doi]
- Integration of multiple adaptive algorithms for parallel decision fusionWeiqiang Dong, Moshe Kam. 355-359 [doi]
- State estimation for flag Hidden Markov Models with imperfect sensorsKyle Doty, Sandip Roy, Thomas R. Fischer. 360-365 [doi]
- Performance bound analysis for crowdsourced mobile video streamingLin Gao, Ming Tang, Haitian Pang, Jianwei Huang, Lifeng Sun. 366-371 [doi]
- Background traffic optimization for meeting deadlines in data center storageShijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta. 372-377 [doi]
- Second Chance works out better: Saving more for data center operator in open energy marketPeijian Wang, Ying Zhang, Lei Deng, Minghua Chen, Xue Liu. 378-383 [doi]
- Efficient load balancing in large-scale systemsD. Mukherjee, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting. 384-389 [doi]
- Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robinJalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Y. Zhao. 390-395 [doi]
- Sufficient conditions for stable recovery of sparse autoregressive modelsAbbas Kazemipour, Behtash Babadi, Min Wu. 396-400 [doi]
- Adaptive decision fusion using genetic algorithmJi Wang, Sayandeep Acharya, Moshe Kam. 401-406 [doi]
- Joint machine learning and human learning design with sequential active learning and outlier detection for linear regression problemsXiaohua Li, Jian Zheng. 407-411 [doi]
- Strong coordination over a line when actions are MarkovianBadri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch. 412-417 [doi]
- Two-sided change detection under unknown initial stateJames Falt, Steven D. Blostein. 418-423 [doi]
- Joint uplink/downlink and offloading optimization for mobile cloud computing with limited backhaulAli Najdi Al-Shuwaili, Alireza Bagheri, Osvaldo Simeone. 424-429 [doi]
- Dynamic node-disjoint multipath routing for millimeter wave networks using directional antennasZhuo Chen, Roy D. Yates, Dipankar Raychaudhuri. 430-435 [doi]
- Effect of fading on maximum sum rate of AlohaYitong Li, Lin Dai. 436-441 [doi]
- Ultra-reliable cloud mobile computing with service composition and superposition codingSeyyed Mohammadreza Azimi, Osvaldo Simeone, Onur Sahin, Petar Popovski. 442-447 [doi]
- A Markov chain model for the search time for max degree nodes in a graph using a biased random walkJonathan Stokes, Steven Weber. 448-453 [doi]
- Portfolio theory based sensor selection in Wireless Sensor Networks with unreliable observationsNianxia Cao, Swastik Brahma, Pramod K. Varshney. 454-459 [doi]
- Experimental demonstration of a distributed antenna array pre-synchronized for retrodirective transmissionBenjamin Peiffer, Raghu Mudumbai, Anton Kruger, Amy Kumar, Soura Dasgupta. 460-465 [doi]
- Matching theory for cognitive spectrum allocation in wireless networksRaghed El-Bardan, Walid Saad, Swastik Brahma, Pramod K. Varshney. 466-471 [doi]
- I/O HSMM: Learning behavioral dynamics of a cognitive wireless network node from spectrum sensingSilvija Kokalj-Filipovic, Joel Goodman, Crystal Bertoncini Acosta, George Stantchev. 472-477 [doi]
- Caching Gaussians: Minimizing total correlation on the Gray-Wyner networkGiel J. Op 't Veld, Michael C. Gastpar. 478-483 [doi]
- Computationally efficient Toeplitz-constrained blind equalization based on independenceZhengwei Wu, Saleem A. Kassam. 484-489 [doi]
- Divergence and Bayes error based soft decision for decentralized signal detection of correlated sensor dataRoopashree Rajanna, Lei Cao, Ramanarayanan Viswanathan. 490-495 [doi]
- Performance analysis of eigenportfolios for AR(1) processOnur Yilmaz, Ali N. Akansu. 496-499 [doi]
- Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noiseReza Izanloo, Seyed Abolfazl Fakoorian, Hadi Sadoghi Yazdi, Dan Simon. 500-505 [doi]
- Cramer-Rao bound and approximate maximum likelihood estimation for non-coherent direction of arrival problemWei Jiang, Alexander M. Haimovich. 506-510 [doi]
- Migration to a non-neutral internet: Economics modeling and analysis of impactMohammad Hassan Lotfi, Saswati Sarkar, George Kesidis. 511-516 [doi]
- Multi-operator service optimization for Fixed Access Network Sharing (FANS)Ken J. Kerpez, Haleema Mehmood. 517-522 [doi]
- Impact of network effect and congestion effect on price competition among wireless service providersMengyuan Zhang, Lei Yang, Xiaowen Gong, Junshan Zhang. 523-528 [doi]
- The impact of investment on small-cell resource allocationCheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian. 529-534 [doi]
- Controlling information flow and energy use via adaptive synaptogenesisWilliam B. Levy, Harang Ju, Robert A. Baxter, Costa M. Colbert. 535-538 [doi]
- A machine learning approach to predict episodic memory formationHanlin Tang, Jedediah Singer, Matias Ison, Gnel Pivazyan, Melissa Romaine, Elizabeth Meller, Victoria Perron, Marlise Arlellano, Gabriel Kreiman, Melissa Romaine, Adriana Boulin, Rosa Frias, James Carroll, Sarah Dowcett. 539-544 [doi]
- Non-parametric change point detection for spike trainsThiago Mosqueiro, Martin Strube-Bloss, Rafael Tuma, Reynaldo D. Pinto, Brian H. Smith, Ramón Huerta. 545-550 [doi]
- Dynamic estimation of causal influences in sparsely-interacting neuronal ensemblesAlireza Sheikhattar, Behtash Babadi. 551-556 [doi]
- Winning versus losing during gambling and its neural correlatesP. Sacre, M. S. D. Kerr, S. Subramanian, K. Kahn, J. Gonzalez-Martinez, M. A. Johnson, J. T. Gale, S. V. Sarma. 557-561 [doi]
- Neuronal encoding models of complex receptive fields: A comparison of nonparametric and parametric approachesRahul Agarwal, Zhe Chen, Fabian Kloosterman, Matthew A. Wilson, Sridevi V. Sarma. 562-567 [doi]
- Generalized range space property for group sparsity of linear underdetermined systemsAhmed Al Hilli, Laleh Najafizadeh, Athina P. Petropulu. 568-571 [doi]
- Compressive line spectrum estimation with clustering and interpolationDian Mo, Marco F. Duarte. 572-577 [doi]
- On the performance overhead tradeoff of distributed principal component analysis via data partitioningNi An, Steven Weber. 578-583 [doi]
- Detecting community structures in Hi-C genomic dataIrineo Cabreros, Emmanuel Abbe, Aristotelis Tsirigos. 584-589 [doi]
- Efficient subspace clustering of large-scale data streams with missesPanagiotis A. Traganitis, Georgios B. Giannakis. 590-595 [doi]
- Improving the recovery of principal components with semi-deterministic random projectionsKeegan Kang, Giles Hooker. 596-601 [doi]
- Multilevel diversity coding with regeneration: Separate coding achieves the MBR pointShuo Shao, Tie Liu, Chao Tian. 602-607 [doi]
- Learning with finite memory for machine type communicationTaehyeun Park, Walid Saad. 608-613 [doi]
- EXIT chart based IRA code design for TDMRMorteza Mehrnoush, Benjamin Belzer, Krishnamoorthy Sivakumar, Roger Wood. 614-619 [doi]
- K users caching two files: An improved achievable rateSaeid Sahraei, Michael Gastpar. 620-624 [doi]
- Prediction of granular time-series energy consumption for manufacturing jobs from analysis and learning of historical dataChris Duerden, Lik-Kwan Shark, Geoff Hall, Joe Howe. 625-630 [doi]
- Distributed resource allocation using one-way communication with applications to power networksSindri Magnússon, Chinwendu Enyioha, Kathryn Heal, Na Li, Carlo Fischione, Vahid Tarokh. 631-636 [doi]
- A generalized Nash equilibrium model of a resource stockpile with independent market response dynamicsJustin Lloyd, Gerard G. L. Meyer. 637-642 [doi]
- Efficiency comparison between proportional fairness and dominant resource fairness with two different type resourcesYoungmi Jin, Michiaki Hayashi. 643-648 [doi]
- Spectral bounds for independent cascade model with sensitive edgesEun Jee Lee, Sudeep Kamath, Emmanuel Abbe, Sanjeev R. Kulkarni. 649-653 [doi]