Abstract is missing.
- On the improvement of spectral efficiency in mobile networks: Rate and mobility analysisZhong Zheng, Zygmunt J. Haas. 1-6 [doi]
- Inference in spiking Bayesian neurons using stochastic computationChetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings, André van Schaik. 1-4 [doi]
- Centralized class specific dictionary learning for wearable sensors based physical activity recognitionSherin M. Mathews, Chandra Kambhamettu, Kenneth E. Barner. 1-6 [doi]
- Neuromorphic self-driving robot with retinomorphic vision and spike-based processing/closed-loop controlKate D. Fischl, Gaspar Tognetti, Daniel R. Mendat, Garrick Orchard, John Rattray, Christos Sapsanis, Laura F. Campbell, Laxaviera Elphage, Tobias E. Niebur, Alejandro Pasciaroni, Valerie E. Rennoll, Heather Romney, Shamaria Walker, Philippe O. Pouliquen, Andreas G. Andreou. 1-6 [doi]
- The price of anarchy in networked supply function gamesWeixuan Lin, Eilyan Bitar. 1 [doi]
- Distributed learning of human mobility patterns from cellular network dataTong Wu, Raif M. Rustamov, Colin Goodall. 1-6 [doi]
- Adaptive non-uniform compressive sampling for time-varying signalsAlireza Zaeemzadeh, Mohsen Joneidi, Nazanin Rahnavard. 1-6 [doi]
- Real-time image segmentation using a spiking neuromorphic processorChetan Singh Thakur, Jamal Molin, Ralph Etienne-Cummings. 1-6 [doi]
- Improving ADMM-based optimization of Mixed Integer objectivesAlborz Alavian, Michael C. Rotkowitz. 1-6 [doi]
- Energy efficiency analysis for wireless-powered cellular networksTewodros A. Zewde, Mustafa Cenk Gursoy. 1-6 [doi]
- Enhanced spectrum awareness using Bayesian nonparametric pattern recognition techniquesGabriel Ford, Sean Mason, Kevin Rigney, Moshe Kam. 1-6 [doi]
- On the performance of antipode algorithms for the multivariable output feedback Hopf algebraLance Berlin, W. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard. 1-6 [doi]
- Using information theory principles to schedule real-time tasksCarlos A. Rincon C., Albert M. K. Cheng. 1-6 [doi]
- A simple construction of encryption for a tiny domain messageRashed Mazumder, Atsuko Miyaji, Chunhua Su. 1-6 [doi]
- Audio-Visual beamforming with the Eigenmike microphone array an omni-camera and cognitive auditory featuresDaniel R. Mendat, James E. West, Sudarshan Ramenahalli, Ernst Niebur, Andreas G. Andreou. 1-4 [doi]
- A graph theoretical approach for performance comparison of ICA for fMRI analysisQunfang Long, Suchita Bhinge, Yuri Levin-Schwartz, Vince D. Calhoun, Tülay Adali. 1-6 [doi]
- Energy efficient smart antenna system using Recursive Least Square algorithm and Kaiser side lobe cancellation techniqueHailu Belay Kassa, Yacob Astatke, Farzad Moazzami, Tezera Yitbarek Chernet, Estifanos Yohannes, Dereje H. Woldegebreal. 1-5 [doi]
- An overview of multi-processor approximate message passingJunan Zhu, Ryan Pilgrim, Dror Baron. 1-6 [doi]
- Estimation of common subspace order across multiple datasets: Application to multi-subject fMRI dataSuchita Bhinge, Yuri Levin-Schwartz, Tülay Adali. 1-5 [doi]
- On deep learning-based channel decodingTobias Gruber, Sebastian Cammerer, Jakob Hoydis, Stephan ten Brink. 1-6 [doi]
- Secure resource allocation and dynamic spectrum access for polarization-based green cooperative cognitive radio networksFei Wang, Xi Zhang. 1-6 [doi]
- A BCJR-based turbo equalizer for multicarrier time-varying fading channelsJorge A. Pires, Benjamin J. Belzer, Thomas R. Fischer. 1-6 [doi]
- Power control and relay selection in Full-Duplex Cognitive Relay Networks: Coherent versus non-coherent scenariosLe Thanh Tan, Lei Ying, Daniel W. Bliss. 1-6 [doi]
- Control of low-inertia AC microgridsSairaj V. Dhople. 1-2 [doi]
- A survey on Arabic Optical Character Recognition and an isolated handwritten Arabic Character Recognition algorithm using encoded freeman chain codeHassan Althobaiti, Chao Lu. 1-6 [doi]
- A hierarchical Stackelberg-coalition formation game theoretic framework for cooperative spectrum leasingAshwija Reddy Korenda, Mohammad Zaeri-Amirani, Fatemeh Afghah. 1-6 [doi]
- Polar coding for achieving the capacity of marginal channels in nonbinary-input settingAmirsina Torfi, Sobhan Soleymani, Seyed Mehdi Iranmanesh, Hadi Kazemi, Rouzbeh A. Shirvani, Vahid Tabataba Vakili. 1-6 [doi]
- Learning dictionaries for accelerated parallel MRI reconstructionDaniel S. Weller. 1 [doi]
- Finite-sample analysis of iterate averaging method for stochastic approximation with quadratic loss functionKaining Yang, Kunbo Wang, Chen Feng. 1-6 [doi]
- Spectrum efficiency maximization using primal-dual adaptive algorithm for distributed mobile devices caching over edge computing networksXi Zhang, Qixuan Zhu. 1-6 [doi]
- Minimax robust optimal control of multiscale linear-quadratic systemsHamza Anwar, Quanyan Zhu. 1-6 [doi]
- Fundamental limits of location privacy using anonymizationNazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik. 1-6 [doi]
- Effects of degree variability and dependence on cascading failures: A case study of two interdependent systemsRichard J. La. 1-6 [doi]
- Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networksJiyun Yao, Parv Venkitasubramaniam, Shalinee Kishore, Lawrence V. Snyder, Rick S. Blum. 1-6 [doi]
- Modified EGSR for network securityBaljinder Singh, Tejpreet Singh. 1-7 [doi]
- Real-time OPF based on quasi-Newton methodsYujie Tang, Krishnamurthy Dvijotham, Steven H. Low. 1 [doi]
- Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applicationsEirini-Eleni Tsiropoulou, Surya Teja Paruchuri, John S. Baras. 1-6 [doi]
- Observation of quantum Zeno blockade on chipJiayang Chen, Yong Meng Sua, Zitong Zhao, Yu-Ping Huang. 1 [doi]
- An adaptive neural network approach for automatic modulation recognitionYasaman Ettefagh, Mohammad Hossein Moghaddam, Sajjad Eghbalian. 1-5 [doi]
- A game theory based secure model against Black hole attacks in Opportunistic NetworksAnshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma. 1-6 [doi]
- Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary usersFei Wang, Xi Zhang. 1-6 [doi]
- Distributed cyber-physical algorithms for wide-area control of power systemsAranya Chakrabortty. 1 [doi]
- A case for stacked autoencoder based order recognition of continuous-phase FSKAmbaw B. Ambaw, Mohammad Bari, Milos Doroslovacki. 1-6 [doi]
- How conservative is a sensor detection system with the scan statistic designed using the union bound?Benedito J. B. Fonseca Jr.. 1-6 [doi]
- The economics of competition and cooperation between MNOs and MVNOsMohammad Hassan Lotfi, Saswati Sarkar. 1-6 [doi]
- The triggering, curving and stopping of excitable waves during cell migrationSayak Bhattacharya, Pablo A. Iglesias. 1-4 [doi]
- Complexity-aware scheduling for an LDPC encoded C-RAN uplinkKyle Whetzel, Matthew C. Valenti. 1-6 [doi]
- Impact of mobility on convergence rate in a wireless sensor networkRoya Norouzi Kandalan, Ramanpreet Singh, Kamesh Namuduri, Murali R. Varanasi, Bill P. Buckles. 1-4 [doi]
- Design of High-Resolution Space Imaging System on Sandroid CubeSat using camera arrayHailu Wang, Junsuo Zhao, Fengge Wu. 1-6 [doi]
- On the number of star samples to find a vertex or edge with given degree in a graphJonathan Stokes, Steven Weber. 1-6 [doi]
- Nonparametric maximum likelihood approximate message passingLong Feng, Ruijun Ma, Lee H. Dicker. 1-6 [doi]
- Optical random number generation - harvesting entropy from noise and chaosJoseph D. Hart, Rajarshi Roy, Thomas E. Murphy. 1 [doi]
- Towards a macromodel for Packetized Energy Management of resistive water heatersLuis A. Duffaut Espinosa, Mads Almassalkhi, Paul Hines, Shoeib Heydari, Jeff Frolik. 1-6 [doi]
- Unfolding representations of trajectory coding in neuronal population spike activityZhe Chen. 1-6 [doi]
- Optimizing wireless power transfer with multiple transmittersSairam Goguri, Raghu Mudumbai, Anton Kruger. 1-5 [doi]
- Soft-decision based distributed detection over correlated sensing channelsHadi Kasasbeh, Lei Cao, Ramanarayanan Viswanathan. 1-6 [doi]
- Power spectra constrained IVA for enhanced detection of SSVEP contentDarren Emge, Zois Boukouvalas, Yuri Levin-Schwartz, Suchita Bhinge, Qunfang Long, Tülay Adali. 1-5 [doi]
- Understanding individual-level speech variability: From novel speech production data to robust speaker recognitionShrikanth Narayanan. 1 [doi]
- An infinite dimensional model for a many server priority queueNeal Master, Zhengyuan Zhou, Nicholas Bambos. 1-6 [doi]
- Mixed-weight open locating-dominating setsRobin M. Givens, Rex K. Kincaid, Weizhen Mao, Gexin Yu. 1-6 [doi]
- Electric load forecasting in smart grids using Long-Short-Term-Memory based Recurrent Neural NetworkJian Zheng, Cencen Xu, Ziang Zhang, Xiaohua Li. 1-6 [doi]
- MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program executionSarker T. Ahmed Rumee, Donggang Liu, Yu Lei. 1-6 [doi]
- Recent developments in distributed dictionary learningHaroon Raja, Waheed U. Bajwa. 1 [doi]
- Blind source separation using joint canonical decomposition of two higher order tensorsMingjian Zhang, Xiaohua Li, Jun Peng. 1-6 [doi]
- Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNsBaljinder Singh, Tejpreet Singh, Hargun Singh Sachdeva. 1-7 [doi]
- Edge guided total variation for image denoisingAhmed Ben Said, Rachid Hadjidj, Sebti Foufou, Mongi A. Abidi. 1-6 [doi]
- Wiretap channels with random statesPaul Cuff. 1 [doi]
- Universal coding with point type classesNematollah Iri, Oliver Kosut. 1-6 [doi]
- Equilibrium strategies for an OFDM network that might be under a jamming attackAndrey Garnaev, Wade Trappe, Athina P. Petropulu. 1-6 [doi]
- Spectrum utility driven WiFi offloading over NOMA-based cellular network edgesXi Zhang, Fan Yang. 1-6 [doi]
- Parallel Partition and ExtensionSergey Bereg, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough. 1-6 [doi]
- A feedback control approach to dynamic speed scaling in computing systemsDiego Goldsztajn, Andrés Ferragut, Fernando Paganini. 1-6 [doi]
- Statistical QoS-driven power allocation for WiFi offloading over heterogeneous wireless networksXi Zhang, Jingqing Wang. 1-6 [doi]
- Head movements during visual exploration of natural images in virtual realityBrian Hu, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur. 1-6 [doi]
- Distribution network management based on optimal power flow: Integration of discrete decision variablesEnrique Briglia, Sebastian Alaggia, Fernando Paganini. 1-6 [doi]
- Massive MIMO for 5G: Overview and the road aheadErik G. Larsson. 1 [doi]
- Subset-codebook precoding for 1-bit massive multiuser MIMOOlav Tirkkonen, Christoph Studer. 1-5 [doi]
- Basing cryptography on biometrics and other noisy dataYevgeniy Dodis. 1 [doi]
- Time domain model for Quantum Cascade lasers generating frequency combs via stochastic frequency modulationNathan Henry, Jacob B. Khurgin. 1-2 [doi]
- A game-theoretic analysis of label flipping attacks on distributed support vector machinesRui Zhang, Quanyan Zhu. 1-6 [doi]
- Decoupling in random linear estimationGalen Reeves, Harry Pfister. 1 [doi]
- Messages per secret bit when authentication and a min-entropy secrecy criterion are requiredEric Graves, Brian Kirby, Paul Yu. 1-6 [doi]
- On randomized distributed coordinate descent with quantized updatesMostafa El Gamal, Lifeng Lai. 1-5 [doi]
- Polar codes for covert communications over asynchronous Discrete Memoryless ChannelsGuillaume Freche, Matthieu R. Bloch, Michel Barret. 1 [doi]
- Impact of sample size on false alarm and missed detection rates in PCA-based anomaly detectionNi An, Steven Weber. 1-6 [doi]
- Distributed linear prediction in the presence of noise and multipathKevin T. Wagner, Milos I. Doroslovacki. 1-5 [doi]
- Action recognition using micro-Doppler signatures and a recurrent neural networkJeff Craley, Thomas S. Murray, Daniel R. Mendat, Andreas G. Andreou. 1-5 [doi]
- Preserving confidentiality in the Gaussian broadcast channel using compute-and-forwardParisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos. 1-6 [doi]
- Performance analysis of orthogonal coded M-ary QAM modulation techniqueSunil Kumar Gaire, Saleh Faruque. 1-6 [doi]
- Opportunistic Self Organizing Migrating Algorithm for real-time Dynamic Traveling Salesman ProblemShubham Dokania, Sunyam Bagga, Rohit Sharma. 1-6 [doi]
- The emergence of chaos on non-uniformly timed systemsDylan Poulsen, Shaun Ramsey, Nathaniel Schwartz. 1-4 [doi]
- Artifact-free high dynamic range imaging based on Sandroid Cubesat with camera arrayYuepei Li, Junsuo Zhao, Fengge Wu. 1-6 [doi]
- Detection performance vs. complexity in parallel decentralized Bayesian decision fusionWeiqiang Dong, Moshe Kam. 1-6 [doi]
- Emulating batteries with deferrable energy demandMunther A. Dahleh. 1 [doi]
- Analyzing the role of correlation-awareness in sparse estimation and detectionPiya Pal. 1 [doi]
- Very short-term photovoltaic power forecasting using uncertain basis functionJin Dong, P. Teja Kuruganti, Seddik M. Djouadi. 1-6 [doi]
- On global convergence of fractional Fliess operators with applications to bilinear systemsIrina M. Winter-Arboleda, W. Steven Gray, Luis A. Duffaut Espinosa. 1-6 [doi]
- SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic NetworksAnshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma. 1-6 [doi]
- On the efficiency of networked Stackelberg competitionYunjian Xu, Desmond W. H. Cai, Subhonmesh Bose, Adam Wierman. 1-6 [doi]
- MIMO equalization of 16-QAM signal blocks using an FFT-based alphabet-matched CMAPeter O. Taiwo, Arlene A. Cole-Rhodes. 1-6 [doi]
- On sparse recovery with Structured Noise under sensing constraintsDavood Mardani, George K. Atia. 1-6 [doi]
- Data quality management of synchrophasor data in power systems by exploiting low-dimensional modelsMeng Wang. 1-2 [doi]
- Optimal secure partial-repair in distributed storage systemsMajid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund, Panos Papadimitratos. 1-5 [doi]
- Iterative carrier phase synchronization without reconstructing the soft symbolsQasim M. Chaudhari, Brian S. Krongold. 1-6 [doi]
- Random shift and XOR of unequal-sized packets (RaSOR) to shave off transmission overheadMaroua Taghouti, Daniel E. Lucani, Frank H. P. Fitzek. 1-6 [doi]
- Light transport through ultrafast chaotic micro-cavities for photonic physical unclonable functionsBrian C. Grubel, Daniel S. Vresilovic, Bryan T. Bosworth, Michael R. Kossey, Amy C. Foster, Mark A. Foster, A. Brinton Cooper. 1-6 [doi]
- Energy-reliability limits in nanoscale neural networksAvhishek Chatterjee, Lav R. Varshney. 1-6 [doi]
- An Evolutionary Game model for threat revocation in ephemeral networksAhmed A. Alabdel Abass, Narayan B. Mandayam, Zoran Gajic. 1-5 [doi]
- Link-level interpretation of eigenanalysis for network traffic flowsIrfan Lateef, Ali N. Akansu. 1-6 [doi]
- Sensitivity of the left inverse of a SISO analytic nonlinear systemW. Steven Gray, Luis A. Duffaut Espinosa, Kurusch Ebrahimi-Fard. 1-6 [doi]
- Decentralized Nash equilibrium seeking by strategic generators for DC optimal power flowAshish Cherukuri, Jorge Cortés. 1-6 [doi]
- Efficient computation of the Fisher information matrix in the EM algorithmLingyao Meng, James C. Spall. 1-6 [doi]
- Inference assessment on a probability scaleKenric P. Nelson. 1-5 [doi]
- Towards development of FOPL based tweet summarization technique in a post disaster scenario: From survey to solutionTamal Mondal, Prithviraj Pramanik, Indrajit Bhattacharya, Arka Saha, Naiwrita Boral. 1-6 [doi]
- Unconditionally secure searchable encryptionTakahiro Yoshizawa, Yohei Watanabe 0001, Junji Shikata. 1-6 [doi]
- Moving beyond sparsity by transferring expert knowledgeArian Maleki. 1 [doi]
- Information-theoretic interpretation of tuning curves for multiple motion directionsWentao Huang, Xin Huang, Kechen Zhang. 1-4 [doi]
- Sparsity constrained estimation via spike and slab priorsVishal Monga. 1 [doi]
- Random projections for reduced dimension radar space-time adaptive processingPawan Setlur, Tariq R. Qureshi, Muralidhar Rangaswamy. 1-6 [doi]
- Numerical analysis of Elias's and Peres's deterministic extractorsAmonrat Prasitsupparote, Norio Konno, Junji Shikata. 1-6 [doi]