Abstract is missing.
- On the interplay between edge caching and HARQ in Fog-RANIgor Stanojev, Osvaldo Simeone. 1-6 [doi]
- An integer linear program for mixed-weight open locating-dominating setsRobin M. Givens, Rex K. Kincaid, Weizhen Mao, Gexin Yu. 1-6 [doi]
- Sequential estimation of distributed parameters in networksSaurabh Sihag, Javad Heydari, Ali Tajer. 1-5 [doi]
- Saddlepoint approximations of lower and upper bounds to the error probability in channel codingJosep Font-Segura, Gonzalo Vazquez-Vilar, Alfonso Martinez, Albert Guillen i Fabregas, Alejandro Lancho. 1-6 [doi]
- A network-driven approach to modeling the spread of Ebola-type epidemicsNeil Slighton, Jose M. Rico, Emily Kallfelz, Ji Qi, Christopher G. Brinton. 1-6 [doi]
- On the estimation and secrecy capabilities of stochastic encryption for parameter estimation in IoTAnanth Narayan Samudrala, Rick S. Blum. 1-6 [doi]
- Some (Non-)universal features of Web robot trafficMahdieh Zabihimayvan, Derek Doran. 1-6 [doi]
- Linearized binary regressionAndrew S. Lan, Mung Chiang, Christoph Studer. 1-6 [doi]
- Applications of an exact formula for the largest minimum distance of block codesLing-Hua Chang, Carol Wang, Po-Ning Chen, Vincent Y. F. Tan, Yunghsiang S. Han. 1 [doi]
- The MISO free-space optical channel at low and moderate SNRLongguang Li, Stefan M. Moser, Ligong Wang, Michele A. Wigger. 1-6 [doi]
- Learning scene gist with convolutional neural networks to improve object recognitionKevin Wu, Eric Wu, Gabriel Kreiman. 1-6 [doi]
- On estimating multi-attribute choice preferences using private signals and matrix factorizationVenkata Sriram Siddhardh Nadendla, Cedric Langbort. 1-6 [doi]
- Automatic diagnosis of melanoma from dermoscopic image using real-time object detectionShudipto Sekhar Roy, Akkas Uddin Haque, Jeremiah Neubert. 1-5 [doi]
- Solar energy sharing in net metered community microgrids: Can the social goals be achieved?Yue Zhao. 1-6 [doi]
- Graph algorithms for preventing cascading failures in networksPei-Duo Yu, Chee-Wei Tan 0001, Hung-Lin Fu. 1-6 [doi]
- Communication efficient distributed learning with feature partitioned dataBingwen Zhang, Jun Geng, Weiyu Xu, Lifeng Lai. 1-6 [doi]
- Private information retrieval with partially known private side informationYi-Peng Wei, Karim A. Banawan, Sennur Ulukus. 1-6 [doi]
- Stochastic optimization and control framework for 5G network slicing with effective isolationAli Taleb Zadeh Kasgari, Walid Saad. 1-6 [doi]
- Cache-aided combination networks with secrecy guaranteesAhmed A. Zewail, Aylin Yener. 1-6 [doi]
- The computational analysis of watermarks: Setting the stage for the development of a Watermark Imaging Box (WImBo)Emily B. Frank, Margaret Holben Ellis, Lydia Aikenhead, Paul Messier. 1-4 [doi]
- PhaseLin: Linear phase retrievalRamina Ghods, Andrew S. Lan, Tom Goldstein, Christoph Studer. 1-6 [doi]
- UWB/IMU integration approach with NLOS identification and mitigationZhuoqi Zeng, Steven Liu, Lei Wang. 1-6 [doi]
- Securing the visual channel: How my car saw the light and stopped learningRichard Chow, Hsin-Mu Tsai. 1-6 [doi]
- The error exponent of random gilbert-varshamov codesAnelia Somekh-Baruch, Jonathan Scarlett, Albert Guillen i Fabregas. 1-2 [doi]
- Training-based joint channel and antenna impedance estimationShaohan Wu, Brian L. Hughes. 1-6 [doi]
- Use of infrared hyperspectral imaging (960-1680 nm) and low energy x-radiography to visualize watermarksJohn K. Delaney, Murray H. Loew. 1-4 [doi]
- Phase-type bounds on network performanceMassieh Kordi Boroujeny, Yariv Ephraim, Brian L. Mark. 1-6 [doi]
- Ranking causal influence of financial markets via directed information graphsTheo Diamandis, Yonathan Murin, Andrea Goldsmith. 1-6 [doi]
- Generic network cost minimization: A decentralized Newton's methodXuanyu Cao, K. J. Ray Liu. 1-6 [doi]
- Predictive airborne target tracking using all-terrain fusion based mobile surveillance systemDavid S. R. Kondru, Mehmet Celenk. 1-6 [doi]
- Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learningRui Zhang, Quanyan Zhu. 1-6 [doi]
- The probability density function of SINR loss of the dominant mode rejection beamformerEnlong Hu, Hongya Ge. 1-6 [doi]
- A communication-theoretic formulation of a continuous linear-nonlinear model of retinal ganglion cellsSiamak K. Sorooshyari, Stephen A. Baccus. 1-5 [doi]
- WImBo - Watermark imaging box project: A digital art history data acquisition toolC. Richard Johnson. 1-6 [doi]
- On inputs achieving the cardinality-constrained capacity on the real Gaussian noise channelDaniela Tuninetti. 1-5 [doi]
- SNN-cache: A practical machine learning-based caching system utilizing the inter-relationships of requestsYoungbin Im, Prasanth Prahladan, Tae-Hwan Kim, Yong-Geun Hong, Sangtae Ha. 1-6 [doi]
- Coded status updates in an energy harvesting erasure channelAbdulrahman Baknina, Sennur Ulukus. 1-6 [doi]
- Surprising sequences for communication and conversationTing-Yi Wu, Xiou Ge, Lav R. Varshney. 1-6 [doi]
- An ADMM approach to dynamic sharing problemsXuanyu Cao, K. J. Ray Liu. 1-6 [doi]
- Kronecker compressed sensing for massive MIMOJohn Franklin, A. Brinton Cooper. 1-6 [doi]
- Predictive learning analytics for video-watching behavior in MOOCsMadhumitha Shridharan, Ashley Willingham, Jonathan Spencer, Tsung-Yen Yang, Christopher G. Brinton. 1-6 [doi]
- Security investment under cognitive constraints: A Gestalt Nash equilibrium approachJuntao Chen, Quanyan Zhu. 1-6 [doi]
- The r-wise hamming distance and its operational interpretation for block codesHsuan-Yin Lin, Stefan M. Moser, Po-Ning Chen. 1-6 [doi]
- A deep reinforcement learning-based framework for content cachingChen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar. 1-6 [doi]
- Variable-rate ultra-reliable and low-latency communication for industrial automationRebal Jurdi, Saeed R. Khosravirad, Harish Viswanathan. 1-6 [doi]
- Normal approximations for fading channelsAlejandro Lancho, Tobias Koch, Giuseppe Durisi. 1-6 [doi]
- Wireless network traffic disaggregation using Bayesian nonparametric techniquesGabriel Ford, Rebecca Cargan, Ali Ahmed, Kevin Rigney, Christopher Berry, Donald J. Bucci, Moshe Kam. 1-6 [doi]
- On the capacity of Gaussian "dirty" Z-interference channel with common stateShahab Ghasemi-Goojani, Panos Papadimitratos. 1-6 [doi]
- Attack detection and secure estimation under false data injection attack in cyber-physical systemsArpan Chattopadhyay, Urbashi Mitra. 1-6 [doi]
- End-to-end network throughput optimization through last-mile diversityNing Wu, Ao Tang. 1-6 [doi]
- A change-detection approach to mobile node localization in bounded domainsAlessio Fascista, Giovanni Ciccarese, Angelo Coluccia, Giuseppe Ricci. 1-6 [doi]
- An edge exclusion test for graphical modeling of multivariate time seriesJitendra K. Tugnait. 1-6 [doi]
- Approaching waterfilling capacity of parallel channels by higher order modulation and probabilistic amplitude shapingFabian Steiner, Patrick Schulte, Georg Bocherer. 1-6 [doi]
- Stability of fair trade-off solution between radar and communication objectives on hostile interferenceAndrey Garnaev, Wade Trappe, Athina P. Petropulu. 1-6 [doi]
- Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete caseNazanin Takbiri, Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel. 1-6 [doi]
- A network-driven methodology for sports ranking and predictionVincent Xia, Kavirath Jain, Akshay Krishna, Christopher G. Brinton. 1-6 [doi]
- Clustering under composite generative modelsTiexing Wang, Donald J. Bucci, Yingbin Liang, Biao Chen, Pramod K. Varshney. 1-6 [doi]
- The WIRE project at Cornell: An interactive decision tree approach for the rapid identification of watermarks in Rembrandt's EtchingsAndrew C. Weislogel, C. Richard Johnson, Amanda House, Katarina Martucci, Samantha Siegler, So Jeong Lim, Katrina Ferreira, Margaret Canfield. 1-6 [doi]
- A random-signal approach to robust radar detectionAngelo Coluccia, Giuseppe Ricci. 1-6 [doi]
- Art into data | engineering WImBoPaul Messier, Emily B. Frank. 1-4 [doi]
- Heterogeneous multireference alignment: A single pass approachNicolas Boumal, Tamir Bendory, Roy R. Lederman, Amit Singer. 1-6 [doi]
- Implementation of rate-adaptive integer forcing compression in distributed wireless relay networkingJing Guo, Ahmad A. I. Ibrahim, Ameya Agaskar, David J. Love, Navid Yazdani. 1-6 [doi]
- Learning to predict action potentials end-to-end from calcium imaging dataDrew Linsley, Jeremy W. Linsley, Tarun Sharma, Nathan Meyers, Thomas Serre. 1-6 [doi]
- Localization of forced oscillations in the power grid under resonance conditionsTong Huang, Nikolaos M. Freris, P. R. Kumar, Le Xie. 1-5 [doi]
- Optimal error correcting index codes for two classes of index coding problemsMahesh Babu Vaddi, B. Sundar Rajan. 1-5 [doi]
- Understanding mean-field effects of large-population user data obfuscation in machine learningAlex Dunyak, Quanyan Zhu. 1-6 [doi]
- Optimal information transmission by overlapping retinal cell mosaicsYilun Zhang, David B. Kastner, Stephen A. Baccus, Tatyana O. Sharpee. 1-6 [doi]
- Bayesian renewables scenario generation via deep generative networksYize Chen, Pan Li, Baosen Zhang. 1-6 [doi]
- Local differential privacy for physical sensor data and sparse recoveryAudra McMillan, Anna C. Gilbert. 1-6 [doi]
- Locally optimal, delay-tolerant predictive source codingZhen Xiang, David J. Miller. 1-6 [doi]
- Joint heterogeneous statistical-QoS/QoE provisionings for edge-computing based WiFi offloading over 5G mobile wireless networksXi Zhang, Jingqing Wang. 1-6 [doi]
- When are discrete channel inputs optimal? - Optimization techniques and some new resultsAlex Dytso, Mario Goldenbaum, H. Vincent Poor, Shlomo Shamai Shitz. 1-6 [doi]
- Course recommendation as graphical analysisConnor Bridges, James Jared, Joshua Weissmann, Astrid Montanez-Garay, Jonathan Spencer, Christopher G. Brinton. 1-6 [doi]
- From MRFS to CNNS: A novel image restoration methodXinjie Lan, Kenneth E. Barner. 1-5 [doi]
- Network analysis of virus-innate immune interaction within a hostYufan Huang, Michelle Dai, Zhihao Zhang, Ruian Ke. 1-6 [doi]
- Parallel decentralized detection with dependent randomizationWeiqiang Dong, Moshe Kam. 1-6 [doi]
- Exploiting policy structure for solving MDPs with large state spaceLibin Liu, Arpan Chattopadhyay, Urbashi Mitra. 1-6 [doi]
- Online estimation for finding a near-maximum value in a large list of numerical dataJonathan Stokes, Steven Weber. 1-6 [doi]
- Capacity approximation of continuous channels by discrete inputsMalcolm Egan, Samir Medina Perlaza. 1-6 [doi]
- A tunable base station cooperation scheme for poisson cellular networksKe Feng, Martin Haenggi. 1-6 [doi]
- Blind source separation in the physical layerAlexander N. Tait, Thomas Ferreira de Lima, Philip Y. Ma, Matthew P. Chang, Mitchell A. Nahmias, Bhavin J. Shastri, Prateek Mittal, Paul R. Prucnal. 1-6 [doi]
- An efficient nonnegative matrix factorization model for finding cancer associated genes by integrating data from genome, transcriptome and interactomeJianing Xi, Ao Li, Minghui Wang. 1-6 [doi]
- Head movements are correlated with other measures of visual attention at smaller spatial scalesBrian Hu, Ishmael Johnson-Bey, Mansi Sharma, Ernst Niebur. 1-6 [doi]
- On diffusive molecular communication with mobile nanomachinesNeeraj Varshney, Aditya K. Jagannatham, Pramod K. Varshney. 1-6 [doi]
- Nonparametric distributed detection using bootstrapping and fisher's methodTopi Halme, Visa Koivunen, H. Vincent Poor. 1-6 [doi]
- Secure lossless compressionYanina Y. Shkel, Rick S. Blum, H. Vincent Poor. 1-6 [doi]
- Pilot-assisted short-packet transmission over multiantenna fading channels: A 5G case studyGuido Carlo Ferrante, Johan Östman, Giuseppe Durisi, Kittipong Kittichokechai. 1-6 [doi]
- Wireless scheduling with deadline and power constraintsYiqiu Liu, Xin Liu, Lei Ying, R. Srikant. 1-6 [doi]
- Enhancing robustness of machine learning systems via data transformationsArjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal. 1-5 [doi]
- Privacy against matching under anonymization and obfuscation in the Gaussian caseKe Li, Hossein Pishro-Nik, Dennis L. Goeckel. 1-6 [doi]
- Optimal electric vehicle charging scheduling with time-varying profitsBoyu Wang, Jing Yang. 1-6 [doi]
- Relative degree of interconnected SISO nonlinear control systemsW. Steven Gray, G. S. Venkatesh. 1-6 [doi]
- Innovation, cheating, and whistleblowing - A game theoretic perspectiveSoheil Eshghi, Leandros Tassiulas. 1-6 [doi]
- Lossy compression of decimated Gaussian random walksGeorgia Murray, Alon Kipnis, Andrea J. Goldsmith. 1-6 [doi]
- Event-triggered stabilization of disturbed linear systems over digital channelsMohammad Javad Khojasteh, Mojtaba Hedayatpour, Jorge Cortés, Massimo Franceschetti. 1-6 [doi]
- On Gaussian mixture noise channels with minimum and peak amplitude constraintsZhengwei Ni, Mehul Motani. 1-6 [doi]