default search action
53rd CISS 2019: Baltimore, MD, USA
- 53rd Annual Conference on Information Sciences and Systems, CISS 2019, Baltimore, MD, USA, March 20-22, 2019. IEEE 2019, ISBN 978-1-7281-1151-3
- Robert A. Baxter, William B. Levy:
Multilayered Neural Networks With Sparse, Data-driven Connectivity and Balanced Information and Energy Efficiency. 1-6 - Andy S. Peng, Ahmet Turkmen, Brian Eickhoff, Mark Finta, Paul Gerads:
Design of a Ground Sampling Distance Graphical User Interface for an Unmanned Aerial Vehicle System. 1-6 - Thibaud Tonnellier, Adam Cavatassi, Warren J. Gross:
Length-Compatible Polar Codes: A Survey : (Invited Paper). 1-6 - Syed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar:
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication. 1-6 - Ananth Narayan Samudrala, M. Hadi Amini, Soummya Kar, Rick S. Blum:
Optimal Sensor Placement for Topology Identification in Smart Power Grids. 1-6 - Daiki Mitsumoto, Takeshi Hori, Shigeki Sagayama, Hidenori Yamasue, Keiho Owada, Masaki Kojima, Keiko Ochi, Nobutaka Ono:
Autism Spectrum Disorder Discrimination Based on Voice Activities Related to Fillers and Laughter. 1-6 - Theodoros Mamalis, Subhonmesh Bose, Lav R. Varshney:
Business-to-Peer Carsharing Systems with Electric Vehicles. 1-6 - Haider Al-Lawati, Nuwan S. Ferdinand, Stark C. Draper:
Anytime Minibatch with Stale Gradients : (Invited Paper). 1-5 - Li Li, Milos Doroslovacki, Murray H. Loew:
Discriminant Analysis Deep Neural Networks. 1-6 - Debarnab Mitra, Himanshu Asnani, Sibi Raj B. Pillai:
On the Sum-capacity of Compound MAC Models with Distributed CSI and Unknown Fading Statistics. 1-6 - Xiaowei Song:
An intuitive and most efficient Ll-norm principal component analysis algorithm for big data. 1-4 - Carsten H. Botts:
A Note on the Limiting Properties of the Extended Kalman Filter's Estimates : Invited Presentation. 1-6 - Asia Mason, Michel Reece, Gian Claude, Willie L. Thompson, Kevin T. Kornegay:
Analysis of Wireless Signature Feature Sets for Commercial IoT Devices : Invited Presentation. 1-4 - Matsuto Hori, Christoph M. Wilk, Shigeki Sagayama:
Piano Practice Evaluation and Visualization by HMM for Arbitrary Jumps and Mistakes. 1-5 - Shunsuke Horii, Tota Suko:
A Note on the Estimation Method of Intervention Effects based on Statistical Decision Theory. 1-6 - Massieh Kordi Boroujeny, Brian L. Mark, Yariv Ephraim:
Tail-Limited Phase-Type Burstiness Bounds for Network Traffic. 1-6 - Huber Nieto-Chaupis:
The Feynman-Kac Formula to Estimate the Very Beginning of the Diabetic Nephropathy. 1-4 - Marius Arvinte, Marcos Tavares, Dragan Samardzija:
Beam Management in 5G NR using Geolocation Side Information. 1-6 - K. Bendjilali, Fethi Belkhouche:
On the problem of weight factors and functions in fusion applications. 1-6 - Khaled Alshehri, Mariola Ndrio, Subhonmesh Bose, Tamer Basar:
The Impact of Aggregating Distributed Energy Resources on Electricity Market Efficiency. 1-6 - Harry Shaw, Nagarajan Pattabiraman, Deborah Preston, Tatiana Ammosova, Yuri Obukhov, Sergei Nekhai, Ajit Kumar:
Information theory and signal processing methodology to identify nucleic acid-protein binding sequences in RNA-protein interactions. 1-6 - Dimche Kostadinov, Behrooz Razeghi, Shideh Rezaeifar, Slava Voloshynovskiy:
Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features. 1-6 - S. Andrew Lanham, Travis C. Cuvelier, Corey I. Ostrove, Brian R. La Cour, Granville E. Ott, Robert W. Heath Jr.:
A Noncoherent Space-Time Code from Quantum Error Correction. 1-6 - Yingjie Bi, Ao Tang:
Uncertainty-Aware optimization for Network Provisioning and Routing. 1-6 - Arun Asokan Nair, Trac D. Tran, Austin Reiter, Muyinatu A. Lediju Bell:
A Generative Adversarial Neural Network for Beamforming Ultrasound Images Invited Presentation. 1-6 - Karelia Pena-Pena, Gonzalo R. Arce:
Channel Coding Optimization for Visually Pleasant QR Codes : Invited Presentation. 1-4 - Samer S. Saab, Khaled Kamal Saab, Samer S. Saab:
Shuffled Linear Regression with Erroneous Observations. 1-6 - Qasem Abu Al-Haija, Swastik Brahma:
Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components. 1-6 - Botong Qiu, Yida Lin, Ebuka S. Arinze, Arlene Chiu, Lulin Li, Susanna M. Thon:
Controlling spectral selectivity in optoelectronics via photonic band engineering in absorbing media. 1-5 - Andrey Garnaev, Wade Trappe:
A Prospect Theoretical Extension of a Communication Game Under Jamming. 1-6 - Bryce Simmons, Pasham Adwani, Huong Pham, Yazeed Alhuthaifi, Artur Wolek:
Training a Remote-Control Car to Autonomously Lane-Follow using End-to-End Neural Networks. 1-6 - Shahab Bahrami, Yu Christine Chen, Vincent W. S. Wong:
An Online Algorithm for Data Center Demand Response. 1-6 - Quan Huu Cap, Hiroki Tani, Hiroyuki Uga, Satoshi Kagiwada, Hitoshi Iyatomi:
Super-Resolution for Practical Automated Plant Disease Diagnosis System. 1-6 - Yanliang Zhou, Hua Sun, Shengli Fu:
On the Randomness Cost of Linear Secure Computation : (Invited Presentation). 1-6 - Alireza Sheikh, Alexandre Graell i Amat, Gianluigi Liva:
Binary Message Passing Decoding of Product Codes Based on Generalized Minimum Distance Decoding : (Invited Paper). 1-5 - Gaspar Tognetti, Jonah Sengupta, Philippe O. Pouliquen, Andreas G. Andreou:
Characterization of a pseudo-DRAM Crossbar Computational Memory Array in 55nm CMOS : (Invited Paper). 1-5 - Derek Allman, Fabrizio Assis, Jonathan Chrispin, Muyinatu A. Lediju Bell:
Deep learning to detect catheter tips in vivo during photoacoustic-guided catheter interventions : Invited Presentation. 1-3 - Luoluo Liu, Sang Peter Chin, Trac D. Tran:
Reducing Sampling Ratios and Increasing Number of Estimates Improve Bagging in Sparse Regression. 1-5 - Zisheng Wang, Rick S. Blum:
Topology Attack Detection in Natural Gas Delivery Networks. 1-6 - Dimitris Perdios, Adrien Besson, Florian Martinez, Manuel Vonlanthen, Marcel Arditi, Jean-Philippe Thiran:
On Problem Formulation, Efficient Modeling and Deep Neural Networks for High-Quality Ultrasound Imaging : Invited Presentation. 1-4 - Chunying Jia, Mohammad A. B. S. Akhonda, Qunfang Long, Vince D. Calhoun, Shari Waldstein, Tülay Adali:
C-ICT for Discovery of Multiple Associations in Multimodal Imaging Data: Application to Fusion of fMRI and DTI Data. 1-5 - Peter O. Taiwo, Arlene A. Cole-Rhodes:
Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited Presentation. 1-6 - Zeyu Zhou, Bruce E. Hajek:
Per-Flow Cardinality Estimation Based On Virtual LogLog Sketching. 1-6 - Jessica Maghakian, Joshua Comden, Zhenhua Liu:
Online optimization in the Non-Stationary Cloud: Change Point Detection for Resource Provisioning (Invited Paper). 1-6 - Huber Nieto-Chaupis:
Bacteria Nano Communications Described by a Machine Learning Theory Based on the Feynman Path Integral. 1-4 - Hassan Yazdani, Azadeh Vosoughi:
On the Spectrum Sensing, Beam Selection and Power Allocation in Cognitive Radio Networks Using Reconfigurable Antennas. 1-7 - Sebastian Cammerer, Xiaojie Wang, Yingyan Ma, Stephan ten Brink:
Spatially Coupled LDPC Codes and the Multiple Access Channel. 1-6 - Kechao Cai, John C. S. Lui:
An Online Learning Multi-path Selection Framework for Multi-path Transmission Protocols. 1-2 - Nicolás Rodríguez, Pedro Julián, Eduardo E. Paolini:
A Simplicial Piecewise Linear Approach for Efficient Hardware Realization of Neural Networks : (Invited Presentation). 1-3 - Daniel Salmond:
Blind estimation of wireless network topology and throughput. 1-6 - Di Wang, Jinhui Xu, Yang He:
Estimating Sparse Covariance Matrix Under Differential Privacy via Thresholding. 1-5 - Keith Hermiston:
The Largest Critical Sets of Latin Squares. 1-6 - Ali Koochakzadeh, Piya Pal:
On flattening of symmetric tensors and identification of latent factors. 1-2 - W. Steven Gray, G. S. Venkatesh, Luis A. Duffaut Espinosa:
Discrete-time Chen Series for Time Discretization and Machine Learning. 1-6 - Teresa M. Lebair, Jinglai Shen:
Minimax Lower Bound of k-Monotone Estimation in the Sup-norm. 1-6 - Philippe Jacquod, Laurent Pagnier:
Optimal placement of inertia and primary control in high voltage power grids. 1-6 - Jiangnan Cheng, Shih-Hao Tseng, Ao Tang:
Worst-Case Latency Performance Of Load Balancing Through Distributed Waterfilling Algorithm. 1-6 - Rajeev Sahay, Rehana Mahfuz, Aly El Gamal:
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach. 1-6 - Hailu Belay Kassa, Kevin T. Kornegay, Ebrima N. Ceesay:
Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm. 1-5 - Sujay Bhatt, Alec Koppel, Vikram Krishnamurthy:
Policy Gradient using Weak Derivatives for Reinforcement Learning. 1-3 - Bishwarup Mondal, Victor Sergeev, Avik Sengupta, Gregory Ermolaev, Alexei Davydov, Eddy Kwon, Seunghee Han, Apostolos Papathanassiou:
MU-MIMO and CSI Feedback Performance of NR/LTE. 1-6 - Afrooz Jalilzadeh, Uday V. Shanbhag:
Smoothed First-order Algorithms for Expectation-valued Constrained Problems. 1 - John Franklin, A. Brinton Cooper:
Compressive Sensing for Indoor Millimeter Wave Massive MIMO : (Invited Paper). 1-6 - Mariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías:
Non-Linear Rate Compatible Modulation : Invited Presentation. 1-5 - Mohamed A. Suliman, Wei Dai:
Exact Three-Dimensional Estimation in Blind Super-Resolution via Convex Optimization. 1-9 - Hossein Valavi, Peter J. Ramadge:
Multi-dataset Low-rank Matrix Factorization. 1-5 - Rebecca Chen, Abhinav B. Das, Lav R. Varshney:
Registration for Image-Based Transcriptomics: Parametric Signal Features and Multivariate Information Measures. 1-6 - Henri Hentila, Visa Koivunen, H. Vincent Poor, Rick S. Blum:
Secure Key Generation for Distributed Inference in IoT Invited Presentation. 1-6 - Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. 1-6 - Shigeichi Hirasawa, Hideki Yagi, Manabu Kobayashi, Masao Kasahara:
Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two. 1-6 - Ali N. Akansu, Anqi Xiong:
Design of Eigenportfolios for US Equities Using Exponential Correlation Model. 1-5 - Liyuan Song, Qin Huang, Jiayi Rui:
Construction and Analysis for Minimum Storage Regenerating Codes Based Parity-Check Matrices : Invited Presentation. 1-6 - Kate D. Fischl, Adam B. Cellon, Terrence C. Stewart, Timothy K. Horiuchi, Andreas G. Andreou:
Socio-Emotional Robot with Distributed Multi-Platform Neuromorphic Processing : (Invited Presentation). 1-6 - Kaiqing Zhang, Alec Koppel, Hao Zhu, Tamer Basar:
Policy Search in Infinite-Horizon Discounted Reinforcement Learning: Advances through Connections to Non-Convex Optimization : Invited Presentation. 1-3 - Dustin Scheinost:
Motion correction for fetal functional magnetic resonance imaging. 1 - Pan Zhong, Zhengdao Wang:
Characterization and Design of Generalized Convolutional Neural Network. 1-6 - Shuyu Liu, Yingze Hou, James C. Spall:
Distribution Estimation for Stochastic Approximation in Finite Samples Using A Surrogate Stochastic Differential Equation Method. 1-6 - Shafkat Islam, Abolfazl Razi:
A Path Planning Algorithm for Collective Monitoring Using Autonomous Drones. 1-6 - Mariem Ben Fadhel, Kofi Nyarko:
GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics. 1-5 - Willie L. Thompson, Michael F. Talley:
Deep Learning for IoT Communications : Invited Presentation. 1-4 - Sima Azizi, Arash Komaee:
Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength. 1-6 - Robert J. Thompson, Xiaohua Li:
Integrating Volterra Series Model and Deep Neural Networks to Equalize Nonlinear Power Amplifiers. 1-6 - Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of Gaussian Arbitrarily-Varying Fading Channels. 1-6 - Christopher Ratto, Waseem Malik, Iman Kabir, Robert Newsome:
Cost-Constrained Classifier Cascade using Sparse Probit Models : Invited Presentation. 1-6 - Ziyu Liu, James C. Spall:
Error Estimation for the Particle Filter. 1-6 - Maryam Eslami Rasekh, Mohammed Abdelghany, Upamanyu Madhow, Mark J. W. Rodwell:
Phase noise analysis for mmwave massive MIMO: a design framework for scaling via tiled architectures. 1-6 - Jay Jemal, Kevin T. Kornegay:
Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation. 1-4 - Anqi Xiong, Ali N. Akansu:
Performance Comparison of Minimum Variance, Market and Eigen Portfolios for US Equities. 1-5 - You Li, Christoph M. Wilk, Takeshi Hori, Shigeki Sagayama:
Automatic Piano Reduction of Orchestral Music Based on Musical Entropy. 1-5 - Brian Hu, Salman Khan, Ernst Niebur, Bryan P. Tripp:
Figure-ground representation in deep neural networks. 1-6 - Huber Nieto-Chaupis:
Formalisms of Quantization in High Intensity Fields: Quantum Mechanics Meets Classical Electrodynamics. 1-4 - Sudeshna Dasgupta, Smita Sadhu, Tapan Kumar Ghoshal:
Disturbance Observers for Nonlinear MIMO Systems- An Alternative Design Approach. 1-6 - Sushanth G. Sathyanarayana, Bo Ning, Song Hu, John A. Hossack:
Comparison of dictionary learning methods for reverberation suppression in photoacoustic microscopy : Invited presentation. 1-4 - Tharindu Adikari, Stark C. Draper:
Efficient learning of neighbor representations for boundary trees and forests. 1-6 - Mohammad A. B. S. Akhonda, Qunfang Long, Suchita Bhinge, Vince D. Calhoun, Tülay Adali:
Disjoint Subspaces for Common and Distinct Component Analysis: Application to Task FMRI Data. 1-6 - Adam Blakney, Jingyi Zhu:
A Comparison of the Finite Difference and Simultaneous Perturbation Gradient Estimation Methods with Noisy Function Evaluations. 1-6 - Sota Akaishi, Ryuya Uda:
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence. 1-6 - Wondimu K. Zegeye, Farzad Moazzami:
Authentication of IoT Devices for WiFi Connectivity from the Cloud. 1-6 - Alexandru Dominic Git, Balázs Matuz, Fabian Steiner:
Protograph-Based LDPC Code Design for Probabilistic Shaping with On-Off Keying. 1-6 - Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation. 1-6 - Xi Zhang, Jingqing Wang, H. Vincent Poor:
Statistical QoS-Driven Energy-Efficiency optimization for URLLC Over 5G Mobile Wireless Networks in the Finite Blocklength Regime. 1-6 - Wei Zhou, Michael Lentmaier:
Improving Short-Length LDPC Codes with a CRC and Iterative Ordered Statistic Decoding : (Invited Paper). 1-6 - Jonah Sengupta, Gaspar Tognetti, Philippe O. Pouliquen, Andreas G. Andreou:
Multilevel Storage Cell Characterization and Behavior Modeling of a Crossbar Computational Array in ESF3 Flash Technology : (Invited Paper). 1-5 - Annan Dong, Osvaldo Simeone, Alexander M. Haimovich, Jason A. Dabin:
Sparse Dictionary Learning and Per-source Filtering for Blind Radio Source Separation. 1-5 - Lin Yang, Mohammad Hassan Hajiesmaili, Wing Shing Wong:
Online Linear Programming with Uncertain Constraints : (Invited Paper). 1-6 - Hein Tun, Sergey Lupin, Ko Ko Oo, Myat Min Oo:
Petri Net Approach for Estimation the Information Systems Security Level in Any Logic Environment. 1-6 - Mariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías:
Discretized Density Evolution for Rate Compatible Modulation : Invited Presentation. 1-6 - Shahadate Rezvy, Yuan Luo, Miltos Petridis, Aboubaker Lasebae, Tahmina Zebin:
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.