Stop the war!
Остановите войну!
for scientists:
default search action
GlobalSIP 2013: Austin, TX, USA
- IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013. IEEE 2013, ISBN 978-1-4799-0248-4
- Robert W. Heath Jr., Ahmed H. Tewfik:
General chairs' welcome. - Charles A. Bouman, Robert D. Nowak, Anna Scaglione:
Technical program overview. - Nima Bigdely Shamlo, Kenneth Kreutz-Delgado, Kay Robbins, Makoto Miyakoshi, Marissa Westerfield, Tarik Bel-Bahar, Christian Kothe, Jessica Hsi, Scott Makeig:
Hierarchical Event Descriptor (HED) tags for analysis of event-related EEG studies. 1-4 - Thomas Rognon, Rebecca Strautman, Lauren Jett, Nima Bigdely Shamlo, Scott Makeig, Tony Johnson, Kay Robbins:
CTAGGER: Semi-structured community tagging for annotation and data-mining in event-rich contexts. 5-8 - Philip Davis, Charles D. Creusere, Jim Kroger:
EEG and the human perception of video quality: Impact of channel selection on discrimination. 9-12 - Ervin Sejdic, Luis F. Chaparro:
A compressive sampling approach for brain-machine interfaces based on transcranial Doppler sonography: A case study of resting-state maximal cerebral blood velocity signals. 13-16 - Kyungmin Su, Kay A. Robbins:
Content-based EEG database retrieval using a multiclass SVM classifier. 17-20 - Kareem Shabaik, Vijay Aditya Tadipatri, Ahmed H. Tewfik:
Using feedback in long term trajectory decoding from Local Field Potentials. 21-24 - Nima Bigdely Shamlo, Kenneth Kreutz-Delgado, Christian Kothe, Scott Makeig:
Towards an EEG search engine. 25-28 - Amir Hossein Harati Nejad Torbati, Sung Choi, Masih Tabrizi, Iyad Obeid, Joseph Picone, Mercedes P. Jacobson:
The Temple University Hospital EEG corpus. 29-32 - Shaheen Ahmed, Lenis Mauricio Merino, Zijing Mao, Jia Meng, Kay Robbins, Yufei Huang:
A Deep Learning method for classification of images RSVP events with EEG data. 33-36 - Arash Golibagh Mahyari, Selin Aviyente:
Two-dimensional SVD for event detection in dynamic functional brain networks. 37-40 - Xiaodong Cui, Jia Meng, Manjeet K. Rao, Yidong Chen, Yufei Huang:
Differential analysis of rna methylation sequencing data. 41-42 - Minji Kim, Jonathan G. Ligo, Amin Emad, Farzad Farnoud, Olgica Milenkovic, Venugopal V. Veeravalli:
MetaPar: Metagenomic sequence assembly via iterative reclassification. 43-46 - Xian Fan, Luay Nakhleh, Ken Chen:
Integrated genotyping of structural variation. 47-48 - Zhuoyi Huang, Jin Yu, Fuli Yu:
Cloud processing of 1000 genomes sequencing data using Amazon Web Service. 49-52 - Boris Grinshpun, Jennifer Sims, Peter Canoll, Jeffrey N. Bruce, Peter Sims, Yufeng Shen:
Analyzing T cell repertoire diversity by high-throughput sequencing. 53-56 - Amin Zollanvari, Edward R. Dougherty:
Application of double asymptotics and random matrix theory in error estimation of regularized linear discriminant analysis. 57-59 - David Haughton, Félix Balado:
Security study of keyed DNA data embedding. 60-63 - Soyeon Ahn, Haris Vikalo:
Deterministic sequential Monte Carlo for haplotype inference. 64 - Lori A. Dalton:
Optimal Bayesian feature selection. 65-68 - Arvind Rao:
Exploring relationships between multivariate radiological phenotypes and genetic features: A case-study in Glioblastoma using the Cancer Genome Atlas. 69-72 - Xin Yin, Zhao Song, Karin S. Dorman, Aditya Ramamoorthy:
PREMIER Turbo: Probabilistic error-correction using Markov inference in errored reads using the turbo principle. 73-76 - Tzu-Yu Liu, Ami Wiesel, Alfred O. Hero III:
A sparse multi-class classifier for biomarker screening. 77-80 - Ulisses M. Braga-Neto:
Particle filtering approach to state estimation in Boolean dynamical systems. 81-84 - Ali Sobhi-Afshar, Joseph Xu, John Goutsias:
Identifying deregulated TF/miRNA negative and double-negative feedback loops in prostate cancer. 85-88 - Yijie Wang, Xiaoning Qian:
Identifying overlapping functional modules in biological networks by Markov random walk. 89-92 - Anwoy Kumar Mohanty, Aniruddha Datta, Jijayanagaram Venkatraj:
On the modeling of heterogeneity in cancer tissue. 93 - Navadon Khunlertgit, Byung-Jun Yoon:
Finding robust subnetwork markers that improve cross-dataset performance of cancer classification. 94 - Saad Haider, Ranadip Pal:
Inference of tumor inhibition pathways from drug perturbation data. 95-98 - Lijun Qian, Xiangfang Li, Edward R. Dougherty:
Robust identification of molecularly targeted drug effect coefficient using H∞ filter. 99-102 - Yong-Jun Shin:
Parallel computing for adaptive multi-cellular gene network modeling. 103-104 - Mohammadmahdi R. Yousefi, Ivan Ivanov:
Optimal control of gene regulatory networks with uncertain intervention effects. 105-108 - Vinay Varadan, Vartika Agrawal, Lyndsay N. Harris, Nevenka Dimitrova:
Identification and characterization of gene fusions in breast cancer - A non-trivial pursuit. 109-112 - Nitin K. Singh, Aishwarya Sundaresan, Mathukumalli Vidyasagar:
A sparse Bayesian learning based approach to Inferring Gene Regulatory Networks. 113-116 - D. Tunon, T. Taghavi, Jean-François Chamberland, Gregory H. Huff:
Localization of a single source with orientation-aware smart devices. 117-120 - Charles C. Castello, Joshua R. New, Matt K. Smith:
Autonomous correction of sensor data applied to building technologies using filtering methods. 121-124 - George K. Atia, Shuchin Aeron:
Controlled sensing for sequential estimation. 125-128 - Earnest Akofor, Biao Chen:
On optimal fusion architecture for a two-sensor tandem distributed detection system. 129-132 - Lucas W. Krakow, Ramin Zahedi, Edwin K. P. Chong, Ali Pezeshki:
Adaptive compressive sensing in the presence of noise and erasure. 133-136 - Sijia Liu, Makan Fardad, Engin Masazade, Pramod K. Varshney:
On optimal periodic sensor scheduling for field estimation in wireless sensor networks. 137-140 - Chris Kreucher, Benjamin Shapo:
CRB-optimal sensor placement for multiple passive acoustic arrays. 141-144 - Di Li, Lifeng Lai, Shuguang Cui:
Quickest change detection and identification across a sensor array. 145-148 - Stephan Schlupkothen, Guido Dartmann, Gerd Ascheid:
Exploration with massive sensor swarms. 149-152 - Dionysios S. Kalogerias, Athina P. Petropulu:
MC-MIMO radar: Recoverability and performance bounds. 153-156 - Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
An incentive-based mechanism for location estimation in wireless sensor networks. 157-160 - Theodoros Tsiligkaridis, Brian M. Sadler, Alfred O. Hero III:
Blind collaborative 20 questions for target localization. 161-164 - Zaher M. Kassas, Todd E. Humphreys:
The price of anarchy in active signal landscape map building. 165-168 - Shuangjiang Li, Hairong Qi:
Pattern-based compressed phone sensing. 169-172 - Chong Ding, Jay A. Farrell, Amit K. Roy-Chowdhury:
Capturing high fidelity images in PTZ camera networks. 173-176 - Brian Beck, Robert J. Baxley, Xiaoli Ma:
Regularization techniques for floor plan estimation in Radio Tomographic Imaging. 177-180 - David M. Jun, Douglas L. Jones:
The value of sleeping: A rollout algorithm for sensor scheduling in HMMs. 181-184 - Nithin Sugavanam, Emre Ertin:
Sensor selection and placement in adversarial environment. 185-188 - Dennis L. Wei, Alfred O. Hero III:
A performance guarantee for adaptive estimation of sparse signals. 189-192 - Daphney-Stavroula Zois, Urbashi Mitra:
On the properties of nonlinear POMDPs for active state tracking. 193-196 - Sofia Suvorova, William Moran, Stephen D. Howard, Douglas Cochran:
Control of sensing by navigation on information gradients. 197-200 - Yixuan Zhai, Qing Zhao:
Dynamic search under false alarms. 201-204 - Vikram Krishnamurthy:
Social learning and controlled sensing. 205-208 - Tara Javidi:
Information Acquisition and Utilization Problems. 209-212 - Yue M. Lu:
A framework for adaptive parameter estimation with finite memory. 213-216 - Kyle D. Wesson, Brian L. Evans, Todd E. Humphreys:
A combined symmetric difference and power monitoring GNSS anti-spoofing technique. 217-220 - Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal index policies for quickest localization of anomaly in cyber networks. 221-224 - Mauro Barni, Benedetta Tondi:
The Security Margin: A measure of source distinguishability under adversarial conditions. 225-228 - Richard Al-Bayaty, Patrick Caldwell, O. Patrick Kreidl:
On trusting introductions from a reputable source: A utility-maximizing probabilistic approach. 229-232 - Simon Oya, Carmela Troncoso, Fernando Pérez-González:
Meet the family of statistical disclosure attacks. 233-236 - João Almeida, Gerhard Maierbacher, João Barros:
Designing scalar quantizers with secrecy constraints. 237-240 - Ye Wang, Shantanu Rane, Prakash Ishwar:
On unconditionally secure multiparty computation for realizing correlated equilibria in games. 241-244 - Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate:
Stochastic gradient descent with differentially private updates. 245-248 - Yousof Erfani, Ramin Pichevar, Jean Rouat:
Audio tampering localization using modified iss watermarking in sparse-domain. 249-252 - Amani A. Alahmadi, Muhammad Hussain, Hatim A. Aboalsamh, Muhammad Ghulam, George Bebis:
Splicing image forgery detection based on DCT and Local Binary Pattern. 253-256 - James B. Wendt, Miodrag Potkonjak:
The bidirectional polyomino partitioned PPUF as a hardware security primitive. 257-260 - Oliver Kosut:
Malicious data attacks against dynamic state estimation in the presence of random noise. 261-264 - Hari Ravi, Anoosheh Heidarzadeh, Tracey Ho:
Practical improvements to bus-based strategies for reliable anonymous networking. 265-268 - Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data. 269-272 - Mohamed S. Nafea, Aylin Yener:
Degrees of freedom of the single antenna gaussian wiretap channel with a helper irrespective of the number of antennas at the eavesdropper. 273-276 - Remi A. Chou, Matthieu R. Bloch:
Secret-key generation with arbitrarily varying eavesdropper's channel. 277-280 - Bing-Rong Lin, Daniel Kifer:
Geometry of privacy and utility. 281-284 - Marc Lichtman, Jeffrey H. Reed, T. Charles Clancy, Mark Norton:
Vulnerability of LTE to hostile interference. 285-288 - Tsung-Hui Chang, Angelia Nedic, Anna Scaglione:
Distributed sparse regression by consensus-based primal-dual perturbation optimization. 289-292 - Stanley H. Chan, Thiago B. Costa, Edoardo M. Airoldi:
Estimation of exchangeable graph models by stochastic blockmodel approximation. 293-296 - Disa Mhembere, William R. Gray Roncal, Daniel L. Sussman, Carey E. Priebe, Rex E. Jung, Sephira Ryman, R. Jacob Vogelstein, Joshua T. Vogelstein, Randal C. Burns:
Computing scalable multivariate glocal invariants of large (brain-) graphs. 297-300 - Wuqiong Luo, Wee-Peng Tay:
Estimating infection sources in a network with incomplete observations. 301-304 - Ameya Agaskar, Yue M. Lu:
ALARM: A logistic auto-regressive model for binary processes on networks. 305-308 - Chunxiao Jiang, Yan Chen, Yang Gao, K. J. Ray Liu:
Indian Buffet Game with non-Bayesian social learning. 309-312 - William R. Gray Roncal, Zachary H. Koterba, Disa Mhembere, Dean M. Kleissas, Joshua T. Vogelstein, Randal C. Burns, Anita R. Bowles, Dimitrios K. Donavos, Sephira Ryman, Rex E. Jung, Lei Wu, Vince D. Calhoun, R. Jacob Vogelstein:
MIGRAINE: MRI Graph Reliability Analysis and Inference for Connectomics. 313-316 - Patricia Reynaud-Bouret, Vincent Rivoirard, Christine Tuleau-Malot:
Inference of functional connectivity in Neurosciences via Hawkes processes. 317-320 - Yuejie Chi:
Sparse MIMO radar via structured matrix completion. 321-324 - Lalitha Sankar:
Competitive privacy: Distributed computation with privacy guarantees. 325-328 - Angelia Nedic, Alex Olshevsky:
Distributed optimization of strongly convex functions on directed time-varying graphs. 329-332 - Divya Alok Sharma, Mark Coates:
Contact graph based routing in opportunistic networks. 333-336 - David T. H. Kao:
How local can a node's view be and still guarantee sum-capacity in interference networks? 337-340 - James Sharpnack:
A path algorithm for localizing anomalous activity in graphs. 341-344 - Imtiaz Ahmed, Aïssa Ikhlef, Derrick Wing Kwan Ng, Robert Schober:
Optimal resource allocation for energy harvesting two-way relay systems with channel uncertainty. 345-348 - Zheng Guo, Teng Joon Lim, Mehul Motani:
Base station energy cooperation in green cellular networks. 349-352 - Rahul Vaze:
Transmission capacity of wireless ad hoc networks with energy harvesting nodes. 353-358 - Rajeev Gangula, David Gesbert, Deniz Gündüz:
Optimizing feedback in energy harvesting MISO communication channels. 359-362 - Arin Minasian, Raviraj S. Adve, Shahram ShahbazPanahi:
Optimal resource allocation in energy harvesting amplify-and-forward relay networks. 363-366 - Roy D. Yates, Hajar Mahdavi-Doost:
Energy harvesting receivers: Optimal sampling and decoding policies. 367-370 - Burak Varan, Aylin Yener:
The energy harvesting two-way decode-and-forward relay channel with stochastic data arrivals. 371-374 - Dan Zhao, Chuan Huang, Yue Chen, Shuguang Cui:
Competitive analysis of online throughput maximization schemes for multiple access channels with a shared renewable energy source. 375-378 - Nassar Ksairi, Philippe Ciblat, Christophe J. Le Martret:
Optimal resource allocation for Type-II-HARQ-based OFDMA ad hoc networks. 379-382 - Nikolaos Pappas, Marios Kountouris, Jeongho Jeon, Anthony Ephremides, Apostolos Traganitis:
Network-level cooperation in energy harvesting wireless networks. 383-386 - John Sarik, Kanghwan Kim, Maria Gorlatova, Ioannis Kymissis, Gil Zussman:
More than meets the eye - A portable measurement unit for characterizing light energy availability. 387-390 - Ghada Saleh, Can Emre Koksal, Ness B. Shroff:
Optimal SINR based resource allocation for simultaneous energy and information transfer. 391-394 - Jing Yang:
Optimal collaborative sensing scheduling with energy harvesting nodes. 395-398 - Burak Varan, Aylin Yener:
Two-hop networks with energy harvesting: The (non-)impact of buffer size. 399-402 - Bo Bai, Wei Chen, Zhigang Cao:
Energy-spectral efficient transmission policy for energy harvesting nodes with rate requirement. 403-406 - Mustafa Ozmen, Mustafa Cenk Gursoy:
Energy-efficient power control policies in fading channels with Markov arrivals and QoS constraints. 407-410 - Mohammad Reza Gholami, Erik G. Ström, Ali H. Sayed:
Diffusion estimation over cooperative networks with missing data. 411-414 - Amin Kheradmand, Peyman Milanfar:
A general framework for kernel similarity-based image denoising. 415-418 - David K. Hammond, Yaniv Gur, Chris R. Johnson:
Graph diffusion distance: A difference measure for weighted graphs based on the graph Laplacian exponential kernel. 419-422 - Venkatesan N. Ekambaram, Giulia Fanti, Babak Ayazifar, Kannan Ramchandran:
Wavelet-regularized graph semi-supervised learning. 423-426 - Siheng Chen, Aliaksei Sandryhaila, José M. F. Moura, Jelena Kovacevic:
Adaptive graph filtering: Multiresolution classification on graphs. 427-430 - Moncef Hidane, Olivier Lézoray, Abderrahim Elmoataz:
Lifting scheme on graphs with application to image representation. 431-434 - Shu Yang, Lisa Pham, Lisa M. Christadore, Scott E. Schaus, Eric D. Kolaczyk:
Multiscale gene sets from protein interaction networks. 435-438 - Mohammad Aghagolzadeh, Hayder Radha:
Transitivity based community analysis and detection. 439-442 - James Sharpnack, Aarti Singh:
Near-optimal and computationally efficient detectors for weak and sparse graph-structured patterns. 443-446 - Karim T. Abou-Moustafa, Frank P. Ferrie, Dale Schuurmans:
Divergence based graph estimation for manifold learning. 447-450 - Yu Mao, Gene Cheung, Yusheng Ji:
Graph-based interpolation for DIBR-synthesized images with nonlocal means. 451-454