skip to main content
Skip header Section
Elements of information theoryJanuary 1991
Publisher:
  • Wiley-Interscience
  • 605 Third Avenue New York, NY
  • United States
ISBN:978-0-471-06259-2
Published:02 January 1991
Pages:
542
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Barthe F and Madiman M (2024). Volumes of Subset Minkowski Sums and the Lyusternik Region, Discrete & Computational Geometry, 71:3, (823-848), Online publication date: 1-Apr-2024.
  2. Li Y and Xie W (2024). Best Principal Submatrix Selection for the Maximum Entropy Sampling Problem, Operations Research, 72:2, (493-513), Online publication date: 1-Mar-2024.
  3. Perrone P (2024). Markov Categories and Entropy, IEEE Transactions on Information Theory, 70:3, (1671-1692), Online publication date: 1-Mar-2024.
  4. Sarkar A, Daripa K, Khan M and Noorwali A (2024). An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 28:5, (4413-4433), Online publication date: 1-Mar-2024.
  5. Omid Y, Shahabi S, Pan C, Deng Y and Nallanathan A (2024). Robust Beamforming Design for an IRS-Aided NOMA Communication System With CSI Uncertainty, IEEE Transactions on Wireless Communications, 23:2, (874-889), Online publication date: 1-Feb-2024.
  6. Zhou B, Liu A and So H (2024). Visible Light Communication-Enabled Simultaneous Position and Orientation Detection for Harnessing Multipath Interference and Random Fading, IEEE Transactions on Intelligent Transportation Systems, 25:2, (1938-1952), Online publication date: 1-Feb-2024.
  7. Sreekumar S, Goldfeld Z and Kato K (2024). Limit Distribution Theory for f-Divergences, IEEE Transactions on Information Theory, 70:2, (1233-1267), Online publication date: 1-Feb-2024.
  8. Kontoyiannis I (2024). Context-Tree Weighting and Bayesian Context Trees: Asymptotic and Non-Asymptotic Justifications, IEEE Transactions on Information Theory, 70:2, (1204-1219), Online publication date: 1-Feb-2024.
  9. Borralho R, Quddus A, Mohamed A, Vieira P and Tafazolli R (2024). Coverage and Data Rate Analysis for a Novel Cell-Sweeping-Based RAN Deployment, IEEE Transactions on Wireless Communications, 23:1, (217-230), Online publication date: 1-Jan-2024.
  10. Wei L, Wan S, Wang Z and Yang F (2024). Near-Lossless Compression of Point Cloud Attribute Using Quantization Parameter Cascading and Rate-Distortion Optimization, IEEE Transactions on Multimedia, 26, (3317-3330), Online publication date: 1-Jan-2024.
  11. Bajović D (2024). Inaccuracy Rates for Distributed Inference Over Random Networks With Applications to Social Learning, IEEE Transactions on Information Theory, 70:1, (415-435), Online publication date: 1-Jan-2024.
  12. Tutt J, Taran O, Chaban R, Pulfer B, Belousov Y, Holotyak T and Voloshynovskiy S (2024). Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach, IEEE Transactions on Information Forensics and Security, 19, (3124-3134), Online publication date: 1-Jan-2024.
  13. Li Q, Gundersen J, Lopuhaä-Zwakenberg M and Heusdens R (2024). Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus, IEEE Transactions on Information Forensics and Security, 19, (1780-1793), Online publication date: 1-Jan-2024.
  14. Zeng P and Lin Z (2024). scICML: Information-Theoretic Co-Clustering-Based Multi-View Learning for the Integrative Analysis of Single-Cell Multi-Omics Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 21:1, (200-207), Online publication date: 1-Jan-2024.
  15. ACM
    Lin H, Liu H, Wu J, Li H and Günnemann S (2023). Algorithm 1038: KCC: A MATLAB Package for k-Means-based Consensus Clustering, ACM Transactions on Mathematical Software, 49:4, (1-27), Online publication date: 31-Dec-2024.
  16. Al-Jarrah M, Alsusa E and Masouros C (2023). A Unified Performance Framework for Integrated Sensing-Communications Based on KL-Divergence, IEEE Transactions on Wireless Communications, 22:12, (9390-9411), Online publication date: 1-Dec-2023.
  17. Zhang Y, Zhang Y, Wang J, Xiao S and Tang W (2023). Distance-Angle Beamforming for Covert Communications via Frequency Diverse Array: Toward Two-Dimensional Covertness, IEEE Transactions on Wireless Communications, 22:12, (8559-8574), Online publication date: 1-Dec-2023.
  18. Buvarp A, Taylor R, Mishra K, Mili L and Zaghloul A (2023). Constant Curvature Curve Tube Codes for Low-Latency Analog Error Correction, IEEE Transactions on Information Theory, 69:12, (7738-7754), Online publication date: 1-Dec-2023.
  19. Tasnádi T and Vrana P (2023). Asymptotic Equipartition Property for a Markov Source Having Ambiguous Alphabet, IEEE Transactions on Information Theory, 69:11, (6897-6908), Online publication date: 1-Nov-2023.
  20. ACM
    Ren S, Feng J and Chen H A 3D Model Information Hiding Algorithm Based on Grid Saliency Proceedings of the 7th International Conference on Computer Science and Application Engineering, (1-6)
  21. Brandao E, Duffner S, Emonet R, Habrard A, Jacquenet F and Sebban M Is My Neural Net Driven by the MDL Principle? Machine Learning and Knowledge Discovery in Databases: Research Track, (173-189)
  22. ACM
    Knowles B, D'Cruz J, Richards J and Varshney K (2023). Humble AI, Communications of the ACM, 66:9, (73-79), Online publication date: 1-Sep-2023.
  23. Cohen A and Vitányi P (2023). The Cluster Structure Function, IEEE Transactions on Pattern Analysis and Machine Intelligence, 45:9, (11309-11320), Online publication date: 1-Sep-2023.
  24. Wiȩcek P, Habachi O and Haddad M (2023). To Lie or Not to Lie in Non-Cooperative User-Centric Networks: Is Lying Worth It?, IEEE Transactions on Network and Service Management, 20:3, (3443-3459), Online publication date: 1-Sep-2023.
  25. Zhou L and Hero A (2023). Resolution Limits of Non-Adaptive 20 Questions Search for a Moving Target, IEEE Transactions on Information Theory, 69:9, (5463-5484), Online publication date: 1-Sep-2023.
  26. Hu P, Bordignon V, Vlaski S and Sayed A (2023). Optimal Aggregation Strategies for Social Learning Over Graphs, IEEE Transactions on Information Theory, 69:9, (6048-6070), Online publication date: 1-Sep-2023.
  27. Zaman F, Khalid U, Duong T, Shin H and Win M (2023). Quantum Full-Duplex Communication, IEEE Journal on Selected Areas in Communications, 41:9, (2966-2980), Online publication date: 1-Sep-2023.
  28. Li B, Liu J, Liu Y, Xu H and Wang J (2023). Image encryption algorithm with 2D coupled discrete chaos, Multimedia Tools and Applications, 82:23, (35379-35400), Online publication date: 1-Sep-2023.
  29. Faltings B Game-theoretic mechanisms for eliciting accurate information Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, (6601-6609)
  30. Nicolaides A, Psomas C, Kraidy G, Yang S and Krikidis I (2023). Outage and DMT Analysis of Partition-Based Schemes for RIS-Aided MIMO Fading Channels, IEEE Journal on Selected Areas in Communications, 41:8, (2336-2349), Online publication date: 1-Aug-2023.
  31. Salam M, Basu Roy S and Das G (2023). Efficient approximate top-k mutual information based feature selection, Journal of Intelligent Information Systems, 61:1, (191-223), Online publication date: 1-Aug-2023.
  32. O'Donoghue B Efficient exploration via epistemic-risk-seeking policy optimization Proceedings of the 40th International Conference on Machine Learning, (26382-26402)
  33. Zahabi S, Narimani H and Khosravifard M (2023). On the Shortest Codeword of the Optimal RVLC, IEEE Transactions on Information Theory, 69:7, (4740-4745), Online publication date: 1-Jul-2023.
  34. Huang Y, Rotaru V and Chattopadhyay I (2023). Sequence likelihood divergence for fast time series comparison, Knowledge and Information Systems, 65:7, (3079-3098), Online publication date: 1-Jul-2023.
  35. Mehr N, Wang M, Bhatt M and Schwager M (2023). Maximum-Entropy Multi-Agent Dynamic Games: Forward and Inverse Solutions, IEEE Transactions on Robotics, 39:3, (1801-1815), Online publication date: 1-Jun-2023.
  36. Beemer A, Kılıç A and Ravagnani A (2023). Network Decoding, IEEE Transactions on Information Theory, 69:6, (3708-3730), Online publication date: 1-Jun-2023.
  37. Dai S, Xu W, Hofmann A and Williams B (2023). An empowerment-based solution to robotic manipulation tasks with sparse rewards, Autonomous Robots, 47:5, (617-633), Online publication date: 1-Jun-2023.
  38. Nadakuditi R and Wu H (2023). Free Component Analysis: Theory, Algorithms and Applications, Foundations of Computational Mathematics, 23:3, (973-1042), Online publication date: 1-Jun-2023.
  39. Chen Q, Yu F, Yang T and Liu R (2023). Gaussian and Fading Multiple Access Using Linear Physical-Layer Network Coding, IEEE Transactions on Wireless Communications, 22:5, (3099-3113), Online publication date: 1-May-2023.
  40. Xiang L, Li W, Yang J, Wang X and Li B (2023). Differentially-Private Deep Learning With Directional Noise, IEEE Transactions on Mobile Computing, 22:5, (2599-2612), Online publication date: 1-May-2023.
  41. Bordignon V, Vlaski S, Matta V and Sayed A (2023). Learning From Heterogeneous Data Based on Social Interactions Over Graphs, IEEE Transactions on Information Theory, 69:5, (3347-3371), Online publication date: 1-May-2023.
  42. Nielsen F and Okamura K (2023). On f-Divergences Between Cauchy Distributions, IEEE Transactions on Information Theory, 69:5, (3150-3171), Online publication date: 1-May-2023.
  43. Clifton A, Deb B, Huang Y, Spiro S and Yoo S (2023). Continuously increasing subsequences of random multiset permutations, European Journal of Combinatorics, 110:C, Online publication date: 1-May-2023.
  44. Hsieh C (2023). On asymptotic log-optimal portfolio optimization, Automatica (Journal of IFAC), 151:C, Online publication date: 1-May-2023.
  45. Wang J and Ling C (2023). Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling, Designs, Codes and Cryptography, 91:5, (1779-1811), Online publication date: 1-May-2023.
  46. ACM
    Chai S and Zheng X A Contrarian Trading Strategy: Mean vs. Median Reversion Proceedings of the 2023 7th International Conference on E-Commerce, E-Business and E-Government, (134-138)
  47. Ma J, Li Q, Liu Z, Du L, Chen H and Ansari N (2023). Jamming Modulation: An Active Anti-Jamming Scheme, IEEE Transactions on Wireless Communications, 22:4, (2730-2743), Online publication date: 1-Apr-2023.
  48. Wu X, Jiang B, Zhong Y and Chen H (2023). Multi-Target Markov Boundary Discovery: Theory, Algorithm, and Application, IEEE Transactions on Pattern Analysis and Machine Intelligence, 45:4, (4964-4980), Online publication date: 1-Apr-2023.
  49. Bross S (2023). Source Coding With a Listening-Helper, IEEE Transactions on Information Theory, 69:4, (2135-2151), Online publication date: 1-Apr-2023.
  50. Shi P (2023). Optimal Matchmaking Strategy in Two-Sided Marketplaces, Management Science, 69:3, (1323-1340), Online publication date: 1-Mar-2023.
  51. Jayanth S and Bhat R (2023). Age of Processed Information Minimization Over Fading Multiple Access Channels, IEEE Transactions on Wireless Communications, 22:3, (1664-1676), Online publication date: 1-Mar-2023.
  52. Xiang Y, Xu K, Xia B and Cheng X (2023). Bayesian Joint Channel-and-Data Estimation for Quantized OFDM Over Doubly Selective Channels, IEEE Transactions on Wireless Communications, 22:3, (1523-1536), Online publication date: 1-Mar-2023.
  53. Bordignon V, Matta V and Sayed A (2023). Partial Information Sharing Over Social Learning Networks, IEEE Transactions on Information Theory, 69:3, (2033-2058), Online publication date: 1-Mar-2023.
  54. Congero S and Zeger K (2023). The 3/4 Conjecture for Fix-Free Codes With at Most Three Distinct Codeword Lengths, IEEE Transactions on Information Theory, 69:3, (1452-1485), Online publication date: 1-Mar-2023.
  55. Li K, Yao Y and Hayashi M (2023). Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification, IEEE Transactions on Information Theory, 69:3, (1680-1694), Online publication date: 1-Mar-2023.
  56. Peck J and Waxman D (2023). Homogenizing Entropy Across Different Environmental Conditions: A Universally Applicable Method for Transforming Continuous Variables, IEEE Transactions on Information Theory, 69:3, (1394-1412), Online publication date: 1-Mar-2023.
  57. Pathak N and Kumar R (2023). Entropy guided evolutionary search for solving Sudoku, Progress in Artificial Intelligence, 12:1, (61-76), Online publication date: 1-Mar-2023.
  58. Lian Z, Zhang Y, Li H, Wang R and Hu X (2023). Cross modification attention-based deliberation model for image captioning, Applied Intelligence, 53:5, (5910-5933), Online publication date: 1-Mar-2023.
  59. Zhou J, Shang J and Chen T (2023). Optimal deception attacks on remote state estimators equipped with interval anomaly detectors, Automatica (Journal of IFAC), 148:C, Online publication date: 1-Feb-2023.
  60. Hihn H and Braun D (2022). Hierarchically structured task-agnostic continual learning, Machine Language, 112:2, (655-686), Online publication date: 1-Feb-2023.
  61. ACM
    Erata F, Deng S, Zaghloul F, Xiong W, Demir O and Szefer J (2022). Survey of Approaches and Techniques for Security Verification of Computer Systems, ACM Journal on Emerging Technologies in Computing Systems, 19:1, (1-34), Online publication date: 31-Jan-2023.
  62. Chen C, Garrod O, Schyns P and Jack R Modelling Culturally Diverse Smiles Using Data-Driven Methods 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), (1-4)
  63. Hall G and Massoulié L (2023). Partial Recovery in the Graph Alignment Problem, Operations Research, 71:1, (259-272), Online publication date: 1-Jan-2023.
  64. Canyakmaz C and Boyacı T (2023). Queueing Systems with Rationally Inattentive Customers, Manufacturing & Service Operations Management, 25:1, (266-287), Online publication date: 1-Jan-2023.
  65. Kamble V, Shah N, Marn D, Parekh A and Ramchandran K (2023). The Square Root Agreement Rule for Incentivizing Truthful Feedback on Online Platforms, Management Science, 69:1, (377-403), Online publication date: 1-Jan-2023.
  66. Cirillo M, Bordignon V, Matta V and Sayed A (2023). Memory-Aware Social Learning Under Partial Information Sharing, IEEE Transactions on Signal Processing, 71, (2833-2848), Online publication date: 1-Jan-2023.
  67. Jiang Y and Zhang J (2023). Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks, IEEE Transactions on Information Forensics and Security, 18, (3445-3460), Online publication date: 1-Jan-2023.
  68. Yeh C, Cohen A, D’Oliveira R, Médard M, Mittleman D and Knightly E (2023). Securing Angularly Dispersive Terahertz Links With Coding, IEEE Transactions on Information Forensics and Security, 18, (3546-3560), Online publication date: 1-Jan-2023.
  69. ACM
    Habibian S, Jonnavittula A and Losey D (2022). Here’s What I’ve Learned: Asking Questions that Reveal Reward Learning, ACM Transactions on Human-Robot Interaction, 11:4, (1-28), Online publication date: 31-Dec-2022.
  70. Mitra A, Richards J and Sundaram S A Communication-Efficient Algorithm for Exponentially Fast Non-Bayesian Learning in Networks 2019 IEEE 58th Conference on Decision and Control (CDC), (8347-8352)
  71. Ghasemi M and Topcu U Online Active Perception for Partially Observable Markov Decision Processes with Limited Budget 2019 IEEE 58th Conference on Decision and Control (CDC), (6169-6174)
  72. Farokhi F Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversaries 2019 IEEE 58th Conference on Decision and Control (CDC), (6118-6123)
  73. Karabag M, Ornik M and Topcu U Optimal Deceptive and Reference Policies for Supervisory Control 2019 IEEE 58th Conference on Decision and Control (CDC), (1323-1330)
  74. Gu S, Wang H and Zhou X (2022). Active Learning for Saddle Point Calculation, Journal of Scientific Computing, 93:3, Online publication date: 1-Dec-2022.
  75. Marcelino C and Pedreira C (2022). Feature space partition: a local–global approach for classification, Neural Computing and Applications, 34:24, (21877-21890), Online publication date: 1-Dec-2022.
  76. ACM
    Sangar Y, Biradavolu Y and Krishnaswamy B (2022). A Novel Time-Interval Based Modulation for Large-Scale, Low-Power, Wide-Area-Networks, ACM Transactions on Sensor Networks, 18:4, (1-30), Online publication date: 30-Nov-2022.
  77. Hao B and Lattimore T Regret bounds for information-directed reinforcement learning Proceedings of the 36th International Conference on Neural Information Processing Systems, (28575-28587)
  78. Zheng Y and Lamperski A Constrained langevin algorithms with L-mixing external random variables Proceedings of the 36th International Conference on Neural Information Processing Systems, (20511-20521)
  79. Arumugam D and Singh S Planning to the information horizon of BAMDPs via epistemic state abstraction Proceedings of the 36th International Conference on Neural Information Processing Systems, (20482-20497)
  80. Zheng R, Tang R, Li J and Liu L Pre-activation distributions expose backdoor neurons Proceedings of the 36th International Conference on Neural Information Processing Systems, (18667-18680)
  81. Cabannes V, Bach F, Perchet V and Rudi A Active labeling Proceedings of the 36th International Conference on Neural Information Processing Systems, (17568-17581)
  82. Arumugam D and Van Roy B Deciding what to model Proceedings of the 36th International Conference on Neural Information Processing Systems, (9024-9044)
  83. ACM
    Ziyin L, Minami K and Imajo K Theoretically Motivated Data Augmentation and Regularization for Portfolio Construction Proceedings of the Third ACM International Conference on AI in Finance, (273-281)
  84. Farias V and Gutin E (2022). Optimistic Gittins Indices, Operations Research, 70:6, (3432-3456), Online publication date: 1-Nov-2022.
  85. Russo D and Van Roy B (2022). Satisficing in Time-Sensitive Bandit Learning, Mathematics of Operations Research, 47:4, (2815-2839), Online publication date: 1-Nov-2022.
  86. Shetta O, Niranjan M and Dasmahapatra S (2021). Convex Multi-View Clustering Via Robust Low Rank Approximation With Application to Multi-Omic Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 19:6, (3340-3352), Online publication date: 1-Nov-2022.
  87. Jurkiewicz M (2022). On zero-error codes produced by greedy algorithms, Journal of Combinatorial Optimization, 44:4, (2963-2980), Online publication date: 1-Nov-2022.
  88. ACM
    Haddad M, Wiecek P, Habachi O, Perlaza S and Shah S Fair Iterative Water-Filling Game for Multiple Access Channels Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, (125-132)
  89. ACM
    Mesecan I, Blackwell D, Clark D, Cohen M and Petke J Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, (1-12)
  90. Scheunemann M, Salge C, Polani D and Dautenhahn K (2022). Human perception of intrinsically motivated autonomy in human-robot interaction, Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems, 30:5, (451-472), Online publication date: 1-Oct-2022.
  91. Bahrami S and Tuncel E Trimmed Minimum Error Entropy for Robust Online Regression 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-8)
  92. Hitaj D, Pagnotta G, Hitaj B, Mancini L and Perez-Cruz F MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding Computer Security – ESORICS 2022, (425-444)
  93. Mohan S, Al-Hamdani H and Almamori A (2022). Cyclotomic Construction of Sparse Code Multiple Access With Improved Diversity, International Journal of Interdisciplinary Telecommunications and Networking, 14:1, (1-11), Online publication date: 22-Sep-2022.
  94. ACM
    Atanasijević M, Radović T, Janković M and Barjaktarović M Open-Source Application for Mri and Ct Registration Using Homography Transformation Proceedings of the 9th International Conference on Bioinformatics Research and Applications, (111-115)
  95. Jenul A, Schrunner S, Huynh B, Helin R, Futsæther C, Liland K and Tomic O Ranking Feature-Block Importance in Artificial Multiblock Neural Networks Artificial Neural Networks and Machine Learning – ICANN 2022, (163-175)
  96. Pinot R, Meunier L, Yger F, Gouy-Pailler C, Chevaleyre Y and Atif J (2022). On the robustness of randomized classifiers to adversarial examples, Machine Language, 111:9, (3425-3457), Online publication date: 1-Sep-2022.
  97. Galbrun E (2022). The minimum description length principle for pattern mining: a survey, Data Mining and Knowledge Discovery, 36:5, (1679-1727), Online publication date: 1-Sep-2022.
  98. Carrington A, Fieguth P, Mayr F, James N, Holzinger A, Pickering J and Aviv R The ROC Diagonal is Not Layperson’s Chance: A New Baseline Shows the Useful Area Machine Learning and Knowledge Extraction, (100-113)
  99. Avin C, Mondal K and Schmid S (2022). Demand-Aware Network Design With Minimal Congestion and Route Lengths, IEEE/ACM Transactions on Networking, 30:4, (1838-1848), Online publication date: 1-Aug-2022.
  100. Neely M (2022). A Converse Result on Convergence Time for Opportunistic Wireless Scheduling, IEEE/ACM Transactions on Networking, 30:4, (1540-1553), Online publication date: 1-Aug-2022.
  101. Fageot J, Fallah A and Horel T (2022). Entropic Compressibility of Lévy Processes, IEEE Transactions on Information Theory, 68:8, (4949-4963), Online publication date: 1-Aug-2022.
  102. Tan Z and Zhang X (2022). On Loss Functions and Regret Bounds for Multi-Category Classification, IEEE Transactions on Information Theory, 68:8, (5295-5313), Online publication date: 1-Aug-2022.
  103. Zhang Y, Vatedka S, Jaggi S and Sarwate A (2022). Quadratically Constrained Myopic Adversarial Channels, IEEE Transactions on Information Theory, 68:8, (4901-4948), Online publication date: 1-Aug-2022.
  104. Wang Z, Badiu M and Coon J (2022). A Framework for Characterizing the Value of Information in Hidden Markov Models, IEEE Transactions on Information Theory, 68:8, (5203-5216), Online publication date: 1-Aug-2022.
  105. Zhou L, Bai L and Hero A (2022). Resolution Limits of Non-Adaptive 20 Questions Search for Multiple Targets, IEEE Transactions on Information Theory, 68:8, (4964-4982), Online publication date: 1-Aug-2022.
  106. Pan J, Li Y and Tan V (2022). Asymptotics of Sequential Composite Hypothesis Testing Under Probabilistic Constraints, IEEE Transactions on Information Theory, 68:8, (4998-5012), Online publication date: 1-Aug-2022.
  107. Sun Y, Qin W and Zhuang Z (2021). Nonparametric-copula-entropy and network deconvolution method for causal discovery in complex manufacturing systems, Journal of Intelligent Manufacturing, 33:6, (1699-1713), Online publication date: 1-Aug-2022.
  108. Xu M, Du J, Xue Z, Guan Z, Kou F and Shi L (2022). A scientific research topic trend prediction model based on multi‐LSTM and graph convolutional network, International Journal of Intelligent Systems, 37:9, (6331-6353), Online publication date: 30-Jul-2022.
  109. Hasabelnaby M and Chaaban A (2022). Multi-Pair Computation for Two-Way Intra Cloud Radio-Access Network Communications, IEEE Transactions on Wireless Communications, 21:7, (5586-5599), Online publication date: 1-Jul-2022.
  110. Zhao H, Bazco-Nogueras A and Elia P (2022). Wireless Coded Caching Can Overcome the Worst-User Bottleneck by Exploiting Finite File Sizes, IEEE Transactions on Wireless Communications, 21:7, (5450-5466), Online publication date: 1-Jul-2022.
  111. Ding Z, Xu D, Schober R and Poor H (2022). Hybrid NOMA Offloading in Multi-User MEC Networks, IEEE Transactions on Wireless Communications, 21:7, (5377-5391), Online publication date: 1-Jul-2022.
  112. Cha J, Choi J and Love D (2022). Practical Distributed Reception for Wireless Body Area Networks Using Supervised Learning, IEEE Transactions on Wireless Communications, 21:7, (4898-4908), Online publication date: 1-Jul-2022.
  113. He J, Yu K, Shi Y, Zhou Y, Chen W and Letaief K (2022). Reconfigurable Intelligent Surface Assisted Massive MIMO With Antenna Selection, IEEE Transactions on Wireless Communications, 21:7, (4769-4783), Online publication date: 1-Jul-2022.
  114. Roth S, Arafa A, Sezgin A and Poor H (2022). Short Blocklength Process Monitoring and Scheduling: Resolution and Data Freshness, IEEE Transactions on Wireless Communications, 21:7, (4669-4681), Online publication date: 1-Jul-2022.
  115. ACM
    Lin F and Hsieh H (2022). Traveling Transporter Problem: Arranging a New Circular Route in a Public Transportation System Based on Heterogeneous Non-Monotonic Urban Data, ACM Transactions on Intelligent Systems and Technology, 13:3, (1-25), Online publication date: 30-Jun-2022.
  116. Loyka S and Merhav N The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help at the Decoder 2022 IEEE International Symposium on Information Theory (ISIT), (1040-1045)
  117. Seo D and Kim Y Information and Energy Transmission with Wavelet-Reconstructed Harvesting Functions 2022 IEEE International Symposium on Information Theory (ISIT), (754-759)
  118. Cohen A, D’Oliveira R, Duffy K and Médard M Partial Encryption after Encoding for Security and Reliability in Data Systems 2022 IEEE International Symposium on Information Theory (ISIT), (1779-1784)
  119. Wang X, Al-Bashabsheh A, Zhao C and Chan C Smoothed InfoNCE: Breaking the log N Curse without Overshooting 2022 IEEE International Symposium on Information Theory (ISIT), (724-729)
  120. Venkatesh P and Schamberg G Partial Information Decomposition via Deficiency for Multivariate Gaussians 2022 IEEE International Symposium on Information Theory (ISIT), (2892-2897)
  121. Cohen A, Médard M and Shamai Shitz S Broadcast Approach Meets Network Coding for Data Streaming 2022 IEEE International Symposium on Information Theory (ISIT), (25-30)
  122. Shirani F and Pradhan S Lattices from Linear Codes: Source and Channel Networks 2022 IEEE International Symposium on Information Theory (ISIT), (3238-3243)
  123. Weinberger N and Merhav N The DNA Storage Channel: Capacity and Error Probability Bounds 2022 IEEE International Symposium on Information Theory (ISIT), (1803-1808)
  124. Nicolaides A, Psomas C, Kraidy G and Krikidis I A Partition-based Scheme for IRS-aided MIMO Fading Channels: Outage and DMT Analysis 2022 IEEE International Symposium on Information Theory (ISIT), (2517-2522)
  125. Chen W and Tian C A New Approach to Compute Information Theoretic Outer Bounds and Its Application to Regenerating Codes 2022 IEEE International Symposium on Information Theory (ISIT), (2619-2624)
  126. Bai L, Diao J and Zhou L Achievable Error Exponents for Almost Fixed-Length Binary Classification 2022 IEEE International Symposium on Information Theory (ISIT), (1336-1341)
  127. Mahmood A and Wagner A Lossy Compression with Universal Distortion 2022 IEEE International Symposium on Information Theory (ISIT), (596-601)
  128. Rose C Hide and Seek On A Budget 2022 IEEE International Symposium on Information Theory (ISIT), (1677-1682)
  129. Gu Y, Akao S, Esfahani N, Miao Y and Sakurai K On the Security Properties of Combinatorial All-or-nothing Transforms 2022 IEEE International Symposium on Information Theory (ISIT), (1447-1452)
  130. Wongso S, Ghosh R and Motani M Understanding Deep Neural Networks Using Sliced Mutual Information 2022 IEEE International Symposium on Information Theory (ISIT), (133-138)
  131. Sun Z and Zou S Robust Hypothesis Testing with Kernel Uncertainty Sets 2022 IEEE International Symposium on Information Theory (ISIT), (3309-3314)
  132. ACM
    Guo Q and Tripunitara M The Secrecy Resilience of Access Control Policies and Its Application to Role Mining Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, (115-126)
  133. Goldman C and Bustin R Trusting Explainable Autonomous Driving: Simulated Studies 2022 IEEE Intelligent Vehicles Symposium (IV), (1255-1260)
  134. Rezvani S, Jorswieck E, Yamchi N and Javan M (2022). Optimal SIC Ordering and Power Allocation in Downlink Multi-Cell NOMA Systems, IEEE Transactions on Wireless Communications, 21:6, (3553-3569), Online publication date: 1-Jun-2022.
  135. Rao M and Chaparala A (2022). A Novel Feature-Based SHM Assessment and Predication Approach for Robust Evaluation of Damage Data Diagnosis Systems, Wireless Personal Communications: An International Journal, 124:4, (3387-3411), Online publication date: 1-Jun-2022.
  136. Kumar R, Singh A and Bala M (2022). A secure and robust multilayer network with optimum inter layer links under budget constraints, Multimedia Tools and Applications, 81:14, (19609-19635), Online publication date: 1-Jun-2022.
  137. ACM
    Mohseni M and Maher M A Framework for Exploring Computational Models of Novelty in Unstructured Text Proceedings of the 6th International Conference on Information System and Data Mining, (36-45)
  138. Shienman M and Indelman V D2A-BSP: Distilled Data Association Belief Space Planning with Performance Guarantees Under Budget Constraints 2022 International Conference on Robotics and Automation (ICRA), (11058-11065)
  139. Karabag M, Neary C and Topcu U Planning Not to Talk: Multiagent Systems that are Robust to Communication Loss Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, (705-713)
  140. Zhao R (2022). Accelerated Stochastic Algorithms for Convex-Concave Saddle-Point Problems, Mathematics of Operations Research, 47:2, (1443-1473), Online publication date: 1-May-2022.
  141. ACM
    Hashimoto K, Tsumagari N and Ushio T (2022). Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments, ACM Transactions on Cyber-Physical Systems, 6:2, (1-24), Online publication date: 30-Apr-2022.
  142. ACM
    Saúde J, Ramos G, Boratto L and Caleiro C (2021). A Robust Reputation-Based Group Ranking System and Its Resistance to Bribery, ACM Transactions on Knowledge Discovery from Data, 16:2, (1-35), Online publication date: 30-Apr-2022.
  143. ACM
    Liu H, Hu B, Wang X, Shi C, Zhang Z and Zhou J Confidence May Cheat: Self-Training on Graph Neural Networks under Distribution Shift Proceedings of the ACM Web Conference 2022, (1248-1258)
  144. ACM
    Berke A, Doorley R, Larson K and Moro E Generating synthetic mobility data for a realistic population with RNNs to improve utility and privacy Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (964-967)
  145. Heradio R, Fernandez-Amoros D, Galindo J, Benavides D and Batory D (2022). Uniform and scalable sampling of highly configurable systems, Empirical Software Engineering, 27:2, Online publication date: 1-Mar-2022.
  146. ACM
    Liu Y, Comden J, Liu Z and Yang Y (2021). Online Resource Provisioning for Wireless Data Collection, ACM Transactions on Sensor Networks, 18:1, (1-27), Online publication date: 28-Feb-2022.
  147. ACM
    Lin F and Hsieh H (2021). A Joint Passenger Flow Inference and Path Recommender System for Deploying New Routes and Stations of Mass Transit Transportation, ACM Transactions on Knowledge Discovery from Data, 16:1, (1-36), Online publication date: 28-Feb-2022.
  148. Robbiano C, Chong E, Azimi-Sadjadi M, Scharf L and Pezeshki A (2022). Bayesian Learning of Occupancy Grids, IEEE Transactions on Intelligent Transportation Systems, 23:2, (1073-1084), Online publication date: 1-Feb-2022.
  149. Tsurumaru T (2022). Equivalence of Three Classical Algorithms With Quantum Side Information: Privacy Amplification, Error Correction, and Data Compression, IEEE Transactions on Information Theory, 68:2, (1016-1031), Online publication date: 1-Feb-2022.
  150. Liu H, Ni Y, Xie L and Johansson K (2021). How vulnerable is innovation-based remote state estimation, Automatica (Journal of IFAC), 136:C, Online publication date: 1-Feb-2022.
  151. Bubuianu I, Vacaru S and Veliev E (2022). Quantum geometric information flows and relativistic generalizations of G. Perelman thermodynamics for nonholonomic Einstein systems with black holes and stationary solitonic hierarchies, Quantum Information Processing, 21:2, Online publication date: 1-Feb-2022.
  152. Belakaria S, Deshwal A and Doppa J (2021). Output Space Entropy Search Framework for Multi-Objective Bayesian Optimization, Journal of Artificial Intelligence Research, 72, (667-715), Online publication date: 4-Jan-2022.
  153. Carr S, Jansen N and Topcu U (2021). Task-Aware Verifiable RNN-Based Policies for Partially Observable Markov Decision Processes, Journal of Artificial Intelligence Research, 72, (819-847), Online publication date: 4-Jan-2022.
  154. Bıyık E, Losey D, Palan M, Landolfi N, Shevchuk G and Sadigh D (2022). Learning reward functions from diverse sources of human feedback, International Journal of Robotics Research, 41:1, (45-67), Online publication date: 1-Jan-2022.
  155. Venkatesh Babu S, Ramya P, Gracewell J and Tang Z (2022). Content Deduplication with Granularity Tweak Based on Base and Deviation for Large Text Dataset, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
  156. Zheng X, Wu H and Le T (2022). Autoregressive Linguistic Steganography Based on BERT and Consistency Coding, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  157. Zhao J, Li P, Zhang Q and Gastaldo P (2022). A Fast Decision Algorithm for VVC Intra-Coding Based on Texture Feature and Machine Learning, Computational Intelligence and Neuroscience, 2022, Online publication date: 1-Jan-2022.
  158. Okamoto T and Campos E (2022). A New Quantitative Definition of the Complexity of Organized Matters, Complexity, 2022, Online publication date: 1-Jan-2022.
  159. Khatalin S, Miqdadi H and Liu M (2022). On the Performance of Cooperative Relaying Systems with NOMA in κ−μ Fading Environment, Wireless Communications & Mobile Computing, 2022, Online publication date: 1-Jan-2022.
  160. Kartik D and Mitra U (2022). Fixed-Horizon Active Hypothesis Testing and Anomaly Detection, IEEE Transactions on Signal Processing, 70, (4170-4185), Online publication date: 1-Jan-2022.
  161. Gonzalez M, Silva J, Videla M and Orchard M (2022). Data-Driven Representations for Testing Independence: Modeling, Analysis and Connection With Mutual Information Estimation, IEEE Transactions on Signal Processing, 70, (158-173), Online publication date: 1-Jan-2022.
  162. Menendez H, Boreale M, Gorla D and Clark D (2022). Output Sampling for Output Diversity in Automatic Unit Test Generation, IEEE Transactions on Software Engineering, 48:1, (295-308), Online publication date: 1-Jan-2022.
  163. Salariseddigh M, Pereg U, Boche H and Deppe C (2022). Deterministic Identification Over Channels With Power Constraints, IEEE Transactions on Information Theory, 68:1, (1-24), Online publication date: 1-Jan-2022.
  164. Holzbaur L, Freij-Hollanti R, Li J and Hollanti C (2022). Toward the Capacity of Private Information Retrieval From Coded and Colluding Servers, IEEE Transactions on Information Theory, 68:1, (517-537), Online publication date: 1-Jan-2022.
  165. Hu S, Lou Z and Ye Y (2022). View-Wise Versus Cluster-Wise Weight: Which Is Better for Multi-View Clustering?, IEEE Transactions on Image Processing, 31, (58-71), Online publication date: 1-Jan-2022.
  166. Ma S, Zhang Y, Sheng H, Li H, Shi J, Yang L, Wu Y, Al-Dhahir N and Li S (2022). Optimal Probabilistic Constellation Shaping for Covert Communications, IEEE Transactions on Information Forensics and Security, 17, (3165-3178), Online publication date: 1-Jan-2022.
  167. Chen D, Jiang S, Zhang N, Liu L and Choo K (2022). On Message Authentication Channel Capacity Over a Wiretap Channel, IEEE Transactions on Information Forensics and Security, 17, (3107-3122), Online publication date: 1-Jan-2022.
  168. Dizdar O and Clerckx B (2022). Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems, IEEE Transactions on Information Forensics and Security, 17, (628-643), Online publication date: 1-Jan-2022.
  169. Ondel L, Yusuf B, Burget L and Saraçlar M (2022). Non-Parametric Bayesian Subspace Models for Acoustic Unit Discovery, IEEE/ACM Transactions on Audio, Speech and Language Processing, 30, (1902-1917), Online publication date: 1-Jan-2022.
  170. Shao J, Mao Y and Zhang J (2022). Learning Task-Oriented Communication for Edge Inference: An Information Bottleneck Approach, IEEE Journal on Selected Areas in Communications, 40:1, (197-211), Online publication date: 1-Jan-2022.
  171. Huang Y, Hou Y and Lou W (2022). DELUXE: A DL-Based Link Adaptation for URLLC/eMBB Multiplexing in 5G NR, IEEE Journal on Selected Areas in Communications, 40:1, (143-162), Online publication date: 1-Jan-2022.
  172. Ban M (2021). Temporal steering of a two-level system interacting with a coherent superposition of two environments, Quantum Information Processing, 21:1, Online publication date: 1-Jan-2022.
  173. Iannelli A, Yin M and Smith R Design of input for data-driven simulation with Hankel and Page matrices 2021 60th IEEE Conference on Decision and Control (CDC), (139-145)
  174. Liu Z, Conti A, Mitter S and Win M Networked Filtering with Feedback for Discrete-Time Observations 2021 60th IEEE Conference on Decision and Control (CDC), (5882-5889)
  175. Singh S and Bansal M (2021). Performance analysis of non‐orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation, Transactions on Emerging Telecommunications Technologies, 32:12, Online publication date: 8-Dec-2021.
  176. Letafati M, Behroozi H, Khalaj B and Jorswieck E Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks 2021 IEEE Global Communications Conference (GLOBECOM), (1-6)
  177. Li Y, Wang J, Xiao S, Wu G and Tang W LDL-precoded FTN Signaling with Power Allocation in The Block Fading Channel 2021 IEEE Global Communications Conference (GLOBECOM), (01-06)
  178. Ratti F, Harper C, Magarini M and Pierobon M Optimizing Information Transfer Through Chemical Channels in Molecular Communication 2021 IEEE Global Communications Conference (GLOBECOM), (1-6)
  179. Deshwal A, Belakaria S, Bhat G, Doppa J and Pande P Learning Pareto-Frontier Resource Management Policies for Heterogeneous SoCs: An Information-Theoretic Approach 2021 58th ACM/IEEE Design Automation Conference (DAC), (607-612)
  180. Silver S (2021). Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS, Information Systems Frontiers, 23:6, (1621-1642), Online publication date: 1-Dec-2021.
  181. Subhashini L, Li Y, Zhang J, Atukorale A and Wu Y (2021). Mining and classifying customer reviews: a survey, Artificial Intelligence Review, 54:8, (6343-6389), Online publication date: 1-Dec-2021.
  182. ACM
    Hu Z, Zhang Y and Pan S Footstep-Induced Floor Vibration Dataset Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, (546-551)
  183. Mesecan I, Blackwell D, Clark D, Cohen M and Petke J HyperGI Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, (1358-1362)
  184. ACM
    Nadeem A, Verwer S, Moskal S and Yang S Enabling Visual Analytics via Alert-driven Attack Graphs Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2420-2422)
  185. Ho V, Ho N and Pedersen T (2022). Efficient temporal pattern mining in big time series using mutual information, Proceedings of the VLDB Endowment, 15:3, (673-685), Online publication date: 1-Nov-2021.
  186. Jia Z and Jafar S (2021). On the Capacity of Secure Distributed Batch Matrix Multiplication, IEEE Transactions on Information Theory, 67:11, (7420-7437), Online publication date: 1-Nov-2021.
  187. Qiu M, Huang Y and Yuan J (2021). Discrete Signaling and Treating Interference as Noise for the Gaussian Interference Channel, IEEE Transactions on Information Theory, 67:11, (7253-7284), Online publication date: 1-Nov-2021.
  188. Liu L, Liu Y, Patil P and Yu W (2021). Uplink-Downlink Duality Between Multiple-Access and Broadcast Channels With Compressing Relays, IEEE Transactions on Information Theory, 67:11, (7304-7337), Online publication date: 1-Nov-2021.
  189. Yang X, Belakaria S, Joardar B, Yang H, Doppa J, Pande P, Chakrabarty K and Li H Multi-Objective Optimization of ReRAM Crossbars for Robust DNN Inferencing under Stochastic Noise 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), (1-9)
  190. Roheda S, Krim H, Luo Z and Wu T (2021). Event driven sensor fusion, Signal Processing, 188:C, Online publication date: 1-Nov-2021.
  191. Zhao K, Xu Z, Yan M, Zhang T, Yang D and Li W (2021). A comprehensive investigation of the impact of feature selection techniques on crashing fault residence prediction models, Information and Software Technology, 139:C, Online publication date: 1-Nov-2021.
  192. ACM
    Hu C, Yin M, Liu B, Li X and Ye Y (2021). Identifying Illicit Drug Dealers on Instagram with Large-scale Multimodal Data Fusion, ACM Transactions on Intelligent Systems and Technology, 12:5, (1-23), Online publication date: 31-Oct-2021.
  193. ACM
    Hashemi H, Wang Y and Annavaram M DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (212-224)
  194. ACM
    Li Z, Li G, Li T, Liu S and Gao W Information-Growth Attention Network for Image Super-Resolution Proceedings of the 29th ACM International Conference on Multimedia, (544-552)
  195. Wang J, Jia Z and Jafar S Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis 2021 IEEE Information Theory Workshop (ITW), (1-6)
  196. Corah M and Michael N Scalable Distributed Planning for Multi-Robot, Multi-Target Tracking 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (437-444)
  197. Naghavi Nozad S, Amir Haeri M and Folino G (2021). SDCOR, Knowledge-Based Systems, 228:C, Online publication date: 27-Sep-2021.
  198. ACM
    Barker T, Thomas P and Pierobon M Subjective Information in Life Processes Proceedings of the Eight Annual ACM International Conference on Nanoscale Computing and Communication, (1-6)
  199. Popuri S, Neerchal N, Mehta A and Mousavi A (2021). Density estimation using entropy maximization for semi-continuous data, Digital Signal Processing, 116:C, Online publication date: 1-Sep-2021.
  200. ACM
    Yin Z, Yang Z, Van De Panne M and Yin K (2021). Discovering diverse athletic jumping strategies, ACM Transactions on Graphics, 40:4, (1-17), Online publication date: 31-Aug-2021.
  201. ACM
    Bogomolov E, Kovalenko V, Rebryk Y, Bacchelli A and Bryksin T Authorship attribution of source code: a language-agnostic approach and applicability in software engineering Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (932-944)
  202. ACM
    Deng H, Zou N, Chen W, Feng G, Du M and Hu X Mutual Information Preserving Back-propagation Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, (258-268)
  203. ACM
    Sun M, Xing J, Wang H, Chen B and Zhou J MoCL: Data-driven Molecular Fingerprint via Knowledge-aware Contrastive Learning from Molecular Graph Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, (3585-3594)
  204. Kesavareddigari H and Eryilmaz A (2021). Counter-Intuitive Characteristics of Rational Decision-Making Using Biased Inputs in Information Networks, IEEE/ACM Transactions on Networking, 29:4, (1774-1785), Online publication date: 1-Aug-2021.
  205. Zhou B, Liu A, Lau V, Wen J, Mumtaz S, Bashir A and Ahmed S (2021). Performance Limits of Visible Light-Based Positioning for Internet-of-Vehicles: Time-Domain Localization Cooperation Gain, IEEE Transactions on Intelligent Transportation Systems, 22:8, (5374-5388), Online publication date: 1-Aug-2021.
  206. Tavakkol B and Son Y (2021). Fuzzy kernel K-medoids clustering algorithm for uncertain data objects, Pattern Analysis & Applications, 24:3, (1287-1302), Online publication date: 1-Aug-2021.
  207. Nielsen F and Nock R Computing Statistical Divergences with Sigma Points Geometric Science of Information, (677-684)
  208. Yan Q and Tuninetti D Robust and Secure Cache-aided Private Linear Function Retrieval from Coded Servers 2021 IEEE International Symposium on Information Theory (ISIT), (78-83)
  209. Egan M Dependence Testing via Extremes for Regularly Varying Models 2021 IEEE International Symposium on Information Theory (ISIT), (3044-3049)
  210. Bakırtaş S and Erkip E Database Matching Under Column Deletions 2021 IEEE International Symposium on Information Theory (ISIT), (2720-2725)
  211. Han Y, Urlea M and Loyka S On Optimal Power Allocation for Modulation-Constrained Gaussian Channels 2021 IEEE International Symposium on Information Theory (ISIT), (3109-3114)
  212. Xu H, Yang T, Caire G and Shamai Shitz S Information Bottleneck for an Oblivious Relay with Channel State Information: the Vector Case 2021 IEEE International Symposium on Information Theory (ISIT), (2483-2488)
  213. Asoodeh S, Aliakbarpour M and Calmon F Local Differential Privacy Is Equivalent to Contraction of an $f$-Divergence 2021 IEEE International Symposium on Information Theory (ISIT), (545-550)
  214. Kontoyiannis I, Lim Y, Papakonstantinopoulou K and Szpankowski W Symmetry and the Entropy of Small-World Structures and Graphs 2021 IEEE International Symposium on Information Theory (ISIT), (3026-3031)
  215. Malloy M, Tripathy A and Nowak R Optimal Confidence Sets for the Multinomial Parameter 2021 IEEE International Symposium on Information Theory (ISIT), (2173-2178)
  216. Heidari M, Sreedharan J, Shamir G and Szpankowski W Information Sufficiency via Fourier Expansion 2021 IEEE International Symposium on Information Theory (ISIT), (2774-2779)
  217. Wu K and Wagner A A Practical Coding Scheme for the BSC with Feedback 2021 IEEE International Symposium on Information Theory (ISIT), (136-141)
  218. Tepedelenlioglu C Portfolio Growth Rate and Ergodic Capacity of Fading Channels 2021 IEEE International Symposium on Information Theory (ISIT), (3231-3236)
  219. Dikshtein M, Ordentlich O and Shamai Shitz S The Double-Sided Information-Bottleneck Function 2021 IEEE International Symposium on Information Theory (ISIT), (2495-2500)
  220. Sun Z, Li Q, Zhang R and Zou S A Computationally Efficient Algorithm for Quickest Change Detection in Anonymous Heterogeneous Sensor Networks 2021 IEEE International Symposium on Information Theory (ISIT), (599-604)
  221. Zhang H and Li P Sparse Recovery with Shuffled Labels: Statistical Limits and Practical Estimators 2021 IEEE International Symposium on Information Theory (ISIT), (1760-1765)
  222. Sun Z and Zou S A Data-Driven Approach to Robust Hypothesis Testing Using Kernel MMD Uncertainty Sets 2021 IEEE International Symposium on Information Theory (ISIT), (3056-3061)
  223. Bondaschi M, I Fábrezas A and Dalai M Zero-rate Reliability Function for Mismatched Decoding 2021 IEEE International Symposium on Information Theory (ISIT), (1142-1146)
  224. Taricco G Information Rate Optimization for Joint Relay and Link in Non-Regenerative MIMO Channels* 2021 IEEE International Symposium on Information Theory (ISIT), (3151-3155)
  225. Zhang P and Gao W (2021). Feature relevance term variation for multi-label feature selection, Applied Intelligence, 51:7, (5095-5110), Online publication date: 1-Jul-2021.
  226. ACM
    Teixeira D, Viana A, Almeida J and Alvim M (2021). The Impact of Stationarity, Regularity, and Context on the Predictability of Individual Human Mobility, ACM Transactions on Spatial Algorithms and Systems, 7:4, (1-24), Online publication date: 21-Jun-2021.
  227. ACM
    Anari N, Liu K, Gharan S, Vinzant C and Vuong T Log-concave polynomials IV: approximate exchange, tight mixing times, and near-optimal sampling of forests Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (408-420)
  228. ACM
    Braverman M and Minzer D New separations results for external information Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (248-258)
  229. Kumar V, Kumar Jha R and Jain S (2020). ANGUISH, Transactions on Emerging Telecommunications Technologies, 32:6, Online publication date: 13-Jun-2021.
  230. Van Parys B, Esfahani P and Kuhn D (2020). From Data to Decisions, Management Science, 67:6, (3387-3402), Online publication date: 1-Jun-2021.
  231. Zhang R, Zhang Z, Wang D and Du M (2021). Feature selection with multi-objective genetic algorithm based on a hybrid filter and the symmetrical complementary coefficient, Applied Intelligence, 51:6, (3899-3916), Online publication date: 1-Jun-2021.
  232. ACM
    Uzun E, Yagemann C, Chung S, Kolesnikov V and Lee W Cryptographic Key Derivation from Biometric Inferences for Remote Authentication Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, (629-643)
  233. ACM
    Beliaev M, Bıyık E, Lazar D, Wang W, Sadigh D and Pedarsani R Incentivizing routing choices for safe and efficient transportation in the face of the COVID-19 pandemic Proceedings of the ACM/IEEE 12th International Conference on Cyber-Physical Systems, (187-197)
  234. Imanian G, Pourmina M and Salahi A (2021). Information-Based Node Selection for Joint PCA and Compressive Sensing-Based Data Aggregation , Wireless Personal Communications: An International Journal, 118:2, (1635-1654), Online publication date: 1-May-2021.
  235. ACM
    Mireshghallah F, Taram M, Jalali A, Elthakeb A, Tullsen D and Esmaeilzadeh H Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy Proceedings of the Web Conference 2021, (669-680)
  236. Kochman Y and Wang L On the Communication Exponent of Distributed Testing for Gaussian Correlations 2020 IEEE Information Theory Workshop (ITW), (1-5)
  237. Vora A and Kulkarni A (2021). Minimax Theorems for Finite Blocklength Lossy Joint Source-Channel Coding over an Arbitrarily Varying Channel, Problems of Information Transmission, 57:2, (99-128), Online publication date: 1-Apr-2021.
  238. Li S, Wei Z, Yuan W, Yuan J, Bai B and Ng D On the Achievable Rates of Uplink NOMA with Asynchronized Transmission 2021 IEEE Wireless Communications and Networking Conference (WCNC), (1-7)
  239. Vidal A LDPC Decoders using Non-Uniform Quantizers and Associative Check Node Operations 2021 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  240. Wang C, Hsieh C, Ding Y and Huang S Power Allocation for Downlink NOMA Systems with Imperfect Channel Estimation 2021 IEEE Wireless Communications and Networking Conference (WCNC), (1-7)
  241. Zhang H, Sui Z, Basar E, Yang L and Hanzo L Performance Evaluation of Index Modulation with Single Subcarrier Activation 2021 IEEE Wireless Communications and Networking Conference (WCNC), (1-7)
  242. Qian L, Chi X, Zhao L, Obeed M and Chaaban A (2021). User-Centric Secure Cell Formation for Visible Light Networks With Statistical Delay Guarantees, IEEE Transactions on Wireless Communications, 20:3, (1831-1846), Online publication date: 1-Mar-2021.
  243. Bahrami M and Faraji N (2021). Minimum mean square error estimator for speech enhancement in additive noise assuming Weibull speech priors and speech presence uncertainty, International Journal of Speech Technology, 24:1, (97-108), Online publication date: 1-Mar-2021.
  244. Zellinger W, Moser B and Saminger-Platz S (2021). On generalization in moment-based domain adaptation, Annals of Mathematics and Artificial Intelligence, 89:3-4, (333-369), Online publication date: 1-Mar-2021.
  245. ACM
    Mondal S, Saifullah C, Bhattacharjee A, Rahman M and Roy C Early Detection and Guidelines to Improve Unanswered Questions on Stack Overflow 14th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference), (1-11)
  246. ACM
    Conficconi D, D'Arnese E, Del Sozzo E, Sciuto D and Santambrogio M A Framework for Customizable FPGA-based Image Registration Accelerators The 2021 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (251-261)
  247. de Lima R, Cabrera-Ponce A and Martinez-Carranza J (2021). Parallel hashing-based matching for real-time aerial image mosaicing, Journal of Real-Time Image Processing, 18:1, (143-156), Online publication date: 1-Feb-2021.
  248. Wickramasinghe I and Kalutarage H (2021). Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:3, (2277-2293), Online publication date: 1-Feb-2021.
  249. Zhang X, Centenaro M, Tomasin S, Benvenuto N, Luo X and Yang S (2019). A study on CSI feedback schemes exploiting feedforward information in FDD cellular systems, Transactions on Emerging Telecommunications Technologies, 32:1, Online publication date: 13-Jan-2021.
  250. Chen X, Li H, Qu J and Razi A Boosting Belief Propagation for LDPC Codes with Deep Convolutional Neural Network Predictors 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), (1-6)
  251. Lou C, Cao M, Wu R, Chen D, Xu H and Meng W (2021). A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication, Wireless Communications & Mobile Computing, 2021, Online publication date: 1-Jan-2021.
  252. Song S, Chen X, Tang Z, Todo Y and Maex R (2021). A Two-Stage Method Based on Multiobjective Differential Evolution for Gene Selection, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
  253. Amiridi M, Kargas N and Sidiropoulos N (2021). Information-Theoretic Feature Selection via Tensor Decomposition and Submodularity, IEEE Transactions on Signal Processing, 69, (6195-6205), Online publication date: 1-Jan-2021.
  254. Nguyen H, Rezatofighi H, Vo B and Ranasinghe D (2021). Distributed Multi-Object Tracking Under Limited Field of View Sensors, IEEE Transactions on Signal Processing, 69, (5329-5344), Online publication date: 1-Jan-2021.
  255. van de Laar T, Özçelikkale A and Wymeersch H (2021). Application of the Free Energy Principle to Estimation and Control, IEEE Transactions on Signal Processing, 69, (4234-4244), Online publication date: 1-Jan-2021.
  256. Addabbo P, Han S, Biondi F, Giunta G and Orlando D (2021). Adaptive Radar Detection in the Presence of Multiple Alternative Hypotheses Using Kullback-Leibler Information Criterion-Part I: Detector Designs, IEEE Transactions on Signal Processing, 69, (3730-3741), Online publication date: 1-Jan-2021.
  257. Robbiano C, Azimi-Sadjadi M and Chong E (2021). Information-Theoretic Interactive Sensing and Inference for Autonomous Systems, IEEE Transactions on Signal Processing, 69, (5627-5637), Online publication date: 1-Jan-2021.
  258. Leshem A and Erez U (2021). The Interference Channel Revisited: Aligning Interference by Adjusting Antenna Separation, IEEE Transactions on Signal Processing, 69, (1874-1884), Online publication date: 1-Jan-2021.
  259. Aubry A, Braca P, d’Afflisio E, De Maio A, Millefiori L and Willett P (2021). Optimal Opponent Stealth Trajectory Planning Based on an Efficient Optimization Technique, IEEE Transactions on Signal Processing, 69, (270-283), Online publication date: 1-Jan-2021.
  260. Guo F and Richardson T (2020). Chernoff-Type Concentration of Empirical Probabilities in Relative Entropy, IEEE Transactions on Information Theory, 67:1, (549-558), Online publication date: 1-Jan-2021.
  261. Sutter D, Fawzi O and Renner R (2020). Bounds on Lyapunov Exponents via Entropy Accumulation, IEEE Transactions on Information Theory, 67:1, (10-24), Online publication date: 1-Jan-2021.
  262. Murguia C, Shames I, Farokhi F, Nešić D and Poor H (2021). On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach, IEEE Transactions on Information Forensics and Security, 16, (2608-2620), Online publication date: 1-Jan-2021.
  263. Zhu Q, Chen M, Wong C and Wu M (2020). Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications, IEEE Transactions on Information Forensics and Security, 16, (1174-1189), Online publication date: 1-Jan-2021.
  264. Xie N, Chen C and Ming Z (2021). Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels, IEEE Transactions on Dependable and Secure Computing, 18:1, (253-268), Online publication date: 1-Jan-2021.
  265. Wang Y, Zhu G, Li J, Conti M and Huang J (2021). Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole, IEEE Transactions on Circuits and Systems for Video Technology, 31:1, (76-87), Online publication date: 1-Jan-2021.
  266. Jati A, Nadarajan A, Peri R, Mundnich K, Feng T, Girault B and Narayanan S (2021). Temporal Dynamics of Workplace Acoustic Scenes: Egocentric Analysis and Prediction, IEEE/ACM Transactions on Audio, Speech and Language Processing, 29, (756-769), Online publication date: 1-Jan-2021.
  267. Lu Y, Cheng P, Chen Z, Mow W, Li Y and Vucetic B (2020). Deep Multi-Task Learning for Cooperative NOMA: System Design and Principles, IEEE Journal on Selected Areas in Communications, 39:1, (61-78), Online publication date: 1-Jan-2021.
  268. Causevic V and Hirche S Distributed Optimal Control over Bit-rate Constrained Networks with Communication delay 2020 59th IEEE Conference on Decision and Control (CDC), (724-730)
  269. Murguia C and Tabuada P Privacy Against Adversarial Classification in Cyber-Physical Systems 2020 59th IEEE Conference on Decision and Control (CDC), (5483-5488)
  270. Vankayala S, Potnis G, Shenoy K, Yoon S and Kumar S A Novel Front-haul Bandwidth Compression Method for RAN Systems 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), (1-5)
  271. ACM
    Bauer L and Bindschaedler V Towards Realistic Membership Inferences: The Case of Survey Data Annual Computer Security Applications Conference, (116-128)
  272. Yang P and Yang H Low-Complexity Weighted Sum-Rate Maximization of MIMO MAC with Finite-Alphabet Inputs GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-5)
  273. Zhang X and Vaezi M A DNN-based Multi-Objective Precoding for Gaussian MIMO Networks GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  274. Zhang G, Han Z and Xin H Power Control for NOMA HAP-UAV Integrated Aerial Access Networks GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  275. Wang Z, Badiu M and Coon J A Value of Information Framework for Latent Variable Models GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  276. Chang W and Tandon R MAC Aware Quantization for Distributed Gradient Descent GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  277. Liu M, Zhou X and Sun M A Game-Theoretic Approach to Achieving Bilateral Privacy-Utility Tradeoff in Spectrum Sharing GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  278. Ratti F, Scalia G, Pernici B and Magarini M A Data-driven Approach to Optimize Bounds on the Capacity of the Molecular Channel GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-7)
  279. Martins A, Farinhas A, Treviso M, Niculae V, Aguiar P and Figueiredo M Sparse and continuous attention mechanisms Proceedings of the 34th International Conference on Neural Information Processing Systems, (20989-21001)
  280. Wu T, Ren H, Li P and Leskovec J Graph information bottleneck Proceedings of the 34th International Conference on Neural Information Processing Systems, (20437-20448)
  281. Hafez-Kolahi H, Golgooni Z, Kasaei S and Baghshah M Conditioning and processing Proceedings of the 34th International Conference on Neural Information Processing Systems, (16457-16467)
  282. Flamich G, Havasi M and Hernández-Lobato J Compressing images by encoding their latent representations with relative entropy coding Proceedings of the 34th International Conference on Neural Information Processing Systems, (16131-16141)
  283. Zhao L, Liu T, Peng X and Metaxas D Maximum-entropy adversarial data augmentation for improved generalization and robustness Proceedings of the 34th International Conference on Neural Information Processing Systems, (14435-14447)
  284. Richter L, Boustati A, Nüsken N, Ruiz F and Akyildiz Ö VarGrad Proceedings of the 34th International Conference on Neural Information Processing Systems, (13481-13492)
  285. Mentzer F, Toderici G, Tschannen M and Agustsson E High-fidelity generative image compression Proceedings of the 34th International Conference on Neural Information Processing Systems, (11913-11924)
  286. Wang Z, Dai B, Wipf D and Zhu J Further analysis of outlier detection with deep generative models Proceedings of the 34th International Conference on Neural Information Processing Systems, (8982-8992)
  287. Xu T, Wenliang L, Munn M and Acciaio B COT-GAN Proceedings of the 34th International Conference on Neural Information Processing Systems, (8798-8809)
  288. Tao R, François-Lavet V and Pineau J Novelty search in representational space for sample efficient exploration Proceedings of the 34th International Conference on Neural Information Processing Systems, (8114-8126)
  289. Kamath G, Baharav T and Shomorony I Adaptive learning of rank-one models for efficient pairwise sequence alignment Proceedings of the 34th International Conference on Neural Information Processing Systems, (7513-7525)
  290. Goel S, Klivans A and Koehler F From boltzmann machines to neural networks and back again Proceedings of the 34th International Conference on Neural Information Processing Systems, (6354-6365)
  291. Sinclair S, Wang T, Jain G, Banerjee S and Yu C Adaptive Discretization for Model-Based Reinforcement Learning Proceedings of the 34th International Conference on Neural Information Processing Systems, (3858-3871)
  292. Wang Z, Chen X, Wen R, Huang S, Kuruoglu E and Zheng Y Information theoretic counterfactual learning from missing-not-at-random feedback Proceedings of the 34th International Conference on Neural Information Processing Systems, (1854-1864)
  293. Jonsson A, Kaufmann E, Ménard P, Domingues O, Leurent E and Valko M Planning in Markov decision processes with gap-dependent sample complexity Proceedings of the 34th International Conference on Neural Information Processing Systems, (1253-1263)
  294. Jia Y, Ye C and Cui Y (2020). Analysis and Optimization of an Intelligent Reflecting Surface-Assisted System With Interference, IEEE Transactions on Wireless Communications, 19:12, (8068-8082), Online publication date: 1-Dec-2020.
  295. Liang Q, Liu D and Hu J (2020). Secure Degrees of Freedom of MIMO Two-Way Wiretap Channel With no CSI Anywhere, IEEE Transactions on Wireless Communications, 19:12, (7927-7941), Online publication date: 1-Dec-2020.
  296. Molina-Coronado B, Mori U, Mendiburu A and Miguel-Alonso J (2020). Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process, IEEE Transactions on Network and Service Management, 17:4, (2451-2479), Online publication date: 1-Dec-2020.
  297. Mezghani A, Nossek J and Swindlehurst A (2020). Low SNR Asymptotic Rates of Vector Channels With One-Bit Outputs, IEEE Transactions on Information Theory, 66:12, (7615-7634), Online publication date: 1-Dec-2020.
  298. Salek F, Hsieh M and Fonollosa J (2020). Single-Serving Quantum Broadcast Channel With Common, Individualized, and Confidential Messages, IEEE Transactions on Information Theory, 66:12, (7752-7771), Online publication date: 1-Dec-2020.
  299. Cho K, Lee S and Tan V (2020). Throughput Scaling of Covert Communication Over Wireless Adhoc Networks, IEEE Transactions on Information Theory, 66:12, (7684-7701), Online publication date: 1-Dec-2020.
  300. Verhaeghe H, Nijssen S, Pesant G, Quimper C and Schaus P (2020). Learning optimal decision trees using constraint programming, Constraints, 25:3-4, (226-250), Online publication date: 1-Dec-2020.
  301. Li T and Ma J Functional Data Clustering Analysis via the Learning of Gaussian Processes with Wasserstein Distance Neural Information Processing, (393-403)
  302. Black P, Sohail A, Gondal I, Kamruzzaman J, Vamplew P and Watters P API Based Discrimination of Ransomware and Benign Cryptographic Programs Neural Information Processing, (177-188)
  303. Dhar P, Bansal A, Castillo C, Gleason J, Phillips P and Chellappa R How are attributes expressed in face DCNNs? 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020), (85-92)
  304. Hubáček P, Kamath C, Král K and Slívová V On Average-Case Hardness in from One-Way Functions Theory of Cryptography, (614-638)
  305. ACM
    Abdelhadi A Multicasting Information for Internet of Things Wireless Networks Proceedings of the 9th International Conference on Software and Information Engineering, (152-158)
  306. ACM
    Lopuhaä-Zwakenberg M, Li Z, Škorić B and Li N Improving Frequency Estimation under Local Differential Privacy Proceedings of the 19th Workshop on Privacy in the Electronic Society, (123-135)
  307. Bourne J, Goodell M, He X, Steiner J and Leang K (2021). Decentralized Multi-agent information-theoretic control for target estimation and localization, International Journal of Robotics Research, 39:13, (1525-1548), Online publication date: 1-Nov-2020.
  308. Hu L, Hu P, Luo X, Yuan X and You Z (2020). Incorporating the Coevolving Information of Substrates in Predicting HIV-1 Protease Cleavage Sites, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 17:6, (2017-2028), Online publication date: 1-Nov-2020.
  309. Ban M (2020). Decoherence of a two-level system in a coherent superposition of two dephasing environments, Quantum Information Processing, 19:11, Online publication date: 1-Nov-2020.
  310. Zhou H and Wen J (2020). Dynamic feature selection method with minimum redundancy information for linear data, Applied Intelligence, 50:11, (3660-3677), Online publication date: 1-Nov-2020.
  311. Mandros P, Boley M and Vreeken J (2020). Discovering dependencies with reliable mutual information, Knowledge and Information Systems, 62:11, (4223-4253), Online publication date: 1-Nov-2020.
  312. Omidvar-Tehrani B, Amer-Yahia S and Lakshmanan L (2020). Cohort analytics: efficiency and applicability, The VLDB Journal — The International Journal on Very Large Data Bases, 29:6, (1527-1550), Online publication date: 1-Nov-2020.
  313. Ban M (2020). Relaxation process of a two-level system in a coherent superposition of two environments, Quantum Information Processing, 19:10, Online publication date: 30-Oct-2020.
  314. Kepler M and Stilwell D An Approach to Reduce Communication for Multi-agent Mapping Applications 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (4814-4820)
  315. ACM
    Chen C, Garrod O, Ince R, Foster M, Schyns P and Jack R Building Culturally-Valid Dynamic Facial Expressions for a Conversational Virtual Agent Using Human Perception Proceedings of the 20th ACM International Conference on Intelligent Virtual Agents, (1-3)
  316. Chen C, Wang Z and Li W (2020). Tracking Dynamics of Opinion Behaviors with a Content-Based Sequential Opinion Influence Model, IEEE Transactions on Affective Computing, 11:4, (627-639), Online publication date: 1-Oct-2020.
  317. Boyadzhiyska S, Das S and Szabó T (2020). Enumerating extensions of mutually orthogonal Latin squares, Designs, Codes and Cryptography, 88:10, (2187-2206), Online publication date: 1-Oct-2020.
  318. Gómez P, Londral A, Gómez A, Palacios D and Rodellar V (2018). Monitoring ALS from speech articulation kinematics, Neural Computing and Applications, 32:20, (15801-15812), Online publication date: 1-Oct-2020.
  319. ACM
    Amato F, Guignard F, Humphrey V and Kanevski M Spatio-temporal evolution of global surface temperature distributions Proceedings of the 10th International Conference on Climate Informatics, (37-43)
  320. ACM
    Ahsen M, Chun Y, Grishin A, Grishina G, Stolovitzky G, Pandey G and Bunyavanich S NeTFactor, a framework for identifying transcriptional regulators of gene expression-based biomarkers Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, (1-13)
  321. Hafez W Information Digital Twin—Enabling Agents to Anticipate Changes in Their Tasks Artificial General Intelligence, (183-192)
  322. Ordozgoiti B and Muñoz L Off-the-Grid: Fast and Effective Hyperparameter Search for Kernel Clustering Machine Learning and Knowledge Discovery in Databases, (399-415)
  323. Cui J, Boussetta K and Valois F (2021). Classification of data aggregation functions in wireless sensor networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 178:C, Online publication date: 4-Sep-2020.
  324. Modaresi S, Sauré D and Vielma J (2020). Learning in Combinatorial Optimization, Operations Research, 68:5, (1585-1604), Online publication date: 1-Sep-2020.
  325. Yu K, Liu L, Li J, Ding W and Le T (2020). Multi-Source Causal Feature Selection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:9, (2240-2256), Online publication date: 1-Sep-2020.
  326. Zheng S, Cagnazzo M and Kieffer M (2020). Channel Impulsive Noise Mitigation for Linear Video Coding Schemes, IEEE Transactions on Circuits and Systems for Video Technology, 30:9, (3196-3209), Online publication date: 1-Sep-2020.
  327. Wu X, Cai Y, Li Q, Xu J and Leung H (2020). Combining weighted category-aware contextual information in convolutional neural networks for text classification, World Wide Web, 23:5, (2815-2834), Online publication date: 1-Sep-2020.
  328. Lin M, Ji R, Liu H, Sun X, Chen S and Tian Q (2020). Hadamard Matrix Guided Online Hashing, International Journal of Computer Vision, 128:8-9, (2279-2306), Online publication date: 1-Sep-2020.
  329. Feyzi F (2020). CGT-FL: using cooperative game theory to effective fault localization in presence of coincidental correctness, Empirical Software Engineering, 25:5, (3873-3927), Online publication date: 1-Sep-2020.
  330. Kadiri S, Gangamohan P, Gangashetty S, Alku P and Yegnanarayana B (2020). Excitation Features of Speech for Emotion Recognition Using Neutral Speech as Reference, Circuits, Systems, and Signal Processing, 39:9, (4459-4481), Online publication date: 1-Sep-2020.
  331. Estiri H, Vasey S and Murphy S Transitive Sequential Pattern Mining for Discrete Clinical Data Artificial Intelligence in Medicine, (414-424)
  332. ACM
    Belth C, Zheng X and Koutra D Mining Persistent Activity in Continually Evolving Networks Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (934-944)
  333. Gadelha M, RoyChowdhury A, Sharma G, Kalogerakis E, Cao L, Learned-Miller E, Wang R and Maji S Label-Efficient Learning on Point Clouds Using Approximate Convex Decompositions Computer Vision – ECCV 2020, (473-491)
  334. Dellaert F, Rosen D, Wu J, Mahony R and Carlone L Shonan Rotation Averaging: Global Optimality by Surfing Computer Vision – ECCV 2020, (292-308)
  335. Tavassolipour M, Motahari S and Shalmani M (2020). Learning of Gaussian Processes in Distributed and Communication Limited Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:8, (1928-1941), Online publication date: 1-Aug-2020.
  336. Sazim S and Agrawal P (2020). Quantum mutual information and quantumness vectors for multiqubit systems, Quantum Information Processing, 19:8, Online publication date: 31-Jul-2020.
  337. Zhu S, Zhang X and Evans D Learning adversarially robust representations via worst-case mutual information maximization Proceedings of the 37th International Conference on Machine Learning, (11609-11618)
  338. Zhong Z, Cheung W and Tan V Best arm identification for cascading bandits in the fixed confidence setting Proceedings of the 37th International Conference on Machine Learning, (11481-11491)
  339. Yang Y, Bamler R and Mandt S Variational Bayesian quantization Proceedings of the 37th International Conference on Machine Learning, (10670-10680)
  340. Wang R, He X, Yu R, qiu W, An B and Rabinovich Z Learning efficient multi-agent communication Proceedings of the 37th International Conference on Machine Learning, (9908-9918)
  341. Shao W, Tang S, Pan X, Tan P, Wang X and Luo P Channel equilibrium networks for learning deep representation Proceedings of the 37th International Conference on Machine Learning, (8645-8654)
  342. Pitis S, Chan H, Zhao S, Stadie B and Ba J Maximum entropy gain exploration for long horizon multi-goal reinforcement learning Proceedings of the 37th International Conference on Machine Learning, (7750-7761)
  343. Kharitonov E, Chaabouni R, Bouchacourt D and Baroni M Entropy minimization in emergent languages Proceedings of the 37th International Conference on Machine Learning, (5220-5230)
  344. Huang S, Makhzani A, Cao Y and Grosse R Evaluating Lossy compression rates of deep generative models Proceedings of the 37th International Conference on Machine Learning, (4444-4454)
  345. Hoang Q, Le T and Phung D Parameterized rate-distortion stochastic encoder Proceedings of the 37th International Conference on Machine Learning, (4293-4303)
  346. Hao Y and Orlitsky A Data amplification Proceedings of the 37th International Conference on Machine Learning, (4049-4059)
  347. Dutta S, Wei D, Yueksel H, Chen P, Liu S and Varshney K Is there a trade-off between fairness and accuracy? a perspective using mismatched hypothesis testing Proceedings of the 37th International Conference on Machine Learning, (2803-2813)
  348. ACM
    Khatiwada S, Tushev M and Mahmoud A On Combining IR Methods to Improve Bug Localization Proceedings of the 28th International Conference on Program Comprehension, (252-262)
  349. Neely M A Converse Result on Convergence Time for Opportunistic Wireless Scheduling IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (40-48)
  350. Vestergaard R, Lucani D and Zhang Q A Randomly Accessible Lossless Compression Scheme for Time-Series Data IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (2145-2154)
  351. Liu D and Bagh A (2020). Preserving Bidder Privacy in Assignment Auctions, Management Science, 66:7, (3162-3182), Online publication date: 1-Jul-2020.
  352. Gao H, Xiao K, Xia B and Chen Z (2020). Mutual Information Analysis of Mixed-ADC MIMO Systems Over Rayleigh Channels Based on Random Matrix Theory, IEEE Transactions on Wireless Communications, 19:7, (4894-4906), Online publication date: 1-Jul-2020.
  353. Chen J and Shu T (2020). Statistical Modeling and Analysis on the Confidentiality of Indoor VLC Systems, IEEE Transactions on Wireless Communications, 19:7, (4744-4757), Online publication date: 1-Jul-2020.
  354. Domanovitz E and Erez U (2020). Simple Bounds for the Symmetric Capacity of the Rayleigh Fading Multiple Access Channel, IEEE Transactions on Wireless Communications, 19:7, (4594-4603), Online publication date: 1-Jul-2020.
  355. Kawakita M and Takeuchi J (2020). Minimum Description Length Principle in Supervised Learning With Application to Lasso, IEEE Transactions on Information Theory, 66:7, (4245-4269), Online publication date: 1-Jul-2020.
  356. He H, Zhou L and Tan V (2020). Distributed Detection With Empirically Observed Statistics, IEEE Transactions on Information Theory, 66:7, (4349-4367), Online publication date: 1-Jul-2020.
  357. Wu H, Zhang Y, Liao X, Shen Y and Jiang X (2020). On covert throughput performance of two-way relay covert wireless communications, Wireless Networks, 26:5, (3275-3289), Online publication date: 1-Jul-2020.
  358. Murer P and Loeliger H Online Memorization of Random Firing Sequences by a Recurrent Neural Network 2020 IEEE International Symposium on Information Theory (ISIT), (2504-2509)
  359. Berg T, Ordentlich O and Shayevitz O Binary Hypothesis Testing with Deterministic Finite-Memory Decision Rules 2020 IEEE International Symposium on Information Theory (ISIT), (1259-1264)
  360. Bondaschi M and Dalai M Revisiting Zero-Rate Bounds on the Reliability Function of Discrete Memoryless Channels 2020 IEEE International Symposium on Information Theory (ISIT), (2143-2148)
  361. Yoshida Y and Hayashi M Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms 2020 IEEE International Symposium on Information Theory (ISIT), (1973-1977)
  362. Salman M and Varanasi M On the Capacity Region of the Three-Receiver Broadcast Channel With Receiver Message Cognition 2020 IEEE International Symposium on Information Theory (ISIT), (1486-1491)
  363. Kartik D, Nayyar A and Mitra U Testing for Anomalies: Active Strategies and Non-asymptotic Analysis 2020 IEEE International Symposium on Information Theory (ISIT), (1277-1282)
  364. Wu C and Santhanam N Entropy property testing with finitely many errors 2020 IEEE International Symposium on Information Theory (ISIT), (2568-2573)
  365. Fang S and Zhu Q A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises 2020 IEEE International Symposium on Information Theory (ISIT), (2055-2060)
  366. Watanabe K Discrete Optimal Reconstruction Distributions for Itakura-Saito Distortion Measure 2020 IEEE International Symposium on Information Theory (ISIT), (2399-2404)
  367. Elshafiy A, Namazi M and Rose K On Effective Stochastic Mechanisms for On-The-Fly Codebook Regeneration 2020 IEEE International Symposium on Information Theory (ISIT), (2450-2455)
  368. Buyukates B, Bastopcu M and Ulukus S Optimal Selective Encoding for Timely Updates with Empty Symbol 2020 IEEE International Symposium on Information Theory (ISIT), (1794-1799)
  369. Narayanan V, Mishra M and Prabhakaran V Private Two-Terminal Hypothesis Testing 2020 IEEE International Symposium on Information Theory (ISIT), (1001-1006)
  370. Ding Q, Jaggi S, Vatedka S and Zhang Y Empirical Properties of Good Channel Codes 2020 IEEE International Symposium on Information Theory (ISIT), (2337-2342)
  371. Kim Y and Feng Y Capacity of Multicarrier Faster-than-Nyquist Signaling 2020 IEEE International Symposium on Information Theory (ISIT), (2049-2054)
  372. Aharoni Z, Tsur D, Goldfeld Z and Permuter H Capacity of Continuous Channels with Memory via Directed Information Neural Estimator 2020 IEEE International Symposium on Information Theory (ISIT), (2014-2019)
  373. Arafa A, Banawan K, Seddik K and Vincent Poor H Timely Estimation Using Coded Quantized Samples 2020 IEEE International Symposium on Information Theory (ISIT), (1812-1817)
  374. Bastopcu M and Ulukus S Partial Updates: Losing Information for Freshness 2020 IEEE International Symposium on Information Theory (ISIT), (1800-1805)
  375. Villacrés G, Koch T and Vazquez-Vilar G Bursty Wireless Networks of Bounded Capacity 2020 IEEE International Symposium on Information Theory (ISIT), (2959-2964)
  376. Kőrösi A, Gulyás A, Heszberger Z, Bíró J and Rétvári G (2020). On the Memory Requirement of Hop-by-Hop Routing: Tight Bounds and Optimal Address Spaces, IEEE/ACM Transactions on Networking, 28:3, (1353-1363), Online publication date: 1-Jun-2020.
  377. Abiodun E, Jantan A, Abiodun O and Arshad H (2020). Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp, Wireless Personal Communications: An International Journal, 112:4, (2533-2556), Online publication date: 1-Jun-2020.
  378. Liu J, Wang J, Nie W, Su Y and Liu A (2019). An End-to-End Perceptual Quality Assessment Method via Score Distribution Prediction, Neural Processing Letters, 51:3, (2123-2137), Online publication date: 1-Jun-2020.
  379. Avin C, Mondal K and Schmid S (2019). Demand-aware network designs of bounded degree, Distributed Computing, 33:3-4, (311-325), Online publication date: 1-Jun-2020.
  380. Meng Y and Wang Z Contextual Multi-armed Bandit Based Pricing Scheme for Cooperative D2D Communications 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  381. Huynh N, Hoang D, Nguyen D, Dutkiewicz E and Mueck M Defeating Smart and Reactive Jammers with Unlimited Power 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  382. Kang Y, Seo H and Choi W Optimal Receive Beamwidth for Time Varying Vehicular Channels 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  383. Mungloo-Dilmohamud Z, Jaufeerally-Fakim Y and Peña-Reyes C Stability of Feature Selection Methods: A Study of Metrics Across Different Gene Expression Datasets Bioinformatics and Biomedical Engineering, (659-669)
  384. Ciba M, Bestel R, Nick C, de Arruda G, Peron T, Henrique C, Costa L, Rodrigues F and Thielemann C (2020). Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity, Neural Computation, 32:5, (887-911), Online publication date: 1-May-2020.
  385. Mustafa A, Modares H and Moghadam R (2020). Resilient synchronization of distributed multi-agent systems under attacks, Automatica (Journal of IFAC), 115:C, Online publication date: 1-May-2020.
  386. Halbersberg D, Wienreb M and Lerner B (2020). Joint maximization of accuracy and information for learning the structure of a Bayesian network classifier, Machine Language, 109:5, (1039-1099), Online publication date: 1-May-2020.
  387. ACM
    Belth C, Zheng X, Vreeken J and Koutra D What is Normal, What is Strange, and What is Missing in a Knowledge Graph: Unified Characterization via Inductive Summarization Proceedings of The Web Conference 2020, (1115-1126)
  388. ACM
    Peng Z, Huang W, Luo M, Zheng Q, Rong Y, Xu T and Huang J Graph Representation Learning via Graphical Mutual Information Maximization Proceedings of The Web Conference 2020, (259-270)
  389. ACM
    Sangar Y and Krishnaswamy B WiChronos Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, (1-14)
  390. Abbasi M, Al-Sahaf H and Welch I Particle Swarm Optimization: A Wrapper-Based Feature Selection Method for Ransomware Detection and Classification Applications of Evolutionary Computation, (181-196)
  391. Clark M and Psounis K (2020). Optimizing Primary User Privacy in Spectrum Sharing Systems, IEEE/ACM Transactions on Networking, 28:2, (533-546), Online publication date: 1-Apr-2020.
  392. Zheng Z, Peng Y, Wu F, Tang S and Chen G (2020). ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets, IEEE Transactions on Mobile Computing, 19:4, (769-787), Online publication date: 1-Apr-2020.
  393. ACM
    Kim Y, Butail S, Tscholl M, Liu L and Wang Y An exploratory approach to measuring collaborative engagement in child robot interaction Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, (209-217)
  394. ACM
    Tsai P, Sanchez A, Fletcher C and Sanchez D Safecracker: Leaking Secrets through Compressed Caches Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, (1125-1140)
  395. Yue X, Liu Y, Yao Y, Li X, Liu R and Nallanathan A (2020). Secure Communications in a Unified Non-Orthogonal Multiple Access Framework, IEEE Transactions on Wireless Communications, 19:3, (2163-2178), Online publication date: 1-Mar-2020.
  396. Oviedo J and Sadjadpour H (2020). Fundamentals of Power Allocation Strategies for Downlink Multi-User NOMA With Target Rates, IEEE Transactions on Wireless Communications, 19:3, (1906-1917), Online publication date: 1-Mar-2020.
  397. Shahee S and Ananthakumar U (2019). An effective distance based feature selection approach for imbalanced data, Applied Intelligence, 50:3, (717-745), Online publication date: 1-Mar-2020.
  398. Andria J, di Tollo G and Pesenti R (2019). A heuristic fuzzy algorithm for assessing and managing tourism sustainability, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4027-4040), Online publication date: 1-Mar-2020.
  399. Zhao S, Qu Z, Luo Z, Lu Z and Liu Y Comb decoding towards collision-free WiFi Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (933-952)
  400. Nekouei E, Nair G, Alpcan T and Evans R (2020). Sample Complexity of Solving Non-Cooperative Games, IEEE Transactions on Information Theory, 66:2, (1261-1280), Online publication date: 1-Feb-2020.
  401. Samorodnitsky A (2020). An Upper Bound on $\ell_q$ Norms of Noisy Functions, IEEE Transactions on Information Theory, 66:2, (742-748), Online publication date: 1-Feb-2020.
  402. Camps Moreno E, Martínez-Moro E and Sarmiento Rosales E (2020). Vardøhus Codes: Polar Codes Based on Castle Curves Kernels, IEEE Transactions on Information Theory, 66:2, (1007-1022), Online publication date: 1-Feb-2020.
  403. Painsky A, Rosset S and Feder M (2020). Innovation Representation of Stochastic Processes With Application to Causal Inference, IEEE Transactions on Information Theory, 66:2, (1136-1154), Online publication date: 1-Feb-2020.
  404. Zhang Q, Hu L and Gow J (2019). Output Feedback Stabilization for MIMO Semi-linear Stochastic Systems with Transient Optimisation, International Journal of Automation and Computing, 17:1, (83-95), Online publication date: 1-Feb-2020.
  405. Letchford A, Ni Q and Zhong Z (2019). A heuristic for fair dynamic resource allocation in overloaded OFDMA systems, Journal of Heuristics, 26:1, (21-32), Online publication date: 1-Feb-2020.
  406. Tallón-Ballesteros A, Riquelme J and Ruiz R (2019). Filter-based feature selection in the context of evolutionary neural networks in supervised machine learning, Pattern Analysis & Applications, 23:1, (467-491), Online publication date: 1-Feb-2020.
  407. Khan Beigi N and Haghighat A On Kurtosis of Spreading Sequences for NOMA 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), (1-5)
  408. ACM
    Aggarwal A, Dani V, Hayes T and Saia J A Scalable Algorithm for Multiparty Interactive Communication with Private Channels Proceedings of the 21st International Conference on Distributed Computing and Networking, (1-15)
  409. Hacine-Gharbi A, Ravier P and Nait-Meziane M (2020). Relevant harmonics selection based on mutual information for electrical appliances identification, International Journal of Computer Applications in Technology, 62:2, (102-115), Online publication date: 1-Jan-2020.
  410. Huber A, Anumula J and Liu S (2020). Optimal Sampling of Parametric Families, Neural Computation, 32:1, (261-279), Online publication date: 1-Jan-2020.
  411. Knoblauch A and Palm G (2020). Iterative Retrieval and Block Coding in Autoassociative and Heteroassociative Memory, Neural Computation, 32:1, (205-260), Online publication date: 1-Jan-2020.
  412. Klein B, Hoel E and Xu Y (2020). The Emergence of Informative Higher Scales in Complex Networks, Complexity, 2020, Online publication date: 1-Jan-2020.
  413. Adil Khan M, Husain Z, Chu Y and Selişteanu D (2020). New Estimates for Csiszár Divergence and Zipf–Mandelbrot Entropy via Jensen–Mercer’s Inequality, Complexity, 2020, Online publication date: 1-Jan-2020.
  414. Bi R, Chen Q, Chen L, Xiong J, Wu D and Liu X (2020). A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  415. Siegenfeld A, Bar-Yam Y and Gershenson C (2020). An Introduction to Complex Systems Science and Its Applications, Complexity, 2020, Online publication date: 1-Jan-2020.
  416. Wang Z, Peng Z, Pei Y, Wang H and Li X (2020). Performance Analysis of Cooperative NOMA Systems with Incremental Relaying, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  417. Boche H and Mönich U (2020). Turing Meets Shannon: Computable Sampling Type Reconstruction With Error Control, IEEE Transactions on Signal Processing, 68, (6350-6365), Online publication date: 1-Jan-2020.
  418. Huang T, Shlezinger N, Xu X, Liu Y and Eldar Y (2020). MAJoRCom: A Dual-Function Radar Communication System Using Index Modulation, IEEE Transactions on Signal Processing, 68, (3423-3438), Online publication date: 1-Jan-2020.
  419. Grossi E, Lops M and Venturino L (2020). Joint Design of Surveillance Radar and MIMO Communication in Cluttered Environments, IEEE Transactions on Signal Processing, 68, (1544-1557), Online publication date: 1-Jan-2020.
  420. Kumari P, Vorobyov S and Heath R (2020). Adaptive Virtual Waveform Design for Millimeter-Wave Joint Communication–Radar, IEEE Transactions on Signal Processing, 68, (715-730), Online publication date: 1-Jan-2020.
  421. Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
  422. Russo D and Zou J (2019). How Much Does Your Data Exploration Overfit? Controlling Bias via Information Usage, IEEE Transactions on Information Theory, 66:1, (302-323), Online publication date: 1-Jan-2020.
  423. Roffe J, Zohren S, Horsman D and Chancellor N (2019). Quantum Codes From Classical Graphical Models, IEEE Transactions on Information Theory, 66:1, (130-146), Online publication date: 1-Jan-2020.
  424. Aldaghri N and Mahdavifar H (2020). Physical Layer Secret Key Generation in Static Environments, IEEE Transactions on Information Forensics and Security, 15, (2692-2705), Online publication date: 1-Jan-2020.
  425. Zhou L (2020). Multiple Private Key Generation for Continuous Memoryless Sources With a Helper, IEEE Transactions on Information Forensics and Security, 15, (2629-2640), Online publication date: 1-Jan-2020.
  426. Zewail A and Yener A (2019). Device-to-Device Secure Coded Caching, IEEE Transactions on Information Forensics and Security, 15, (1513-1524), Online publication date: 1-Jan-2020.
  427. de Dieu Mutangana J and Tandon R (2019). Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT, IEEE Transactions on Information Forensics and Security, 15, (447-461), Online publication date: 1-Jan-2020.
  428. Soltani R, Goeckel D, Towsley D and Houmansadr A (2019). Fundamental Limits of Invisible Flow Fingerprinting, IEEE Transactions on Information Forensics and Security, 15, (345-360), Online publication date: 1-Jan-2020.
  429. Wang W, Yona Y, Wu Y, Diggavi S and Gupta P (2019). SLATE: A Secure Lightweight Entity Authentication Hardware Primitive, IEEE Transactions on Information Forensics and Security, 15, (276-285), Online publication date: 1-Jan-2020.
  430. Ghasemzadeh H and Arjmandi M (2020). Toward Optimum Quantification of Pathology-Induced Noises: An Investigation of Information Missed by Human Auditory System, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (519-528), Online publication date: 1-Jan-2020.
  431. Amini J, Hendriks R, Heusdens R, Guo M and Jensen J (2019). Rate-Constrained Noise Reduction in Wireless Acoustic Sensor Networks, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (1-12), Online publication date: 1-Jan-2020.
  432. Zhang Z and Parhi K (2019). M3U: Minimum Mean Minimum Uncertainty Feature Selection for Multiclass Classification, Journal of Signal Processing Systems, 92:1, (9-22), Online publication date: 1-Jan-2020.
  433. Muralidharan A and Mostofi Y (2019). Statistics of the distance traveled until successful connectivity for unmanned vehicles, Autonomous Robots, 44:1, (25-42), Online publication date: 1-Jan-2020.
  434. Yardi A and Vijayakumaran S (2019). Properties of syndrome distribution for blind reconstruction of cyclic codes, Applicable Algebra in Engineering, Communication and Computing, 31:1, (23-41), Online publication date: 1-Jan-2020.
  435. Guo Q, Johansson T and Löndahl C (2019). Solving LPN Using Covering Codes, Journal of Cryptology, 33:1, (1-33), Online publication date: 1-Jan-2020.
  436. Chen J and Shu T Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System Information and Communications Security, (105-123)
  437. ACM
    Han Q, Mehrotra S and Venkatasubramanian N AquaEIS Proceedings of the 20th International Middleware Conference, (293-305)
  438. Steeg G, Harutyunyan H, Moyer D and Galstyan A Fast structure learning with modular regularization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (15593-15603)
  439. Gong W, Tschiatschek S, Turner R, Nowozin S, Hernández-Lobato J and Zhang C Icebreaker Proceedings of the 33rd International Conference on Neural Information Processing Systems, (14820-14831)
  440. Lhéritier A and Cazals F Low-complexity nonparametric Bayesian online prediction with universal guarantees Proceedings of the 33rd International Conference on Neural Information Processing Systems, (14581-14590)
  441. Nguyen V, Shafieezadeh-Abadeh S, Yue M, Kuhn D and Wiesemann W Calculating optimistic likelihoods using (geodesically) convex optimization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (13943-13954)
  442. Belghazi M, Oquab M, Lecun Y and Lopez-Paz D Learning about an exponential amount of conditional distributions Proceedings of the 33rd International Conference on Neural Information Processing Systems, (13710-13721)
  443. Liu Y, Liu J, Zhang Z, Zhu L and Li A REM Proceedings of the 33rd International Conference on Neural Information Processing Systems, (12938-12948)
  444. Ito S Submodular function minimization with noisy evaluation oracle Proceedings of the 33rd International Conference on Neural Information Processing Systems, (12103-12113)
  445. Pinot R, Meunier L, Araujo A, Kashima H, Yger F, Gouy-Pailler C and Atif J Theoretical evidence for adversarial robustness through randomization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11860-11870)
  446. Hao Y and Orlitsky A Unified sample-optimal property estimation in near-linear time Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11106-11116)
  447. Hao Y and Orlitsky A The broad optimality of profile maximum likelihood Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10991-11003)
  448. Chen L, Esfandiari H, Fu T and Mirrokni V Locality-sensitive hashing for f-Divergences and Kreĭn kernels Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10044-10054)
  449. Dai H, Li C, Coley C, Dai B and Song L Retrosynthesis prediction with conditional graph logic network Proceedings of the 33rd International Conference on Neural Information Processing Systems, (8872-8882)
  450. Aubin B, Loureiro B, Maillard A, Krzakala F and Zdeborová L The spiked matrix model with generative priors Proceedings of the 33rd International Conference on Neural Information Processing Systems, (8366-8377)
  451. Leibfried F, Pascual-Díaz S and Grau-Moya J A unified bellman optimality principle combining reward maximization and empowerment Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7869-7880)
  452. Belakaria S, Deshwal A and Doppa J Max-value entropy search for multi-objective Bayesian optimization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7825-7835)
  453. Huang Z, Huang Z, Wang Y and Yi K Optimal sparsity-sensitive bounds for distributed mean estimation Proceedings of the 33rd International Conference on Neural Information Processing Systems, (6371-6381)
  454. Wang S, Zeng Y, Liu X, Zhu E, Yin J, Xu C and Kloft M Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network Proceedings of the 33rd International Conference on Neural Information Processing Systems, (5962-5975)
  455. Nijkamp E, Hill M, Zhu S and Wu Y Learning non-convergent non-persistent short-run MCMC toward energy-based model Proceedings of the 33rd International Conference on Neural Information Processing Systems, (5232-5242)
  456. Brekelmans R, Moyer D, Galstyan A and Steeg G Exact rate-distortion in autoencoders via echo noise Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3889-3900)
  457. Ho J, Lohn E and Abbeel P Compression with flows via local bits-back coding Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3879-3888)
  458. Ginart A, Guan M, Valiant G and Zou J Making AI forget you Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3518-3531)
  459. Lu X and Roy B Information-theoretic confidence bounds for reinforcement learning Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2461-2470)
  460. Ding J, Calderbank R and Tarokh V Gradient information for representation and modeling Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2396-2405)
  461. Palma G, Kiani B and Lloyd S Random deep neural networks are biased towards simple functions Proceedings of the 33rd International Conference on Neural Information Processing Systems, (1964-1976)
  462. Saha A and Gopalan A Combinatorial bandits with relative feedback Proceedings of the 33rd International Conference on Neural Information Processing Systems, (985-995)
  463. Li Z, Fresacher M and Scarlett J Learning Erdős-Rényi random graphs via edge detecting queries Proceedings of the 33rd International Conference on Neural Information Processing Systems, (404-414)
  464. ACM
    Tien H, The Q, Minh H and My L Rule based English-Vietnamese bilingual terminology extraction from Vietnamese documents Proceedings of the 10th International Symposium on Information and Communication Technology, (56-62)
  465. Nomura R (2019). Overflow Probability of Variable-Length Codes With Codeword Cost, IEEE Transactions on Information Theory, 65:12, (8194-8206), Online publication date: 1-Dec-2019.
  466. Yuan X, Xin H, Liew S and Li Y (2019). Capacity of the Gaussian Two-Pair Two-Way Relay Channel to Within $\frac{1}{2}$ Bit, IEEE Transactions on Information Theory, 65:12, (8273-8304), Online publication date: 1-Dec-2019.
  467. Haghi A, Mohammadizadeh N and Khandani A (2019). Delay in Cooperative Communications: Achieving Higher Multiplexing Gain in Gaussian Interference Channels With Full-Duplex Transmitters, IEEE Transactions on Information Theory, 65:12, (8250-8272), Online publication date: 1-Dec-2019.
  468. Banawan K and Ulukus S (2019). Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval, IEEE Transactions on Information Theory, 65:12, (8232-8249), Online publication date: 1-Dec-2019.
  469. Bollauf M, Zamir R and Costa S (2019). Multilevel Constructions: Coding, Packing and Geometric Uniformity, IEEE Transactions on Information Theory, 65:12, (7669-7681), Online publication date: 1-Dec-2019.
  470. Timo R, Vellambi B, Grant A and Nguyen K (2019). Tracking Unstable Autoregressive Sources Over Discrete Memoryless Channels, IEEE Transactions on Information Theory, 65:12, (8140-8163), Online publication date: 1-Dec-2019.
  471. Zhang X, Wang J and Poor H (2020). Heterogeneous Statistical-QoS Driven Resource Allocation Over mmWave Massive-MIMO Based 5G Mobile Wireless Networks in the Non-Asymptotic Regime, IEEE Journal on Selected Areas in Communications, 37:12, (2727-2743), Online publication date: 1-Dec-2019.
  472. Lin X, Li C, Ren W, Luo X and Qi Y (2020). A new feature selection method based on symmetrical uncertainty and interaction gain, Computational Biology and Chemistry, 83:C, Online publication date: 1-Dec-2019.
  473. ACM
    Herzberg A and Kfir Y The Leaky Actuator Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, (87-98)
  474. Yang M and Gong G Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS Foundations and Practice of Security, (117-136)
  475. Yang Z, Liang E, Kamsetty A, Wu C, Duan Y, Chen X, Abbeel P, Hellerstein J, Krishnan S and Stoica I (2019). Deep unsupervised cardinality estimation, Proceedings of the VLDB Endowment, 13:3, (279-292), Online publication date: 1-Nov-2019.
  476. Brighente A, Formaggio F, Di Nunzio G and Tomasin S (2019). Machine Learning for In-Region Location Verification in Wireless Networks, IEEE Journal on Selected Areas in Communications, 37:11, (2490-2502), Online publication date: 1-Nov-2019.
  477. Zhao K, Liu Y, Du H and Yuan B (2019). Performance Analysis of Bit-Interleaved Polar Coded Modulation, Wireless Personal Communications: An International Journal, 109:2, (1285-1309), Online publication date: 1-Nov-2019.
  478. Śmieja M, Hajto K and Tabor J (2022). Efficient mixture model for clustering of sparse high dimensional binary data, Data Mining and Knowledge Discovery, 33:6, (1583-1624), Online publication date: 1-Nov-2019.
  479. Spurek P, Byrski K and Tabor J (2019). Online updating of active function cross-entropy clustering, Pattern Analysis & Applications, 22:4, (1409-1425), Online publication date: 1-Nov-2019.
  480. Sayin M and Başar T On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons Decision and Game Theory for Security, (459-478)
  481. ACM
    Pisheh F and Vilalta R Filter-Based Information-Theoretic Feature Selection Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, (207-211)
  482. Arroyuelo D and Raman R Adaptive Succinctness String Processing and Information Retrieval, (467-481)
  483. Guenther J and Sawodny O Optimal Sensor Placement based on Gaussian Process Regression for Shared Office Spaces under Various Ventilation Conditions 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), (2883-2888)
  484. Liu L, Zhang S and Zhang R (2019). Multi-Beam UAV Communication in Cellular Uplink: Cooperative Interference Cancellation and Sum-Rate Maximization, IEEE Transactions on Wireless Communications, 18:10, (4679-4691), Online publication date: 1-Oct-2019.
  485. Bappy J, Paul S, Tuncel E and Roy-Chowdhury A (2019). Exploiting Typicality for Selecting Informative and Anomalous Samples in Videos, IEEE Transactions on Image Processing, 28:10, (5214-5226), Online publication date: 1-Oct-2019.
  486. Kumar Arumugam K and Bloch M (2019). Embedding Covert Information in Broadcast Communications, IEEE Transactions on Information Forensics and Security, 14:10, (2787-2801), Online publication date: 1-Oct-2019.
  487. Chopra R, Murthy C and Annavajjala R (2019). Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing, IEEE Transactions on Information Forensics and Security, 14:10, (2662-2675), Online publication date: 1-Oct-2019.
  488. Kim M and Suh I (2019). Active object search in an unknown large-scale environment using commonsense knowledge and spatial relations, Intelligent Service Robotics, 12:4, (371-380), Online publication date: 1-Oct-2019.
  489. Hemmatian F and Sohrabi M (2019). A survey on classification techniques for opinion mining and sentiment analysis, Artificial Intelligence Review, 52:3, (1495-1545), Online publication date: 1-Oct-2019.
  490. Xu X and Huang S On the Asymptotic Sample Complexity of HGR Maximal Correlation Functions in Semi-supervised Learning 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (879-886)
  491. Chandak S, Ji H, Tatwawadi K, Lau B, Mardia J, Kubit M, Neu J, Griffin P, Wootters M and Weissman T Improved read/write cost tradeoff in DNA-based data storage using LDPC codes 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (147-156)
  492. Li Q and Chen Y Learning to Compress Using Deep AutoEncoder 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (930-936)
  493. Cohen A, Shlezinger N, Eldar Y and Médard M Serial Quantization for Representing Sparse Signals 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (987-994)
  494. Sultana R and Chou R Explicit Low-complexity Codes for Multiple Access Channel Resolvability 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (116-123)
  495. Melbourne J, Madiman M and Salapaka M Relationships between certain f -divergences 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1068-1073)
  496. Belfodil A, Duivesteijn W, Plantevit M, Cazalens S and Lamarre P DEvIANT: Discovering Significant Exceptional (Dis-)Agreement Within Groups Machine Learning and Knowledge Discovery in Databases, (3-20)
  497. Sanchez-Fernandez A, Fuente M and Sainz-Palmero G Decentralized DPCA Model for Large-Scale Processes Monitoring 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (625-632)
  498. Ahn J, Simeone O and Kang J Wireless Federated Distillation for Distributed Edge Learning with Heterogeneous Data 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1-6)
  499. Zhang Z and Parhi K (2019). MUSE: Minimum Uncertainty and Sample Elimination Based Binary Feature Selection, IEEE Transactions on Knowledge and Data Engineering, 31:9, (1750-1764), Online publication date: 1-Sep-2019.
  500. Hadar U and Shayevitz O (2019). Distributed Estimation of Gaussian Correlations, IEEE Transactions on Information Theory, 65:9, (5323-5338), Online publication date: 1-Sep-2019.
  501. Vrana P and Christandl M (2019). Distillation of Greenberger–Horne–Zeilinger States by Combinatorial Methods, IEEE Transactions on Information Theory, 65:9, (5945-5958), Online publication date: 1-Sep-2019.
  502. Vigneaux J (2019). Information Theory With Finite Vector Spaces, IEEE Transactions on Information Theory, 65:9, (5674-5687), Online publication date: 1-Sep-2019.
  503. Wang J, Ge H, Lin M, Wang J, Dai J and Alouini M (2019). On the Secrecy Rate of Spatial Modulation-Based Indoor Visible Light Communications, IEEE Journal on Selected Areas in Communications, 37:9, (2087-2101), Online publication date: 1-Sep-2019.
  504. Rastegin A (2019). Individual attacks with generalized discrimination and inadequacy of some information measures, Quantum Information Processing, 18:9, (1-24), Online publication date: 1-Sep-2019.
  505. Vantuch T, Zelinka I, Adamatzky A and Marwan N (2019). Perturbations and phase transitions in swarm optimization algorithms, Natural Computing: an international journal, 18:3, (579-591), Online publication date: 1-Sep-2019.
  506. Yadav S, Ekbal A and Saha S (2019). Information theoretic-PSO-based feature selection: an application in biomedical entity extraction, Knowledge and Information Systems, 60:3, (1453-1478), Online publication date: 1-Sep-2019.
  507. Nielsen F The Statistical Minkowski Distances: Closed-Form Formula for Gaussian Mixture Models Geometric Science of Information, (359-367)
  508. Nielsen F and Nock R The Bregman Chord Divergence Geometric Science of Information, (299-308)
  509. ACM
    Kleinberg R, Slivkins A and Upfal E (2019). Bandits and Experts in Metric Spaces, Journal of the ACM, 66:4, (1-77), Online publication date: 26-Aug-2019.
  510. Grigorescu A and Boche H Differential Power Analysis Attacks from an Information-Theoretic Perspective 2019 IEEE Information Theory Workshop (ITW), (1-5)
  511. Horovitz M, Yaakobi E, Gad E and Bruck J Iterative Programming of Noisy Memory Cells 2019 IEEE Information Theory Workshop (ITW), (1-5)
  512. Huang S and Xu X On The Sample Complexity of HGR Maximal Correlation Functions 2019 IEEE Information Theory Workshop (ITW), (1-5)
  513. Sharifian S and Safavi-Naini R A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels 2019 IEEE Information Theory Workshop (ITW), (1-5)
  514. Akyol E On Optimal Jamming in Strategic Communication 2019 IEEE Information Theory Workshop (ITW), (1-5)
  515. Fang S, Skoglund M, Johansson K, Ishii H and Zhu Q Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective 2019 IEEE Information Theory Workshop (ITW), (1-5)
  516. Holzbaur L, Freij-Hollanti R and Hollanti C On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers 2019 IEEE Information Theory Workshop (ITW), (1-5)
  517. Nikbakht H, Wigger M, Hachem W and Shitz S Mixed Delay Constraints on a Fading C-RAN Uplink 2019 IEEE Information Theory Workshop (ITW), (1-5)
  518. Berg T, Shayevitz O, Kim Y and Wang L Some Results on Distributed Source Simulation with no Communication 2019 IEEE Information Theory Workshop (ITW), (1-5)
  519. Chee Y, Horovitz M, Vardy A, Vu V and Yaakobi E Endurance-Limited Memories with Informed Decoder 2019 IEEE Information Theory Workshop (ITW), (1-5)
  520. Haghifam M, Tant V and Khisti A Sequential Classification with Empirically Observed Statistics 2019 IEEE Information Theory Workshop (ITW), (1-5)
  521. ACM
    Pauwels S and Calders T (2019). Detecting anomalies in hybrid business process logs, ACM SIGAPP Applied Computing Review, 19:2, (18-30), Online publication date: 15-Aug-2019.
  522. Wang J and Geng X Classification with label distribution learning Proceedings of the 28th International Joint Conference on Artificial Intelligence, (3712-3718)
  523. Ghasemi M and Topcu U Perception-aware point-based value iteration for partially observable Markov decision processes Proceedings of the 28th International Joint Conference on Artificial Intelligence, (2371-2377)
  524. Harrison W, Fernandes T, Gomes M and Vilela J (2019). Generating a Binary Symmetric Channel for Wiretap Codes, IEEE Transactions on Information Forensics and Security, 14:8, (2128-2138), Online publication date: 1-Aug-2019.
  525. Deljavan Amiri M, Amiri A and Meghdadi M (2019). HVS-based scalable video watermarking, Multimedia Systems, 25:4, (273-291), Online publication date: 1-Aug-2019.
  526. Hou T, Lam K, Zhang P and Zhang S (2019). Solving Bayesian inverse problems from the perspective of deep generative networks, Computational Mechanics, 64:2, (395-408), Online publication date: 1-Aug-2019.
  527. Pregowska A, Casti A, Kaplan E, Wajnryb E and Szczepanski J (2019). Information processing in the LGN, Biological Cybernetics, 113:4, (453-464), Online publication date: 1-Aug-2019.
  528. ACM
    Belletti F, Chen M and Chi E Quantifying Long Range Dependence in Language and User Behavior to improve RNNs Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1317-1327)
  529. ACM
    Li J, Guo R, Liu C and Liu H Adaptive Unsupervised Feature Selection on Attributed Networks Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (92-100)
  530. ACM
    Wong P, Wong M and Leung K Semantic fitness function in genetic programming based on semantics flow analysis Proceedings of the Genetic and Evolutionary Computation Conference Companion, (354-355)
  531. Kowshik S and Polyanskiy Y Quasi-static fading MAC with many users and finite payload 2019 IEEE International Symposium on Information Theory (ISIT), (440-444)
  532. Huang Y, Lin S and Huang Y On Byzantine Distributed Sequential Change Detection with Multiple Hypotheses 2019 IEEE International Symposium on Information Theory (ISIT), (2209-2213)
  533. Cao D, Zhou L and Tan V Strong Converse for Hypothesis Testing Against Independence over a Two-Hop Network 2019 IEEE International Symposium on Information Theory (ISIT), (1994-1998)
  534. Harremoës P The Rate Distortion Test of Normality 2019 IEEE International Symposium on Information Theory (ISIT), (241-245)
  535. Rose C and Mian I A General Upper Bound on Point-to-Point Particle Timing Channel Capacity Under Constant Particle Emission Intensity 2019 IEEE International Symposium on Information Theory (ISIT), (917-921)
  536. Vu M, Oechtering T and Skoglund M Operational Equivalence of Distributed Hypothesis Testing and Identification Systems 2019 IEEE International Symposium on Information Theory (ISIT), (1999-2003)
  537. Li J, Marsiglietti A and Melbourne J Entropic Central Limit Theorem for Rényi Entropy 2019 IEEE International Symposium on Information Theory (ISIT), (1137-1141)
  538. Saidutta Y, Abdi A and Fekri F Joint Source-Channel Coding for Gaussian Sources over AWGN Channels using Variational Autoencoders 2019 IEEE International Symposium on Information Theory (ISIT), (1327-1331)
  539. Silva J and Piantanida P Universal D-Semifaithfull Coding for Countably Infinite Alphabets 2019 IEEE International Symposium on Information Theory (ISIT), (567-571)
  540. Lin P, Jorswieck E, Janda C, Mittelbach M and Schaefer R On Stochastic Orders and Fading Gaussian Multi-User Channels with Statistical CSIT 2019 IEEE International Symposium on Information Theory (ISIT), (1497-1501)
  541. Riba J and de Cabrera F A Proof of de Bruijn Identity based on Generalized Price’s Theorem 2019 IEEE International Symposium on Information Theory (ISIT), (1-5)
  542. Huang Y, Lin S and Huang Y A Tight Converse to the Asymptotic Performance of Byzantine Distributed Sequential Change Detection 2019 IEEE International Symposium on Information Theory (ISIT), (2404-2408)
  543. Ryabko B Time-universal data compression and prediction 2019 IEEE International Symposium on Information Theory (ISIT), (562-566)
  544. ACM
    Wan P, Wang Z, Yuan H, Wang J and Zhang J MWSR over an Uplink Gaussian Channel with Box Constraints Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (211-220)
  545. Collet J (2019). An Exact Expression for the Gap in the Data Processing Inequality for $f$ -Divergences, IEEE Transactions on Information Theory, 65:7, (4387-4391), Online publication date: 1-Jul-2019.
  546. Barmpalias G and Lewis-Pye A (2019). Compression of Data Streams Down to Their Information Content, IEEE Transactions on Information Theory, 65:7, (4471-4485), Online publication date: 1-Jul-2019.
  547. Susan S and Hanmandlu M (2019). Smaller feature subset selection for real-world datasets using a new mutual information with Gaussian gain, Multidimensional Systems and Signal Processing, 30:3, (1469-1488), Online publication date: 1-Jul-2019.
  548. Fakhredanesh M, Rahmati M and Safabakhsh R (2019). Steganography in discrete wavelet transform based on human visual system and cover model, Multimedia Tools and Applications, 78:13, (18475-18502), Online publication date: 1-Jul-2019.
  549. Yamanishi K, Wu T, Sugawara S and Okada M (2019). The decomposed normalized maximum likelihood code-length criterion for selecting hierarchical latent variable models, Data Mining and Knowledge Discovery, 33:4, (1017-1058), Online publication date: 1-Jul-2019.
  550. Arauzo-Azofra A, Jiménez-Vílchez A, Molina-Baena J and Luque-Rodriguez M (2019). Algorithmic cache of sorted tables for feature selection, Data Mining and Knowledge Discovery, 33:4, (964-994), Online publication date: 1-Jul-2019.
  551. Fan J (2019). OPE-HCA: an optimal probabilistic estimation approach for hierarchical clustering algorithm, Neural Computing and Applications, 31:7, (2095-2105), Online publication date: 1-Jul-2019.
  552. Yang K, Shi Y and Ding Z (2019). Data Shuffling in Wireless Distributed Computing via Low-Rank Optimization, IEEE Transactions on Signal Processing, 67:12, (3087-3099), Online publication date: 15-Jun-2019.
  553. Wang W, Dai H, Dong C, Xiao F, Cheng X and Chen G VISIT: Placement of Unmanned Aerial Vehicles for Anisotropic Monitoring Tasks 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), (1-9)
  554. Neely M (2019). Convergence and Adaptation for Utility Optimal Opportunistic Scheduling, IEEE/ACM Transactions on Networking, 27:3, (904-917), Online publication date: 1-Jun-2019.
  555. Desmedt Y and Piper F (2019). Perfect Anonymity, IEEE Transactions on Information Theory, 65:6, (3990-3997), Online publication date: 1-Jun-2019.
  556. Guang X, Yeung R, Yang S and Li C (2019). Improved Upper Bound on the Network Function Computing Capacity, IEEE Transactions on Information Theory, 65:6, (3790-3811), Online publication date: 1-Jun-2019.
  557. Yu L and Tan V (2019). Simulation of Random Variables Under Rényi Divergence Measures of All Orders, IEEE Transactions on Information Theory, 65:6, (3349-3383), Online publication date: 1-Jun-2019.
  558. Kosut O and Kliewer J (2019). Strong Converses are Just Edge Removal Properties, IEEE Transactions on Information Theory, 65:6, (3315-3339), Online publication date: 1-Jun-2019.
  559. Hosseini S, Mehrjoo M and Amindavar H (2019). Where Multiple Connectivity Brings Offloading Performance Boost? An Analytical Study, Wireless Personal Communications: An International Journal, 106:3, (1507-1530), Online publication date: 1-Jun-2019.
  560. Berardinelli L, Bernardo M, Cortellessa V and Di Marco A (2019). Multidimensional context modeling applied to non-functional analysis of software, Software and Systems Modeling (SoSyM), 18:3, (2137-2176), Online publication date: 1-Jun-2019.
  561. Meir O and Wigderson A (2019). Prediction from Partial Information and Hindsight, with Application to Circuit Lower Bounds, Computational Complexity, 28:2, (145-183), Online publication date: 1-Jun-2019.
  562. Mox D, Cowley A, Hsieh M and Taylor C Evaluating the Effectiveness of Perspective Aware Planning with Panoramas 2019 International Conference on Robotics and Automation (ICRA), (4098-4103)
  563. ACM
    Zeng J and Tang B Mining heterogeneous urban data for retail store placement Proceedings of the ACM Turing Celebration Conference - China, (1-5)
  564. Chen C, Hensel L, Duan Y, Ince R, Garrod O, Beskow J, Jack R and Schyns P Equipping social robots with culturally-sensitive facial expressions of emotion using data-driven methods 2019 14th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2019), (1-8)
  565. ACM
    Dragone P, Mehrotra R and Lalmas M Deriving User- and Content-specific Rewards for Contextual Bandits The World Wide Web Conference, (2680-2686)
  566. ACM
    Kokkodis M Reputation Deflation Through Dynamic Expertise Assessment in Online Labor Markets The World Wide Web Conference, (896-905)
  567. Cheung W and Simchi-Levi D (2019). Sampling-Based Approximation Schemes for Capacitated Stochastic Inventory Control Models, Mathematics of Operations Research, 44:2, (668-692), Online publication date: 1-May-2019.
  568. Ghaffari Jadidi M, Valls Miro J and Dissanayake G (2020). Sampling-based incremental information gathering with applications to robotic exploration and environmental monitoring, International Journal of Robotics Research, 38:6, (658-685), Online publication date: 1-May-2019.
  569. Yang J, Qing L, Zeng W and He X (2019). High-Order Statistical Modeling Based on a Decision Tree for Distributed Video Coding, IEEE Transactions on Circuits and Systems for Video Technology, 29:5, (1488-1502), Online publication date: 1-May-2019.
  570. Salaün L, Coupechoux M and Chen C Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power Constraint IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (451-459)
  571. Mostert W, Malan K, Ochoa G and Engelbrecht A Insights into the Feature Selection Problem Using Local Optima Networks Evolutionary Computation in Combinatorial Optimization, (147-162)
  572. Gnidenko A, Sobolevsky V and Zakharov V Methods and Algorithms of Proactive control of Complex Dynamic Objects with Disturbance Compensation Proceedings of the 24th Conference of Open Innovations Association FRUCT, (608-612)
  573. Ganji M and Jafarkhani H Time Asynchronous NOMA for Downlink Transmission 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  574. ACM
    Pauwels S and Calders T An anomaly detection technique for business processes based on extended dynamic bayesian networks Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (494-501)
  575. Amjad M, Gelbukh A, Voronkov I and Saenko A Comparison of Text Classification Methods Using Deep Learning Neural Networks Computational Linguistics and Intelligent Text Processing, (438-450)
  576. Zhang R, Dong S and Liu J (2019). Invisible steganography via generative adversarial networks, Multimedia Tools and Applications, 78:7, (8559-8575), Online publication date: 1-Apr-2019.
  577. Guo C, Yang W and Huang L (2019). An improved entropy-based approach to steganalysis of compressed speech, Multimedia Tools and Applications, 78:7, (8513-8534), Online publication date: 1-Apr-2019.
  578. Boichenko V (2019). Anisotropy-Based Analysis for the Case of Nonzero Initial Condition, Automation and Remote Control, 80:3, (531-542), Online publication date: 1-Mar-2019.
  579. Dubnov Y (2019). Entropy-Based Estimation in Classification Problems, Automation and Remote Control, 80:3, (502-512), Online publication date: 1-Mar-2019.
  580. Huang S and Tran T (2019). Sparse Signal Recovery via Generalized Entropy Functions Minimization, IEEE Transactions on Signal Processing, 67:5, (1322-1337), Online publication date: 1-Mar-2019.
  581. Sarangi K and Bhattacharya I (2019). A study on data aggregation techniques in wireless sensor network in static and dynamic scenarios, Innovations in Systems and Software Engineering, 15:1, (3-16), Online publication date: 1-Mar-2019.
  582. Wang Y, Wang A, Ai Q and Sun H (2019). Ensemble based fuzzy weighted extreme learning machine for gene expression classification, Applied Intelligence, 49:3, (1161-1171), Online publication date: 1-Mar-2019.
  583. Koldovsky Z and Tichavsky P (2019). Gradient Algorithms for Complex Non-Gaussian Independent Component/Vector Extraction, Question of Convergence, IEEE Transactions on Signal Processing, 67:4, (1050-1064), Online publication date: 1-Feb-2019.
  584. Boullé M, Charnay C and Lachiche N (2019). A scalable robust and automatic propositionalization approach for Bayesian classification of large mixed numerical and categorical data, Machine Language, 108:2, (229-266), Online publication date: 1-Feb-2019.
  585. Coelho F, Castro C, Braga A and Verleysen M (2019). Semi-supervised relevance index for feature selection, Neural Computing and Applications, 31:2, (989-997), Online publication date: 1-Feb-2019.
  586. ACM
    Zarnegar A, Jelinek H, Vamplew P and Stranieri A Integrating Biological Heuristics and Gene Expression Data for Gene Regulatory Network Inference Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  587. Wang B, Chen X, Xin F, Song X and Garcia-Rodriguez J (2019). MI-Based Robust Waveform Design in Radar and Jammer Games, Complexity, 2019, Online publication date: 1-Jan-2019.
  588. Kariminezhad A and Sezgin A (2019). Heterogeneous Multi-Tier Networks, IEEE Transactions on Wireless Communications, 18:1, (680-694), Online publication date: 1-Jan-2019.
  589. Chattha J and Uppal M (2019). Joint Noisy Network Coding and Decode-Forward Relaying for Non-Orthogonal Multiple Access, IEEE Transactions on Wireless Communications, 18:1, (296-309), Online publication date: 1-Jan-2019.
  590. Bayat M, Mungara R and Caire G (2019). Achieving Spatial Scalability for Coded Caching via Coded Multipoint Multicasting, IEEE Transactions on Wireless Communications, 18:1, (227-240), Online publication date: 1-Jan-2019.
  591. Makki B, Svensson T and Alouini M (2019). On the Throughput of Large-but-Finite MIMO Networks Using Schedulers, IEEE Transactions on Wireless Communications, 18:1, (152-166), Online publication date: 1-Jan-2019.
  592. Lin J, Chang R, Lee C, Tsao H and Su H (2019). Multi-Agent Distributed Beamforming With Improper Gaussian Signaling for MIMO Interference Broadcast Channels, IEEE Transactions on Wireless Communications, 18:1, (136-151), Online publication date: 1-Jan-2019.
  593. Bistritz I and Leshem A (2019). Asymptotically Optimal Resource Block Allocation With Limited Feedback, IEEE Transactions on Wireless Communications, 18:1, (34-46), Online publication date: 1-Jan-2019.
  594. Hua Y (2018). Advanced Properties of Full-Duplex Radio for Securing Wireless Network, IEEE Transactions on Signal Processing, 67:1, (120-135), Online publication date: 1-Jan-2019.
  595. Medvidovic N (2019). Editorial, IEEE Transactions on Software Engineering, 45:1, (1-1), Online publication date: 1-Jan-2019.
  596. Guirguis A, Digham F, Seddik K, Ibrahim M, Harras K and Youssef M (2018). Primary User-Aware Optimal Discovery Routing for Cognitive Radio Networks, IEEE Transactions on Mobile Computing, 18:1, (193-206), Online publication date: 1-Jan-2019.
  597. Zhou C, Tham C and Motani M (2018). Finding Decomposable Models for Efficient Distributed Inference over Sensor Networks, IEEE Transactions on Mobile Computing, 18:1, (70-83), Online publication date: 1-Jan-2019.
  598. Davoodi A and Jafar S (2018). Aligned Image Sets and the Generalized Degrees of Freedom of Symmetric MIMO Interference Channel With Partial CSIT, IEEE Transactions on Information Theory, 65:1, (406-417), Online publication date: 1-Jan-2019.
  599. Yang T, Liu N, Kang W and Shamai Shitz S (2018). Converse Results for the Downlink Multicell Processing With Finite Backhaul Capacity, IEEE Transactions on Information Theory, 65:1, (368-379), Online publication date: 1-Jan-2019.
  600. Bistritz I and Leshem A (2018). Game Theoretic Dynamic Channel Allocation for Frequency-Selective Interference Channels, IEEE Transactions on Information Theory, 65:1, (330-353), Online publication date: 1-Jan-2019.
  601. Yoshida M, Fujiwara T and Fossorier M (2018). Optimal Uniform Secret Sharing, IEEE Transactions on Information Theory, 65:1, (436-443), Online publication date: 1-Jan-2019.
  602. Zhu J, Lim S and Gastpar M (2018). Communication Versus Computation: Duality for Multiple-Access Channels and Source Coding, IEEE Transactions on Information Theory, 65:1, (292-301), Online publication date: 1-Jan-2019.
  603. Clerckx B, Zhang R, Schober R, Ng D, Kim D and Poor H (2018). Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs, IEEE Journal on Selected Areas in Communications, 37:1, (4-33), Online publication date: 1-Jan-2019.
  604. Clerckx B, Zhang R, Schober R, Ng D, Kim D and Poor H (2018). Guest Editorial Wireless Transmission of Information and Power—Part I, IEEE Journal on Selected Areas in Communications, 37:1, (1-3), Online publication date: 1-Jan-2019.
  605. Méger N, Rigotti C, Pothier C, Nguyen T, Lodge F, Gueguen L, Andreoli R, Doin M and Datcu M (2019). Ranking evolution maps for Satellite Image Time Series exploration, Data Mining and Knowledge Discovery, 33:1, (131-167), Online publication date: 1-Jan-2019.
  606. ACM
    Marik R Feature Space Decomposition using Information Theory Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence, (1-10)
  607. Bharadwaj S, Ahmadi M, Tanaka T and Topcu U Transfer Entropy in MDPs with Temporal Logic Specifications 2018 IEEE Conference on Decision and Control (CDC), (4173-4180)
  608. Murguia C, Shames I, Farokhi F and Nešić D On Privacy of Quantized Sensor Measurements through Additive Noise 2018 IEEE Conference on Decision and Control (CDC), (2531-2536)
  609. Wan N, Li D and Hovakimyan N Sensitivity Analysis of Continuous-Time Systems based on Power Spectral Density 2018 IEEE Conference on Decision and Control (CDC), (2549-2554)
  610. Farokhi F and Esfahani P Security Versus Privacy 2018 IEEE Conference on Decision and Control (CDC), (7101-7106)
  611. Salhab R, Ny J and Malhamé R A mean field route choice game model 2018 IEEE Conference on Decision and Control (CDC), (1005-1010)
  612. Yin S and Tsumura K The Second Law of Controlled Linear Stochastic Thermodynamic Systems over a Noiseless Digital Channel 2018 IEEE Conference on Decision and Control (CDC), (2561-2566)
  613. Asoodeh S, Huang Y and Chattopadhyay I A Tamper-Free Semi-Universal Communication System for Deletion Channels 2018 IEEE Conference on Decision and Control (CDC), (4181-4186)
  614. Hsieh C, Gubner J and Ross Barmish B Rebalancing Frequency Considerations for Kelly-Optimal Stock Portfolios in a Control-Theoretic Framework 2018 IEEE Conference on Decision and Control (CDC), (5820-5825)
  615. Rujeerapaiboon N, Ross Barmish B and Kuhn D On Risk Reduction in Kelly Betting Using the Conservative Expected Value 2018 IEEE Conference on Decision and Control (CDC), (5801-5806)
  616. Liu Y, Liang Y and Cui S (2018). Data-Driven Nonparametric Existence and Association Problems, IEEE Transactions on Signal Processing, 66:24, (6377-6389), Online publication date: 15-Dec-2018.
  617. Liang Y, Ren J and Li T The Worst Jamming Distribution for Securely Precoded OFDM 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  618. Arafa A, Shin W, Vaezi M and Poor H Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  619. Wang D, Huang J and Huang C Full-Duplex Amplify-and-Forward Receiver Cooperations for Interference Channels 2018 IEEE Global Communications Conference (GLOBECOM), (206-212)
  620. Cika A, Badiu M, Coon J and Tajbakhsh S Entropy Rate of Time-Varying Wireless Networks 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  621. Chang W and Tandon R On the Capacity of Secure Distributed Matrix Multiplication 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  622. Xi T, Wang W, Tian Y and Gao H Mutual Information Maximization for Collaborative Mobile Sensing with Calibration Constraint 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  623. Benkhelifa F and Alouini M Practical Nonlinear Energy Harvesting Model in MIMO DF Relay System with Channel Uncertainty 2018 IEEE Global Communications Conference (GLOBECOM), (1-7)
  624. ACM
    Xu X, Song X and Zhao R Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, (375-379)
  625. ACM
    Huang C and Liu G Sentiment Analysis of Network Comments Based on GCNN Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, (409-413)
  626. Ke C and Honorio J Information-theoretic limits for community detection in network models Proceedings of the 32nd International Conference on Neural Information Processing Systems, (8334-8343)
  627. Asadi A, Abbe E and Verdú S Chaining mutual information and tightening generalization bounds Proceedings of the 32nd International Conference on Neural Information Processing Systems, (7245-7254)
  628. Ito S, Hatano D, Sumita H, Yabe A, Fukunaga T, Kakimura N and Kawarabayashi K Regret bounds for online portfolio selection with a cardinality constraint Proceedings of the 32nd International Conference on Neural Information Processing Systems, (10611-10620)
  629. Han Y, Jiao J, Lee C, Weissman T, Wu Y and Yu T Entropy rate estimation for Markov chains with large state space Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9803-9814)
  630. Kim H, Jiang Y, Kannan S, Oh S and Viswanath P Deepcode Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9458-9468)
  631. Ocko S, Lindsey J, Ganguli S and Deny S The emergence of multiple retinal cell types through efficient coding of natural movies Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9411-9422)
  632. Hao Y, Orlitsky A, Suresh A and Wu Y Data amplification Proceedings of the 32nd International Conference on Neural Information Processing Systems, (8848-8857)
  633. Kurutach T, Tamar A, Yang G, Russell S and Abbeel P Learning plannable representations with causal InfoGAN Proceedings of the 32nd International Conference on Neural Information Processing Systems, (8747-8758)
  634. Dong S and Roy B An information-theoretic analysis for thompson sampling with many actions Proceedings of the 32nd International Conference on Neural Information Processing Systems, (4161-4169)
  635. Ryali C and Yu A Beauty-in-averageness and its contextual modulations Proceedings of the 32nd International Conference on Neural Information Processing Systems, (4086-4096)
  636. Xu K Query complexity of Bayesian private learning Proceedings of the 32nd International Conference on Neural Information Processing Systems, (2436-2445)
  637. Asaad S, Rabiei A and Müller R (2018). Massive MIMO With Antenna Selection: Fundamental Limits and Applications, IEEE Transactions on Wireless Communications, 17:12, (8502-8516), Online publication date: 1-Dec-2018.
  638. Xu H and Sun L (2018). Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping, IEEE Transactions on Wireless Communications, 17:12, (8268-8282), Online publication date: 1-Dec-2018.
  639. Wang F, Ruan L and Win M (2018). Cooperative Network Operation Design for Mobility-Aware Cloud Radio Access Network, IEEE Transactions on Wireless Communications, 17:12, (7819-7833), Online publication date: 1-Dec-2018.
  640. Boda V and Narayan P (2018). Universal Sampling Rate Distortion, IEEE Transactions on Information Theory, 64:12, (7742-7758), Online publication date: 1-Dec-2018.
  641. Enzner G and Thune P (2018). Bayesian MMSE Filtering of Noisy Speech by SNR Marginalization With Global PSD Priors, IEEE/ACM Transactions on Audio, Speech and Language Processing, 26:12, (2289-2304), Online publication date: 1-Dec-2018.
  642. Nascimento J, Damasceno R, Oliveira G and Ramos R (2018). Quantum-chaotic key distribution in optical networks, Quantum Information Processing, 17:12, (1-14), Online publication date: 1-Dec-2018.
  643. Ainsworth M, Tugluk O, Whitney B and Klasky S (2018). Multilevel techniques for compression and reduction of scientific data--the univariate case, Computing and Visualization in Science, 19:5-6, (65-76), Online publication date: 1-Dec-2018.
  644. ACM
    Gao W, Hu L and Zhang P Feature Selection by Maximizing Part Mutual Information Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, (120-127)
  645. Lopez A and Jog V Generalization error bounds using Wasserstein distances 2018 IEEE Information Theory Workshop (ITW), (1-5)
  646. Li Z and Oechtering T Privacy-Utility Management of Hypothesis Tests 2018 IEEE Information Theory Workshop (ITW), (1-5)
  647. Xu X, Huang S, Zheng L and Zhang L The Geometric Structure of Generalized Softmax Learning 2018 IEEE Information Theory Workshop (ITW), (1-5)
  648. Dar Y, Elad M and Bruckstein A (2018). Restoration by Compression, IEEE Transactions on Signal Processing, 66:22, (5833-5847), Online publication date: 15-Nov-2018.
  649. Gupta N, Dhurandher S and Woungang I (2018). Subcarriers assignment scheme for multiple secondary users in OFDMA‐based IEEE 802.22 WRAN, Transactions on Emerging Telecommunications Technologies, 29:11, Online publication date: 13-Nov-2018.
  650. ACM
    Teixeira D, Alvim M and Almeida J On the Predictability of a User's Next Check-in Using Data from Different Social Networks Proceedings of the 2nd ACM SIGSPATIAL Workshop on Prediction of Human Mobility, (8-14)
  651. ACM
    Baral R, Iyengar S, Li T and Zhu X HiCaPS Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (436-439)
  652. Shi R, Steenkiste P and Veloso M Generating Synthetic Passenger Data through Joint Traffic-Passenger Modeling and Simulation 2018 21st International Conference on Intelligent Transportation Systems (ITSC), (3397-3402)
  653. Yao Y and Atkins E The Smart Black Box: A Value-Driven Automotive Event Data Recorder 2018 21st International Conference on Intelligent Transportation Systems (ITSC), (973-978)
  654. Sharma A and Murthy C (2018). On Finding a Subset of Non-Defective Items From a Large Population, IEEE Transactions on Signal Processing, 66:21, (5762-5775), Online publication date: 1-Nov-2018.
  655. WANG W, Yang L and Zhang Q (2018). Resonance-Based Secure Pairing for Wearables, IEEE Transactions on Mobile Computing, 17:11, (2607-2618), Online publication date: 1-Nov-2018.
  656. Wang C, Saeedi Bidokhti S and Wigger M (2018). Improved Converses and Gap Results for Coded Caching, IEEE Transactions on Information Theory, 64:11, (7051-7062), Online publication date: 1-Nov-2018.
  657. Burin A and Shayevitz O (2018). Reducing Guesswork via an Unreliable Oracle, IEEE Transactions on Information Theory, 64:11, (6941-6953), Online publication date: 1-Nov-2018.
  658. Basciftci Y, Koksal C and Ashikhmin A (2018). Physical-Layer Security in TDD Massive MIMO, IEEE Transactions on Information Theory, 64:11, (7359-7380), Online publication date: 1-Nov-2018.
  659. Saeedi Bidokhti S, Wigger M and Timo R (2018). Noisy Broadcast Networks With Receiver Caching, IEEE Transactions on Information Theory, 64:11, (6996-7016), Online publication date: 1-Nov-2018.
  660. Ahmed I, Sadjadpour H and Yousefi S Capacity Analysis and Bit Allocation Design for Variable-Resolution ADCs in Massive MIMO MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), (1-6)
  661. Chee Y, Horovitz M, Vardy A, Vu V and Yaakobi E Codes for Endurance-Limited Memories 2018 International Symposium on Information Theory and Its Applications (ISITA), (501-505)
  662. ACM
    Van Gysel C, de Rijke M and Kanoulas E Mix 'n Match Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (1373-1382)
  663. Gori J and Rioul O Information-Theoretic Analysis of the Speed-Accuracy Tradeoff with Feedback 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (3452-3457)
  664. Keshmiri S, Sumioka H, Okubo M, Yamazaki R, Nakae A and Ishiguro H Potential Health Benefit of Physical Embodiment in Elderly Counselling: A Longitudinal Case Study 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (1026-1032)
  665. Ding N, Sadeghi P and Rakotoarivelo T Improving Computational Efficiency of Communication for Omniscience and Successive Omniscience 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1073-1080)
  666. Kartik D, Sabir E, Mitra U and Natarajan P Policy Design for Active Sequential Hypothesis Testing using Deep Learning 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (741-748)
  667. Savas Y, Ornik M, Cubuktepe M and Topcu U Entropy Maximization for Constrained Markov Decision Processes 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (911-918)
  668. Bhatt A, Huang J, Kim Y, Ryu J and Sen P Monte Carlo Methods for Randomized Likelihood Decoding 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (204-211)
  669. Pedram A and Tanaka T Some Results on the Computation of Feedback Capacity of Gaussian Channels with Memory 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (919-926)
  670. Chung H, Lee J, Kim D and Hero A Trade-offs Between Query Difficulty and Sample Complexity in Crowdsourced Data Acquisition 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (639-646)
  671. Mustafa A and Modares H Analysis and Detection of Cyber-physical Attacks in Distributed Sensor Networks 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (973-980)
  672. Soltani R, Goeckel D, Towsley D and Houmansadr A Fundamental Limits of Covert Bit Insertion in Packets 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1065-1072)
  673. Li B, Wei S, Wang Y and Yuan J Topological and Algebraic Properties of Chernoff Information between Gaussian Graphs 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (670-675)
  674. Li Q and Chen Y Rate Distortion Via Restricted Boltzmann Machines 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1052-1059)
  675. Harrison W and Bloch M On Dual Relationships of Secrecy Codes 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (366-372)
  676. Jacopin E Statistical Planning: Building Models of Entropy of Centralized Planning for Multi-Agent Systems 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (100-109)
  677. Li X, Li C, Jin S and Gao X (2018). Interference Coordination for 3-D Beamforming-Based HetNet Exploiting Statistical Channel-State Information, IEEE Transactions on Wireless Communications, 17:10, (6887-6900), Online publication date: 1-Oct-2018.
  678. Chraiti M, Ghrayeb A and Assi C (2018). A NOMA Scheme for a Two-User MISO Downlink Channel With Unknown CSIT, IEEE Transactions on Wireless Communications, 17:10, (6775-6789), Online publication date: 1-Oct-2018.
  679. ACM
    Huang D, Yu S, Li B, Hoi S and Zhou S (2018). Combination Forecasting Reversion Strategy for Online Portfolio Selection, ACM Transactions on Intelligent Systems and Technology, 9:5, (1-22), Online publication date: 30-Sep-2018.
  680. Bruni V, Salvi A and Vitulano D A Wavelet Based Image Fusion Method Using Local Multiscale Image Regularity Advanced Concepts for Intelligent Vision Systems, (534-546)
  681. Mazyad A, Teytaud F and Fonlupt C Generating Term Weighting Schemes Through Genetic Programming Machine Learning, Optimization, and Data Science, (92-103)
  682. Kakar J, Chaaban A, Marojevic V and Sezgin A UAV-aided Multi-Way Communications 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1169-1173)
  683. Chen L, Ahriz I, Le Ruyet D and Sun H Probabilistic Indoor Position Determination via Channel Impulse Response 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (829-834)
  684. Passalis N and Tefas A Learning Deep Representations with Probabilistic Knowledge Transfer Computer Vision – ECCV 2018, (283-299)
  685. Cecchini F, Riedl M, Fersini E and Biemann C (2018). A comparison of graph-based word sense induction clustering algorithms in a pseudoword evaluation framework, Language Resources and Evaluation, 52:3, (733-770), Online publication date: 1-Sep-2018.
  686. Traganitis P, Pages-Zamora A and Giannakis G (2018). Blind Multiclass Ensemble Classification, IEEE Transactions on Signal Processing, 66:18, (4737-4752), Online publication date: 1-Sep-2018.
  687. Lin S and Wang I (2018). Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter, IEEE Transactions on Information Theory, 64:9, (6362-6383), Online publication date: 1-Sep-2018.
  688. MolavianJazi E and Yener A (2018). Subset Source Coding, IEEE Transactions on Information Theory, 64:9, (5989-6012), Online publication date: 1-Sep-2018.
  689. Yu L, Li H and Li W (2018). Distortion Bounds for Source Broadcast Problems, IEEE Transactions on Information Theory, 64:9, (6034-6053), Online publication date: 1-Sep-2018.
  690. Magner A, Turowski K and Szpankowski W (2018). Lossless Compression of Binary Trees With Correlated Vertex Names, IEEE Transactions on Information Theory, 64:9, (6070-6080), Online publication date: 1-Sep-2018.
  691. Guler B, Gunduz D and Yener A (2018). Lossy Coding of Correlated Sources Over a Multiple Access Channel, IEEE Transactions on Information Theory, 64:9, (6081-6097), Online publication date: 1-Sep-2018.
  692. Lalitha A, Javidi T and Sarwate A (2018). Social Learning and Distributed Hypothesis Testing, IEEE Transactions on Information Theory, 64:9, (6161-6179), Online publication date: 1-Sep-2018.
  693. Dinur I and Meir O (2018). Toward the KRW Composition Conjecture, Computational Complexity, 27:3, (375-462), Online publication date: 1-Sep-2018.
  694. ACM
    Kirchhoffer H, Marpe D, Schwarz H and Wiegand T (2018). Properties and Design of Variable-to-Variable Length Codes, ACM Transactions on Multimedia Computing, Communications, and Applications, 14:3, (1-19), Online publication date: 31-Aug-2018.
  695. ACM
    Muszynski M, Kostoulas T, Lombardo P, Pun T and Chanel G (2018). Aesthetic Highlight Detection in Movies Based on Synchronization of Spectators’ Reactions, ACM Transactions on Multimedia Computing, Communications, and Applications, 14:3, (1-23), Online publication date: 31-Aug-2018.
  696. Luo C and Shrivastava A Jaccard Affiliation Graph (JAG) model for explaining overlapping community behaviors Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1-8)
  697. Carrington A, Fieguth P and Chen H Measures of Model Interpretability for Model Selection Machine Learning and Knowledge Extraction, (329-349)
  698. ACM
    Zhao T, Jiang Y, Wu J and Cheng J Core-set based product quantization for large-scale multimedia search Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, (1-7)
  699. Guerra A, Guidi F and Dardari D (2018). Single-Anchor Localization and Orientation Performance Limits Using Massive Arrays, IEEE Transactions on Wireless Communications, 17:8, (5241-5255), Online publication date: 1-Aug-2018.
  700. Kozdoba M and Mannor S (2018). Source Estimation in Time Series and the Surprising Resilience of HMMs, IEEE Transactions on Information Theory, 64:8, (5555-5569), Online publication date: 1-Aug-2018.
  701. Haci H (2018). Performance study of non-orthogonal multiple access (NOMA) with triangular successive interference cancellation, Wireless Networks, 24:6, (2145-2163), Online publication date: 1-Aug-2018.
  702. Mohammadi M and Andargoli S (2018). Power optimization and subcarrier allocation for downlink MIMO-OFDMA based cognitive radio networks, Wireless Networks, 24:6, (2221-2235), Online publication date: 1-Aug-2018.
  703. Rajala M and Ritala R (2018). Topology estimation method for telecommunication networks, Telecommunications Systems, 68:4, (745-759), Online publication date: 1-Aug-2018.
  704. Chowdhury K, Chaudhuri D and Pal A (2018). A new image segmentation technique using bi-entropy function minimization, Multimedia Tools and Applications, 77:16, (20889-20915), Online publication date: 1-Aug-2018.
  705. Nagarajan S, Mohamed S and Piliouras G Three Body Problems in Evolutionary Game Dynamics Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (685-693)
  706. Nikolaev K and Malafeev A Russian Q&A Method Study: From Naive Bayes to Convolutional Neural Networks Analysis of Images, Social Networks and Texts, (121-126)
  707. Hamadouche A, Kouadri A and Bensmail A (2018). Kernelized relative entropy for direct fault detection in industrial rotary kilns, International Journal of Adaptive Control and Signal Processing, 32:7, (967-979), Online publication date: 3-Jul-2018.
  708. ACM
    Zhang L, Ai W, Yuan C, Zhang Y and Ye J Taxi or Hitchhiking The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, (1041-1044)
  709. ACM
    Ji S, Shao J, Agun D and Yang T Privacy-aware Ranking with Tree Ensembles on the Cloud The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, (315-324)
  710. ACM
    Dong R, Ratliff L, Cárdenas A, Ohlsson H and Sastry S (2018). Quantifying the Utility--Privacy Tradeoff in the Internet of Things, ACM Transactions on Cyber-Physical Systems, 2:2, (1-28), Online publication date: 26-Jun-2018.
  711. Simo F and Lenne D On the Systems Engineering Process of some Systems (of Systems) 2018 13th Annual Conference on System of Systems Engineering (SoSE), (425-430)
  712. Li Y and Siegzel P On the Capacity of 2-Dimensional Channels 2018 IEEE International Symposium on Information Theory (ISIT), (1251-1255)
  713. Tian C, Sun H and Chen J A Shannon-Theoretic Approach to the Storage-Retrieval Tradeoff in PIR Systems 2018 IEEE International Symposium on Information Theory (ISIT), (1904-1908)
  714. Painsky A and Wornell G On the Universality of the Logistic Loss Function 2018 IEEE International Symposium on Information Theory (ISIT), (936-940)
  715. Domanovitz E and Erez U Simple Bounds for the Symmetric Capacity of the Rayleigh Fading Multiple Access Channel 2018 IEEE International Symposium on Information Theory (ISIT), (1096-1100)
  716. Tatwawadi K, Jiao J and Weissman T Minimax Redundancy for Markov Chains with Large State Space 2018 IEEE International Symposium on Information Theory (ISIT), (216-220)
  717. Fan X and Wagner A Variable Packet-Error Coding: the Point-to-Point Case 2018 IEEE International Symposium on Information Theory (ISIT), (106-110)
  718. Bhat R, Motani M and Lim T Hybrid NOMA-TDMA for Multiple Access Channels with Non-Ideal Batteries and Circuit Cost 2018 IEEE International Symposium on Information Theory (ISIT), (1091-1095)
  719. Sula E, Gastpar M and Kramer G Sum-Rate Capacity for Symmetric Gaussian Multiple Access Channels with Feedback 2018 IEEE International Symposium on Information Theory (ISIT), (306-310)
  720. Tridenski S and Zamir R Channel Input Adaptation via Natural Type Selection 2018 IEEE International Symposium on Information Theory (ISIT), (226-230)
  721. Kobayashi M, Caire G and Kramer G Joint State Sensing and Communication: Optimal Tradeoff for a Memoryless Case 2018 IEEE International Symposium on Information Theory (ISIT), (111-115)
  722. Melbourne J, Talukdar S, Bhaban S and Salapaka M Error Bounds on a Mixed Entropy Inequality 2018 IEEE International Symposium on Information Theory (ISIT), (1973-1977)
  723. Soltani M and Rezki Z The Capacity of the Optical Broadcast Channel with Peak and Average Intensity Constraints 2018 IEEE International Symposium on Information Theory (ISIT), (916-920)
  724. Le T, Subramanian V and Berry R Bayesian Learning with Random Arrivals 2018 IEEE International Symposium on Information Theory (ISIT), (926-930)
  725. Toyran M, Toyran M and Öztürk S (2018). Optimized cascade protocol for efficient information reconciliation in quantum key distribution systems, Quantum Information & Computation, 18:7-8, (553-578), Online publication date: 1-Jun-2018.
  726. Xiao K, Xia B, Chen Z, Xiao B, Chen D and Ma S (2018). On Capacity-Based Codebook Design and Advanced Decoding for Sparse Code Multiple Access Systems, IEEE Transactions on Wireless Communications, 17:6, (3834-3849), Online publication date: 1-Jun-2018.
  727. Sheikholeslami A, Ghaderi M, Towsley D, Bash B, Guha S and Goeckel D (2018). Multi-Hop Routing in Covert Wireless Networks, IEEE Transactions on Wireless Communications, 17:6, (3656-3669), Online publication date: 1-Jun-2018.
  728. Ghassami A and Kiyavash N (2018). A Covert Queueing Channel in FCFS Schedulers, IEEE Transactions on Information Forensics and Security, 13:6, (1551-1563), Online publication date: 1-Jun-2018.
  729. Rosman G, Choi C, Dogar M, Fisher IIIl J and Rus D Task-Specific Sensor Planning for Robotic Assembly Tasks 2018 IEEE International Conference on Robotics and Automation (ICRA), (2932-2939)
  730. Thöni A, Taudes A and Tjoa A (2018). An information system for assessing the likelihood of child labor in supplier locations leveraging Bayesian networks and text mining, Information Systems and e-Business Management, 16:2, (443-476), Online publication date: 1-May-2018.
  731. Karmakar S GDoF region characterization of the weak MIMO IC with No CSIT 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-5)
  732. Saraiva J, Lima F, Maciel T and Cavalcanti F Relay selection, subcarrier pairing and power allocation for energy efficiency and QoS guarantees 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  733. Roushdy A, El-Keyi A and Nafie M Degrees of freedom region of device-relaying cellular network 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  734. Harshan J and Hu Y Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  735. Sledge I and Príncipe J Partitioning Relational Matrices of Similarities or Dissimilarities Using the Value of Information 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2416-2420)
  736. Nielsen F The Chord Gap Divergence and a Generalization of the Bhattacharyya Distance 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2276-2280)
  737. Liu Y, Liang Y and Cui S Data-Driven Nonparametric Hypothesis Testing 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4234-4238)
  738. Ding N, Smith D, Sadeghi P and Rakotoarivelo T Fairness in Multiterminal Data Compression: A Splitting Method for the Egalitarian Solution 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6383-6387)
  739. Nielsen F and Nock R On the Geometry of Mixtures of Prescribed Distributions 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2861-2865)
  740. Zhang R and Venkitasubramaniam P Mutual-Information-Private Online Gradient Descent Algorithm 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2077-2081)
  741. Berger P, Buchacher M, Hannak G and Matz G Graph Learning Based on Total Variation Minimization 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6309-6313)
  742. Lee D, Berberidis D and Giannakis G Adaptive Bayesian Channel Gain Cartography 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3554-3558)
  743. Pan J, Xu J, Ruiz A, Zhao W, Pan S, Sun Y and Lu Q Field-weighted Factorization Machines for Click-Through Rate Prediction in Display Advertising Proceedings of the 2018 World Wide Web Conference, (1349-1357)
  744. Ryabko B (2018). Information-Theoretic Approach to Estimating the Capacity of Distributed Memory Systems, Problems of Information Transmission, 54:2, (191-198), Online publication date: 1-Apr-2018.
  745. Pan Y, Duan F, Chapeau-Blondeau F and Abbott D (2018). Noise Enhancement in Robust Estimation of Location, IEEE Transactions on Signal Processing, 66:8, (1953-1966), Online publication date: 1-Apr-2018.
  746. Zheng M, Chen W and Ling C (2018). Polar Coding for the Cognitive Interference Channel With Confidential Messages, IEEE Journal on Selected Areas in Communications, 36:4, (762-774), Online publication date: 1-Apr-2018.
  747. ACM
    Giesen H, Gojman B, Rubin R, Kim J and Dehon A (2018). Continuous Online Self-Monitoring Introspection Circuitry for Timing Repair by Incremental Partial-Reconfiguration (COSMIC TRIP), ACM Transactions on Reconfigurable Technology and Systems, 11:1, (1-23), Online publication date: 22-Mar-2018.
  748. Zhu Z and Kay S (2018). On Bayesian Exponentially Embedded Family for Model Order Selection, IEEE Transactions on Signal Processing, 66:4, (933-943), Online publication date: 1-Feb-2018.
  749. El Gheche M, Chierchia G and Pesquet J (2018). Proximity Operators of Discrete Information Divergences, IEEE Transactions on Information Theory, 64:2, (1092-1104), Online publication date: 1-Feb-2018.
  750. Kapoor S, Sreekumar S and Pillai S (2018). Distributed Scheduling in Multiple Access With Bursty Arrivals Under a Maximum Delay Constraint, IEEE Transactions on Information Theory, 64:2, (1297-1316), Online publication date: 1-Feb-2018.
  751. Arras B and Swan Y (2018). IT Formulae for Gamma Target, IEEE Transactions on Information Theory, 64:2, (1083-1091), Online publication date: 1-Feb-2018.
  752. Varasteh M, Rassouli B, Simeone O and Gunduz D (2018). Zero-Delay Source-Channel Coding With a Low-Resolution ADC Front End, IEEE Transactions on Information Theory, 64:2, (1241-1261), Online publication date: 1-Feb-2018.
  753. Dehghan Z and Mansoori E (2018). A new feature subset selection using bottom-up clustering, Pattern Analysis & Applications, 21:1, (57-66), Online publication date: 1-Feb-2018.
  754. Achille A and Soatto S (2018). Emergence of invariance and disentanglement in deep representations, The Journal of Machine Learning Research, 19:1, (1947-1980), Online publication date: 1-Jan-2018.
  755. Abdul Haleem M and Ur-Rahman M (2018). On the Capacity and Transmission Techniques of Massive MIMO Systems, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  756. Zhou W, Deng D, Xia J, Shao Z and Mitton N (2018). The Precoder Design with Covariance Feedback for Simultaneous Information and Energy Transmission Systems, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  757. Saad M and Gimenez-Guzman J (2018). Optimal Multicommodity Spectrum-Efficient Routing in Multihop Wireless Networks, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  758. Lee J, Kim D and Czarnowski I (2018). Scalable Multilabel Learning Based on Feature and Label Dimensionality Reduction, Complexity, 2018, Online publication date: 1-Jan-2018.
  759. Quax R, Chliamovitch G, Dupuis A, Falcone J, Chopard B, Hoekstra A, Sloot P and Volchenkov D (2018). Information Processing Features Can Detect Behavioral Regimes of Dynamical Systems, Complexity, 2018, Online publication date: 1-Jan-2018.
  760. Shim K, An B and Chowdhury M (2018). Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  761. Ding D and Wilde M (2018). Strong Converse for the Feedback-Assisted Classical Capacity of Entanglement-Breaking Channels, Problems of Information Transmission, 54:1, (1-19), Online publication date: 1-Jan-2018.
  762. Khatiwada S, Tushev M and Mahmoud A (2018). Just enough semantics, Information and Software Technology, 93:C, (45-57), Online publication date: 1-Jan-2018.
  763. Tavakoli H (2018). Capacity and Channel Coding for Wireless Point-to-Point Z2 Channel, Wireless Personal Communications: An International Journal, 98:2, (1785-1798), Online publication date: 1-Jan-2018.
  764. Dinh-Van S, Nguyen V and Shin O (2018). Interference-Aware Transmission for D2D Communications in a Cellular Network, Wireless Personal Communications: An International Journal, 98:1, (1489-1503), Online publication date: 1-Jan-2018.
  765. Shang J, Chen M and Zhou D Multimode process monitoring based on conditionally independent Bayesian learning 2017 IEEE 56th Annual Conference on Decision and Control (CDC), (2705-2710)
  766. Mazumdar A and Pal S Semisupervised clustering, and-queries and locally encodable source coding Proceedings of the 31st International Conference on Neural Information Processing Systems, (6492-6502)
  767. Mazumdar A and Saha B Clustering with noisy queries Proceedings of the 31st International Conference on Neural Information Processing Systems, (5790-5801)
  768. Arjevani Y Limitations on variance-reduction and acceleration schemes for finite sum optimization Proceedings of the 31st International Conference on Neural Information Processing Systems, (3543-3552)
  769. Srivastava A, Valkov L, Russell C, Gutmann M and Sutton C VEEGAN Proceedings of the 31st International Conference on Neural Information Processing Systems, (3310-3320)
  770. Dobbe R, Fridovich-Keil D and Tomlin C Fully decentralized policies for multi-agent systems Proceedings of the 31st International Conference on Neural Information Processing Systems, (2945-2954)
  771. Agustsson E, Mentzer F, Tschannen M, Cavigelli L, Timofte R, Benini L and Van Gool L Soft-to-hard vector quantization for end-to-end learning compressible representations Proceedings of the 31st International Conference on Neural Information Processing Systems, (1141-1151)
  772. Zhao Z and Chen W An Adaptive Switching Method for Sum Rate Maximization in Downlink MISO-NOMA Systems GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  773. Dong Y, Hossain M, Cheng J and Leung V Fronthaul-Aware Group Sparse Precoding and Signal Splitting in SWIPT C-RAN GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  774. Zhu Y, Zhang Y, Yan F, Xia W, Xing S, Wu Y and Shen L TOA-Based Cooperative Localization with LOS/NLOS Probability in Wireless Networks GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  775. Chen S, Jiang Z, Liu J, Vannithamby R, Zhou S, Niu Z and Wu Y Remote Channel Inference for Beamforming in Ultra-Dense Hyper-Cellular Network GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  776. Zhou L and Motani M On the Multiple Description Coding Problem with One Semi-Deterministic Distortion Measure GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  777. Mutangana J, Tandon R and Lee N Blind Cooperative Jamming: Exploiting ISI Heterogeneity to Achieve Positive Secure DoF GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  778. Jia Z, Sun H and Jafar S The Capacity of Private Information Retrieval with Disjoint Colluding Sets GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  779. Kłosowski P (2017). Statistical analysis of orthographic and phonemic language corpus for word-based and phoneme-based Polish language modelling, EURASIP Journal on Audio, Speech, and Music Processing, 2017:1, (1-16), Online publication date: 1-Dec-2017.
  780. Fillatre L (2017). Constructive minimax classification of discrete observations with arbitrary loss function, Signal Processing, 141:C, (322-330), Online publication date: 1-Dec-2017.
  781. Mazhar F, Khan M and Sällberg B (2017). Precise Indoor Positioning Using UWB, Wireless Personal Communications: An International Journal, 97:3, (4467-4491), Online publication date: 1-Dec-2017.
  782. ACM
    Sbert M, Shen H, Viola I, Chen M, Bardera A and Feixas M Tutorial on information theory in visualization SIGGRAPH Asia 2017 Courses, (1-165)
  783. Mostafa A and Lampe L (2017). On Linear Precoding for the Two-User MISO Broadcast Channel With Confidential Messages and Per-Antenna Constraints, IEEE Transactions on Signal Processing, 65:22, (6053-6068), Online publication date: 15-Nov-2017.
  784. Soloveychik I, Xiang Y and Tarokh V Explicit symmetric pseudo-random matrices 2017 IEEE Information Theory Workshop (ITW), (424-428)
  785. Wang Q and Skoglund M Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers 2017 IEEE Information Theory Workshop (ITW), (71-75)
  786. Zheng J, Jiang Z and Chellappa R (2017). Submodular Attribute Selection for Visual Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 39:11, (2242-2255), Online publication date: 1-Nov-2017.
  787. Koh Y and Kim C (2017). Unsupervised Primary Object Discovery in Videos Based on Evolutionary Primary Object Modeling With Reliable Object Proposals, IEEE Transactions on Image Processing, 26:11, (5203-5216), Online publication date: 1-Nov-2017.
  788. Bonmati E, Bardera A and Boada I (2017). Brain parcellation based on information theory, Computer Methods and Programs in Biomedicine, 151:C, (203-212), Online publication date: 1-Nov-2017.
  789. Letchford A, Ni Q and Zhong Z (2017). An exact algorithm for a resource allocation problem in mobile wireless communications, Computational Optimization and Applications, 68:2, (193-208), Online publication date: 1-Nov-2017.
  790. Jamshidi P, Siegmund N, Velez M, Kästner C, Patel A and Agarwal Y Transfer learning for performance modeling of configurable systems: an exploratory analysis Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (497-508)
  791. Kavaler D, Sirovica S, Hellendoorn V, Aranovich R and Filkov V Perceived language complexity in GitHub issue discussions and their effect on issue resolution Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (72-83)
  792. ACM
    Oya S, Troncoso C and Pérez-González F Back to the Drawing Board Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (1959-1972)
  793. Rezvani T, Driggs-Campbell K and Bajcsy R Optimizing interaction between humans and autonomy via information constraints on interface design 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), (1-6)
  794. Lipor J, Wong B, Scavia D, Kerkez B and Balzano L (2017). Distance-Penalized Active Learning Using Quantile Search, IEEE Transactions on Signal Processing, 65:20, (5453-5465), Online publication date: 15-Oct-2017.
  795. ACM
    Sultan N, Barbhuiya F and Sarma N A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control Proceedings of the 10th International Conference on Security of Information and Networks, (11-18)
  796. ACM
    Zhao S, Luo Z, Lu Z, Lu X and Liu Y Stateful Inter-Packet Signal Processing for Wireless Networking Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, (15-27)
  797. Rahimzamani A and Kannan S Potential conditional mutual information: Estimators and properties 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1228-1235)
  798. Wang Q and Skoglund M Secure symmetric private information retrieval from colluding databases with adversaries 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1083-1090)
  799. Tandon R The capacity of cache aided private information retrieval 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1078-1082)
  800. ACM
    Moraes F, Alvim M and Santos R Modeling Information Flow in Dynamic Information Retrieval Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, (305-308)
  801. Chen Z, Ding Z, Dai X and Zhang R (2017). An Optimization Perspective of the Superiority of NOMA Compared to Conventional OMA, IEEE Transactions on Signal Processing, 65:19, (5191-5202), Online publication date: 1-Oct-2017.
  802. Beard M, Vo B, Vo B and Arulampalam S (2017). Void Probabilities and Cauchy–Schwarz Divergence for Generalized Labeled Multi-Bernoulli Models, IEEE Transactions on Signal Processing, 65:19, (5047-5061), Online publication date: 1-Oct-2017.
  803. Gomez-Vilardebo J and Gomez-Vilardebo J (2017). Routing in Accumulative Multi-Hop Networks, IEEE/ACM Transactions on Networking, 25:5, (2815-2828), Online publication date: 1-Oct-2017.
  804. Canonne C, Guruswami V, Meka R and Sudan M (2017). Communication With Imperfectly Shared Randomness, IEEE Transactions on Information Theory, 63:10, (6799-6818), Online publication date: 1-Oct-2017.
  805. Weinberger N and Merhav N (2017). Channel Detection in Coded Communication, IEEE Transactions on Information Theory, 63:10, (6364-6392), Online publication date: 1-Oct-2017.
  806. Painsky A, Rosset S and Feder M (2017). Large Alphabet Source Coding Using Independent Component Analysis, IEEE Transactions on Information Theory, 63:10, (6514-6529), Online publication date: 1-Oct-2017.
  807. Wang Q, Jaggi S, Médard M, Cadambe V and Schwartz M (2017). File Updates Under Random/Arbitrary Insertions and Deletions, IEEE Transactions on Information Theory, 63:10, (6487-6513), Online publication date: 1-Oct-2017.
  808. Fanti G, Kairouz P, Oh S, Ramchandran K and Viswanath P (2017). Hiding the Rumor Source, IEEE Transactions on Information Theory, 63:10, (6679-6713), Online publication date: 1-Oct-2017.
  809. Yu L, Huang Z, Shen F, Song J, Shen H and Zhou X (2017). Bilinear Optimized Product Quantization for Scalable Visual Content Analysis, IEEE Transactions on Image Processing, 26:10, (5057-5069), Online publication date: 1-Oct-2017.
  810. Ding Z, Lei X, Karagiannidis G, Schober R, Yuan J and Bhargava V (2017). A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends, IEEE Journal on Selected Areas in Communications, 35:10, (2181-2195), Online publication date: 1-Oct-2017.
  811. Torra V (2017). Entropy for non-additive measures in continuous domains, Fuzzy Sets and Systems, 324:C, (49-59), Online publication date: 1-Oct-2017.
  812. Jakobsen S (2017). Information Theoretical Cryptogenography, Journal of Cryptology, 30:4, (1067-1115), Online publication date: 1-Oct-2017.
  813. Liu Y, Chen Q, Tang X and Cai L (2017). On the Buffer Energy Aware Adaptive Relaying in Multiple Relay Network, IEEE Transactions on Wireless Communications, 16:9, (6248-6263), Online publication date: 1-Sep-2017.
  814. Mao Y, Zhang J, Song S and Letaief K (2017). Stochastic Joint Radio and Computational Resource Management for Multi-User Mobile-Edge Computing Systems, IEEE Transactions on Wireless Communications, 16:9, (5994-6009), Online publication date: 1-Sep-2017.
  815. Cao H, Tian H, Cai J, Alfa A and Huang S (2017). Dynamic Load-Balancing Spectrum Decision for Heterogeneous Services Provisioning in Multi-Channel Cognitive Radio Networks, IEEE Transactions on Wireless Communications, 16:9, (5911-5924), Online publication date: 1-Sep-2017.
  816. Huleihel W and Steinberg Y (2017). Channels With Cooperation Links That May Be Absent, IEEE Transactions on Information Theory, 63:9, (5886-5906), Online publication date: 1-Sep-2017.
  817. Ubaru S, Mazumdar A and Saad Y (2017). Low Rank Approximation and Decomposition of Large Matrices Using Error Correcting Codes, IEEE Transactions on Information Theory, 63:9, (5544-5558), Online publication date: 1-Sep-2017.
  818. Huang Y and Narayanan K (2017). Construction $\pi _{A}$ and $\pi _{D}$ Lattices: Construction, Goodness, and Decoding Algorithms, IEEE Transactions on Information Theory, 63:9, (5718-5733), Online publication date: 1-Sep-2017.
  819. Park S, Yu N and Lee H (2017). An Information-Theoretic Study for Joint Sparsity Pattern Recovery With Different Sensing Matrices, IEEE Transactions on Information Theory, 63:9, (5559-5571), Online publication date: 1-Sep-2017.
  820. Johnson O (2017). Strong Converses for Group Testing From Finite Blocklength Results, IEEE Transactions on Information Theory, 63:9, (5923-5933), Online publication date: 1-Sep-2017.
  821. Ke F, Huang X, Liu Y and Feng S (2017). Simultaneous Wireless Information and Power Transfer with Finite-Alphabet Inputs, Wireless Personal Communications: An International Journal, 96:1, (655-668), Online publication date: 1-Sep-2017.
  822. Xu J, Nie F and Han J Feature selection via scaling factor integrated multi-class support vector machines Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3168-3174)
  823. Chen B, Yu S, Tang J, He M and Zeng Y (2017). Using function approximation for personalized point-of-interest recommendation, Expert Systems with Applications: An International Journal, 79:C, (225-235), Online publication date: 15-Aug-2017.
  824. ACM
    Yin Z, Chang K and Zhang R DeepProbe Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2131-2139)
  825. ACM
    Hallac D, Vare S, Boyd S and Leskovec J Toeplitz Inverse Covariance-Based Clustering of Multivariate Time Series Data Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (215-223)
  826. Xie P, Singh A and Xing E Uncorrelation and evenness Proceedings of the 34th International Conference on Machine Learning - Volume 70, (3811-3820)
  827. Hu W, Miyato T, Tokui S, Matsumoto E and Sugiyama M Learning discrete representations via information maximizing self-augmented training Proceedings of the 34th International Conference on Machine Learning - Volume 70, (1558-1567)
  828. Hoffman M Learning deep latent Gaussian models with Markov chain Monte Carlo Proceedings of the 34th International Conference on Machine Learning - Volume 70, (1510-1519)
  829. Xiong K, Wang B and Liu K (2017). Rate-Energy Region of SWIPT for MIMO Broadcasting Under Nonlinear Energy Harvesting Model, IEEE Transactions on Wireless Communications, 16:8, (5147-5161), Online publication date: 1-Aug-2017.
  830. Cao Y, Tao M, Xu F and Liu K (2017). Fundamental Storage-Latency Tradeoff in Cache-Aided MIMO Interference Networks, IEEE Transactions on Wireless Communications, 16:8, (5061-5076), Online publication date: 1-Aug-2017.
  831. Shin W, Mai V, Jung B and Yang H (2017). Opportunistic Network Decoupling with Virtual Full-Duplex Operation in Multi-Source Interfering Relay Networks, IEEE Transactions on Mobile Computing, 16:8, (2321-2333), Online publication date: 1-Aug-2017.
  832. Nam J (2017). On the High-SNR Capacity of the Gaussian Interference Channel and New Capacity Bounds, IEEE Transactions on Information Theory, 63:8, (5266-5285), Online publication date: 1-Aug-2017.
  833. Horovitz M and Yaakobi E (2017). On the Capacity of Write-Once Memories, IEEE Transactions on Information Theory, 63:8, (5124-5137), Online publication date: 1-Aug-2017.
  834. Katz G, Piantanida P and Debbah M (2017). Distributed Binary Detection With Lossy Data Compression, IEEE Transactions on Information Theory, 63:8, (5207-5227), Online publication date: 1-Aug-2017.
  835. Pan C, Zhu H, Gomes N and Wang J (2017). Joint User Selection and Energy Minimization for Ultra-Dense Multi-channel C-RAN With Incomplete CSI, IEEE Journal on Selected Areas in Communications, 35:8, (1809-1824), Online publication date: 1-Aug-2017.
  836. Talbi S, Koudil M, Bouabdallah A and Benatchba K (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks, Telecommunications Systems, 65:4, (605-619), Online publication date: 1-Aug-2017.
  837. Kawachi A, Rossman B and Watanabe O (2017). The Query Complexity of Witness Finding, Theory of Computing Systems, 61:2, (305-321), Online publication date: 1-Aug-2017.
  838. ACM
    Block K, Narain S and Noubir G An autonomic and permissionless Android covert channel Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (184-194)
  839. ACM
    Zheng Z, Peng Y, Wu F, Tang S and Chen G An Online Pricing Mechanism for Mobile Crowdsensing Data Markets Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (1-10)
  840. ACM
    Tian S, Ye S, Iqbal M and Zhang J A New Approach to the Block-based Compressive Sensing Proceedings of the 2017 International Conference on Computer Graphics and Digital Image Processing, (1-5)
  841. Ryabko B, Gus'kov A and Selivanova I (2017). Information-Theoretic method for classification of texts, Problems of Information Transmission, 53:3, (294-304), Online publication date: 1-Jul-2017.
  842. Dalai M (2017). A note on random coding bounds for classical-quantum channels, Problems of Information Transmission, 53:3, (222-228), Online publication date: 1-Jul-2017.
  843. Tchaikovsky M and Timin V (2017). Synthesis of anisotropic suboptimal control for linear time-varying systems on finite time horizon, Automation and Remote Control, 78:7, (1203-1217), Online publication date: 1-Jul-2017.
  844. Özçelikkale A, McKelvey T and Viberg M (2017). Transmission Strategies for Remote Estimation With an Energy Harvesting Sensor, IEEE Transactions on Wireless Communications, 16:7, (4390-4403), Online publication date: 1-Jul-2017.
  845. Agarwal R, Chen Z and Sarma S (2017). A Novel Nonparametric Maximum Likelihood Estimator for Probability Density Functions, IEEE Transactions on Pattern Analysis and Machine Intelligence, 39:7, (1294-1308), Online publication date: 1-Jul-2017.
  846. Chadha A and Andreopoulos Y (2017). Voronoi-Based Compact Image Descriptors: Efficient Region-of-Interest Retrieval With VLAD and Deep-Learning-Based Descriptors, IEEE Transactions on Multimedia, 19:7, (1596-1608), Online publication date: 1-Jul-2017.
  847. Ghasemi H and Ramamoorthy A (2017). Improved Lower Bounds for Coded Caching, IEEE Transactions on Information Theory, 63:7, (4388-4413), Online publication date: 1-Jul-2017.
  848. Chen J, Jiang F and Lee Swindlehurst A (2017). The Gaussian CEO Problem for Scalar Sources With Arbitrary Memory, IEEE Transactions on Information Theory, 63:7, (4286-4297), Online publication date: 1-Jul-2017.
  849. Tian C, Chen J, Diggavi S and Shamai Shitz S (2017). Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes, IEEE Transactions on Information Theory, 63:7, (4155-4171), Online publication date: 1-Jul-2017.
  850. Kosut O and Kliewer J (2017). Equivalence for Networks With Adversarial State, IEEE Transactions on Information Theory, 63:7, (4137-4154), Online publication date: 1-Jul-2017.
  851. Braun G, Guzmán C and Pokutta S (2017). Lower Bounds on the Oracle Complexity of Nonsmooth Convex Optimization via Information Theory, IEEE Transactions on Information Theory, 63:7, (4709-4724), Online publication date: 1-Jul-2017.
  852. Tutuncuoglu K, Ozel O, Yener A and Ulukus S (2017). The Binary Energy Harvesting Channel With a Unit-Sized Battery, IEEE Transactions on Information Theory, 63:7, (4240-4256), Online publication date: 1-Jul-2017.
  853. Weinberger N and Merhav N (2017). Simplified Erasure/List Decoding, IEEE Transactions on Information Theory, 63:7, (4218-4239), Online publication date: 1-Jul-2017.
  854. Weinberger N and Shayevitz O (2017). On the Optimal Boolean Function for Prediction Under Quadratic Loss, IEEE Transactions on Information Theory, 63:7, (4202-4217), Online publication date: 1-Jul-2017.
  855. Zhang R and Venkitasubramaniam P (2017). Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems, IEEE Transactions on Information Forensics and Security, 12:7, (1555-1570), Online publication date: 1-Jul-2017.
  856. Zhao L, Ng D and Yuan J (2017). Multi-User Precoding and Channel Estimation for Hybrid Millimeter Wave Systems, IEEE Journal on Selected Areas in Communications, 35:7, (1576-1590), Online publication date: 1-Jul-2017.
  857. Koleini M, Ahmadzadeh M and Sadri S (2017). A new efficient feature-combination-based method for dynamic texture modeling and classification using semi-random starting parameter dynamic Bayesian networks, Multimedia Tools and Applications, 76:14, (15251-15278), Online publication date: 1-Jul-2017.
  858. Wibisono A, Jog V and Loh P Information and estimation in Fokker-Planck channels 2017 IEEE International Symposium on Information Theory (ISIT), (2673-2677)
  859. Shariatpanahi S, Caire G and Khalaj B Multi-antenna coded caching 2017 IEEE International Symposium on Information Theory (ISIT), (2113-2117)
  860. Ni Z and Motani M Gaussian channels with minimum amplitude constraints: When is optimal input binary? 2017 IEEE International Symposium on Information Theory (ISIT), (2078-2082)
  861. Banawan K and Ulukus S Multi-message private information retrieval 2017 IEEE International Symposium on Information Theory (ISIT), (1898-1902)
  862. Soloveychik I, Xiang Y and Tarokh V Pseudo-wigner matrices from dual BCH codes 2017 IEEE International Symposium on Information Theory (ISIT), (1381-1385)
  863. Noshad M, Moon K, Sekeh S and Hero A Direct estimation of information divergence using nearest neighbor ratios 2017 IEEE International Symposium on Information Theory (ISIT), (903-907)
  864. Geiger B and Koch T On the information dimension rate of stochastic processes 2017 IEEE International Symposium on Information Theory (ISIT), (888-892)
  865. Wang P, Ellis A, Hart J and Hsu C Optimizing next-generation cloud gaming platforms with planar map streaming and distributed rendering Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, (25-30)
  866. ACM
    Anshu A, Touchette D, Yao P and Yu N Exponential separation of quantum communication and classical information Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, (277-288)
  867. Zhang M, Jingjing Ma , Gong M, Hao Li and Jia Liu Memetic algorithm based feature selection for hyperspectral images classification 2017 IEEE Congress on Evolutionary Computation (CEC), (495-502)
  868. Li Q, Gesbert D and Gresset N (2017). Cooperative Channel Estimation for Coordinated Transmission With Limited Backhaul, IEEE Transactions on Wireless Communications, 16:6, (3688-3699), Online publication date: 1-Jun-2017.
  869. Allen T, Tajer A and Al-Dhahir N (2017). Secure Alamouti MAC Transmissions, IEEE Transactions on Wireless Communications, 16:6, (3674-3687), Online publication date: 1-Jun-2017.
  870. Schlegel C and Burnashev M (2017). The Interplay Between Error Control Coding and Iterative Signal Cancelation, IEEE Transactions on Signal Processing, 65:11, (3020-3031), Online publication date: 1-Jun-2017.
  871. Tan O, Gomez-Vilardebo J and Gunduz D (2017). Privacy-Cost Trade-offs in Demand-Side Management With Storage, IEEE Transactions on Information Forensics and Security, 12:6, (1458-1469), Online publication date: 1-Jun-2017.
  872. Bruni V and Vitulano D (2017). An entropy based approach for SSIM speed up, Signal Processing, 135:C, (198-209), Online publication date: 1-Jun-2017.
  873. Bernardini R and Rinaldo R (2017). Making random permutations from physically unclonable constants, International Journal of Information Security, 16:3, (249-261), Online publication date: 1-Jun-2017.
  874. Ghotra B, Mcintosh S and Hassan A A large-scale study of the impact of feature selection techniques on defect classification models Proceedings of the 14th International Conference on Mining Software Repositories, (146-157)
  875. ACM
    Rahman M and Nayeem M Finding suitable places for live campaigns using location-based services Proceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, (1-6)
  876. ACM
    Song S, Wang Y and Chaudhuri K Pufferfish Privacy Mechanisms for Correlated Data Proceedings of the 2017 ACM International Conference on Management of Data, (1291-1306)
  877. Parseh R, Kansanen K and Slock D (2017). Distortion Outage Analysis for Joint Space-Time Coding and Kalman Filtering, IEEE Transactions on Signal Processing, 65:9, (2291-2305), Online publication date: 1-May-2017.
  878. Devroye L and Gravel C (2017). The expected bit complexity of the von Neumann rejection algorithm, Statistics and Computing, 27:3, (699-710), Online publication date: 1-May-2017.
  879. De Palma D and Indiveri G (2016). Output outlier robust state estimation, International Journal of Adaptive Control and Signal Processing, 31:4, (581-607), Online publication date: 18-Apr-2017.
  880. Boichenko V and Kurdyukov A (2017). On the lower bound of the anisotropic norm of the linear stochastic system, Automation and Remote Control, 78:4, (643-653), Online publication date: 1-Apr-2017.
  881. Lagen S, Agustin A and Vidal J (2017). Joint User Scheduling, Precoder Design, and Transmit Direction Selection in MIMO TDD Small Cell Networks, IEEE Transactions on Wireless Communications, 16:4, (2434-2449), Online publication date: 1-Apr-2017.
  882. Mo J, Alkhateeb A, Abu-Surra S and Heath R (2017). Hybrid Architectures With Few-Bit ADC Receivers, IEEE Transactions on Wireless Communications, 16:4, (2274-2287), Online publication date: 1-Apr-2017.
  883. Levin K and Lyzinski V (2017). Laplacian Eigenmaps From Sparse, Noisy Similarity Measurements, IEEE Transactions on Signal Processing, 65:8, (1988-2003), Online publication date: 1-Apr-2017.
  884. Wang J, Wei J, Yang Z and Wang S (2017). Feature Selection by Maximizing Independent Classification Information, IEEE Transactions on Knowledge and Data Engineering, 29:4, (828-841), Online publication date: 1-Apr-2017.
  885. Yu L, Li H and Li W (2017). Source-Channel Secrecy for Shannon Cipher System, IEEE Transactions on Information Theory, 63:4, (2596-2622), Online publication date: 1-Apr-2017.
  886. Yang S and Shamai Shitz S (2017). On the Multiplexing Gain of Discrete-Time MIMO Phase Noise Channels, IEEE Transactions on Information Theory, 63:4, (2394-2408), Online publication date: 1-Apr-2017.
  887. Sharov A and Roth R (2017). On the Capacity of Generalized Ising Channels, IEEE Transactions on Information Theory, 63:4, (2338-2356), Online publication date: 1-Apr-2017.
  888. Liu H, Zhou S, Lam W and Guan J (2017). A new hybrid method for learning bayesian networks, Knowledge-Based Systems, 121:C, (185-197), Online publication date: 1-Apr-2017.
  889. Nikolaos T, Georgopoulos K and Papaefstathiou Y A novel way to efficiently simulate complex full systems incorporating hardware accelerators Proceedings of the Conference on Design, Automation & Test in Europe, (658-661)
  890. Tavakkol B, Jeong M and Albin S (2017). Object-to-group probabilistic distance measure for uncertain data classification, Neurocomputing, 230:C, (143-151), Online publication date: 22-Mar-2017.
  891. Meng Y, Jiang C, La Q, Quek T and Ren Y Dynamic Social-Aware Peer Selection Scheme for Cooperative Device-to-Device Communications 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  892. Tan J, Quek T and He Q Robust Optimization for Energy Efficiency in Multicast Downlink C-RAN 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  893. Moon K, Noshad M, Sekeh S and Hero A Information theoretic structure learning with confidence 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6095-6099)
  894. Sivasankaran S, Vincent E and Illina I Discriminative importance weighting of augmented training data for acoustic model training 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4885-4889)
  895. Boyer R and Nielsen F Information geometry metric for random signal detection in large random sensing systems 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4471-4475)
  896. Salah M, El-Keyi A, Nafie M and Mohasseb Y (2017). Degrees of Freedom for the MIMO Multi-Way Relay Channel With Common and Private Messages, IEEE Transactions on Wireless Communications, 16:3, (1673-1686), Online publication date: 1-Mar-2017.
  897. Yang T, Yang L, Guo Y and Yuan J (2017). A Non-Orthogonal Multiple-Access Scheme Using Reliable Physical-Layer Network Coding and Cascade-Computation Decoding, IEEE Transactions on Wireless Communications, 16:3, (1633-1645), Online publication date: 1-Mar-2017.
  898. Rafie Borujeny R, Noori M and Ardakani M (2017). Maximizing Data Rate for Multiway Relay Channels With Pairwise Transmission Strategy, IEEE Transactions on Wireless Communications, 16:3, (1609-1618), Online publication date: 1-Mar-2017.
  899. Shlezinger N, Zahavi D, Murin Y and Dabora R (2017). The Secrecy Capacity of Gaussian MIMO Channels With Finite Memory, IEEE Transactions on Information Theory, 63:3, (1874-1897), Online publication date: 1-Mar-2017.
  900. Mirmohseni M and Papadimitratos P (2017). Secrecy Capacity Scaling in Large Cooperative Wireless Networks, IEEE Transactions on Information Theory, 63:3, (1923-1939), Online publication date: 1-Mar-2017.
  901. Zhou L, Tan V and Motani M (2017). Discrete Lossy Gray–Wyner Revisited, IEEE Transactions on Information Theory, 63:3, (1766-1791), Online publication date: 1-Mar-2017.
  902. Shaviv D, Ozgur A and Permuter H (2017). Capacity of Remotely Powered Communication, IEEE Transactions on Information Theory, 63:3, (1364-1391), Online publication date: 1-Mar-2017.
  903. Dai B, Ma Z and Luo Y (2017). Finite State Markov Wiretap Channel With Delayed Feedback, IEEE Transactions on Information Forensics and Security, 12:3, (746-760), Online publication date: 1-Mar-2017.
  904. El-Atawy A, Duan Q and Al-Shaer E (2017). A Novel Class of Robust Covert Channels Using Out-of-Order Packets, IEEE Transactions on Dependable and Secure Computing, 14:2, (116-129), Online publication date: 1-Mar-2017.
  905. Sharma B, Prasanna S, Sharma B and Mahadeva Prasanna S (2017). Sonority Measurement Using System, Source, and Suprasegmental Information, IEEE/ACM Transactions on Audio, Speech and Language Processing, 25:3, (505-518), Online publication date: 1-Mar-2017.
  906. Tao Z, Liu H and Fu Y Simultaneous clustering and ensemble Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (1546-1552)
  907. Liu S and Melo G Should algorithms for random SAT and Max-SAT be different? Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (3915-3921)
  908. Wakakuwa E, Soeda A and Murao M (2017). Markovianizing Cost of Tripartite Quantum States, IEEE Transactions on Information Theory, 63:2, (1280-1298), Online publication date: 1-Feb-2017.
  909. Li Q and Jiang A (2017). Coding for Secure Write-Efficient Memories, IEEE Transactions on Information Theory, 63:2, (1130-1145), Online publication date: 1-Feb-2017.
  910. Aksoylar C, Atia G and Saligrama V (2017). Sparse Signal Processing With Linear and Nonlinear Observations, IEEE Transactions on Information Theory, 63:2, (749-776), Online publication date: 1-Feb-2017.
  911. Martino L, Elvira V and Louzada F (2017). Effective sample size for importance sampling based on discrepancy measures, Signal Processing, 131:C, (386-401), Online publication date: 1-Feb-2017.
  912. Bonaventura X, Sima A, Feixas M, Buckley S, Sbert M and Howell J (2017). Information measures for terrain visualization, Computers & Geosciences, 99:C, (9-18), Online publication date: 1-Feb-2017.
  913. Antunes L, Bauwens B, Souto A and Teixeira A (2017). Sophistication vs Logical Depth, Theory of Computing Systems, 60:2, (280-298), Online publication date: 1-Feb-2017.
  914. Painsky A and Tishby N (2017). Gaussian lower bound for the information bottleneck limit, The Journal of Machine Learning Research, 18:1, (7908-7936), Online publication date: 1-Jan-2017.
  915. Shah N and Wainwright M (2017). Simple, robust and optimal ranking from pairwise comparisons, The Journal of Machine Learning Research, 18:1, (7246-7283), Online publication date: 1-Jan-2017.
  916. Sriperumbudur B, Fukumizu K, Gretton A, Hyvärinen A and Kumar R (2017). Density estimation in infinite dimensional exponential families, The Journal of Machine Learning Research, 18:1, (1830-1888), Online publication date: 1-Jan-2017.
  917. Makrehchi M and Kamel M (2017). Extracting domain-specific stopwords for text classifiers, Intelligent Data Analysis, 21:1, (39-62), Online publication date: 1-Jan-2017.
  918. Shao F, Li K and Dong Y (2017). Identifying multi-variable relationships based on the maximal information coefficient, Intelligent Data Analysis, 21:1, (151-166), Online publication date: 1-Jan-2017.
  919. Soler-Toscano F, Zenil H and Innocenti G (2017). A Computable Measure of Algorithmic Probability by Finite Approximations with an Application to Integer Sequences, Complexity, 2017, Online publication date: 1-Jan-2017.
  920. Anjos G, Castanheira D, Silva A, Gameiro A, Gomes M, Vilela J and Pinchera D (2017). Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions, Wireless Communications & Mobile Computing, 2017, Online publication date: 1-Jan-2017.
  921. Zlatanov N, Ng D and Schober R (2017). Capacity of the Two-Hop Relay Channel With Wireless Energy Transfer From Relay to Source and Energy Transmission Cost, IEEE Transactions on Wireless Communications, 16:1, (647-662), Online publication date: 1-Jan-2017.
  922. Roostaei A and Derakhtian M (2017). Diversity-Multiplexing Tradeoff in an Interweave Multiuser Cognitive Radio System, IEEE Transactions on Wireless Communications, 16:1, (389-399), Online publication date: 1-Jan-2017.
  923. Yang T, Yuan X and Sun Q (2017). A Signal-Space Aligned Network Coding Approach to Distributed MIMO, IEEE Transactions on Signal Processing, 65:1, (27-40), Online publication date: 1-Jan-2017.
  924. Boda V and Narayan P (2017). Sampling Rate Distortion, IEEE Transactions on Information Theory, 63:1, (563-574), Online publication date: 1-Jan-2017.
  925. Liu N and Kang W (2017). The Capacity of a Class of Channels With Coded Side Information at the Decoder, IEEE Transactions on Information Theory, 63:1, (72-80), Online publication date: 1-Jan-2017.
  926. De Palma G, Trevisan D and Giovannetti V (2017). Gaussian States Minimize the Output Entropy of the One-Mode Quantum Attenuator, IEEE Transactions on Information Theory, 63:1, (728-737), Online publication date: 1-Jan-2017.
  927. Scarlett J and Cevher V (2017). Limits on Support Recovery With Probabilistic Models, IEEE Transactions on Information Theory, 63:1, (593-620), Online publication date: 1-Jan-2017.
  928. Han W, Huang C, Li J, Ma X and Wang L (2017). Efficient 3D Resource Management for Spectrum Aggregation in Cellular Networks, IEEE Journal on Selected Areas in Communications, 35:1, (106-117), Online publication date: 1-Jan-2017.
  929. Gourgoulias K, Katsoulakis M and Rey-Bellet L (2017). Information criteria for quantifying loss of reversibility in parallelized KMC, Journal of Computational Physics, 328:C, (438-454), Online publication date: 1-Jan-2017.
  930. Salah S, Akbarinia R and Masseglia F (2017). A highly scalable parallel algorithm for maximally informative k-itemset mining, Knowledge and Information Systems, 50:1, (1-26), Online publication date: 1-Jan-2017.
  931. Krstanović L, Ralević N, Zlokolica V, Obradović R, Mišković D, Janev M and Popović B (2016). GMMs similarity measure based on LPP-like projection of the parameter space, Expert Systems with Applications: An International Journal, 66:C, (136-148), Online publication date: 30-Dec-2016.
  932. ACM
    Fontes L, Jain R, Kerenidis I, Laplante S, Laurière M and Roland J (2016). Relative Discrepancy Does Not Separate Information and Communication Complexity, ACM Transactions on Computation Theory, 9:1, (1-15), Online publication date: 26-Dec-2016.
  933. Thengvall B, Glover F and Davino D Coupling optimization and statistical analysis with simulation models Proceedings of the 2016 Winter Simulation Conference, (545-553)
  934. Shishkin A, Bezzubtseva A, Drutsa A, Shishkov I, Gladkikh E, Gusev G and Serdyukov P Efficient high-order interaction-aware feature selection based on conditional mutual information Proceedings of the 30th International Conference on Neural Information Processing Systems, (4644-4652)
  935. Farnia F and Tse D A minimax approach to supervised learning Proceedings of the 30th International Conference on Neural Information Processing Systems, (4240-4248)
  936. Gutin E and Farias V Optimistic Gittins indices Proceedings of the 30th International Conference on Neural Information Processing Systems, (3161-3169)
  937. Bellemare M, Srinivasan S, Ostrovski G, Schaul T, Saxton D and Munos R Unifying count-based exploration and intrinsic motivation Proceedings of the 30th International Conference on Neural Information Processing Systems, (1479-1487)
  938. Gao S, Steeg G and Galstyan A Variational information maximization for feature selection Proceedings of the 30th International Conference on Neural Information Processing Systems, (487-495)
  939. Pregowska A, Szczepanski J and Wajnryb E (2016). Temporal code versus rate code for binary Information Sources, Neurocomputing, 216:C, (756-762), Online publication date: 5-Dec-2016.
  940. Wang X, Jin L, Huang K, Li M and Ming Y Physical Layer Secret Key Capacity Using Correlated Wireless Channel Samples 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  941. Girgis A, El-Keyi A and Nafie M Optimal Energy Allocation for Delay-Constrained Traffic over Fading Multiple Access Channels 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  942. Pan C, Zhu H, Gomes N and Wang J Joint Precoding and RRH Selection for Green MIMO C-RAN 2016 IEEE Global Communications Conference (GLOBECOM), (1-5)
  943. Wang W, Sun Z, Ren K and Zhu B Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  944. Zlatanov N, Sippel E, Jamali V and Schober R Capacity of the Gaussian Two-Hop Full-Duplex Relay Channel with Self-Interference 2016 IEEE Global Communications Conference (GLOBECOM), (1-7)
  945. Cao Y, Xu F, Liu K and Tao M A Storage-Latency Tradeoff Study for Cache-Aided MIMO Interference Networks 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  946. Bhardwaj P, Panwar A, Ozdemir O, Masazade E, Kasperovich I, Drozd A, Mohan C and Varshney P (2016). Enhanced Dynamic Spectrum Access in Multiband Cognitive Radio Networks via Optimized Resource Allocation, IEEE Transactions on Wireless Communications, 15:12, (8093-8106), Online publication date: 1-Dec-2016.
  947. Wei H, Lu W, Zhu P, Ferrari S, Liu M, Klein R, Omidshafiei S and How J (2016). Information value in nonparametric Dirichlet-process Gaussian-process (DPGP) mixture models, Automatica (Journal of IFAC), 74:C, (360-368), Online publication date: 1-Dec-2016.
  948. ACM
    Adachi Y, Onimura N, Yamashita T and Hirokawa S Standard measure and SVM measure for feature selection and their performance effect for text classification Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, (262-266)
  949. Grossi E, Lops M and Venturino L (2016). A New Look at the Radar Detection Problem, IEEE Transactions on Signal Processing, 64:22, (5835-5847), Online publication date: 15-Nov-2016.
  950. Liu T and Yang C (2016). Genie Tree and Degrees of Freedom of the Symmetric MIMO Interfering Broadcast Channel, IEEE Transactions on Signal Processing, 64:22, (5914-5929), Online publication date: 15-Nov-2016.
  951. ACM
    Yang L, Wang W and Zhang Q Secret from Muscle Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, (28-41)
  952. Quinn A, Kárný M and Guy T (2016). Fully probabilistic design of hierarchical Bayesian models, Information Sciences: an International Journal, 369:C, (532-547), Online publication date: 10-Nov-2016.
  953. Fujita H (2016). On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter, IEEE Transactions on Information Forensics and Security, 11:11, (2441-2452), Online publication date: 1-Nov-2016.
  954. Yan B, Liu X and Yang H (2016). Structure compliant local warping of images with applications to watermarking attack, Multimedia Tools and Applications, 75:21, (13451-13479), Online publication date: 1-Nov-2016.
  955. Zeng Y, Doshi P, Chen Y, Pan Y, Mao H and Chandrasekaran M (2016). Approximating behavioral equivalence for scaling solutions of I-DIDs, Knowledge and Information Systems, 49:2, (511-552), Online publication date: 1-Nov-2016.
  956. Assem H, Xu L, Buda T and O'sullivan D (2016). Machine learning as a service for enabling Internet of Things and People, Personal and Ubiquitous Computing, 20:6, (899-914), Online publication date: 1-Nov-2016.
  957. Haramaty E and Sudan M (2016). Deterministic Compression with Uncertain Priors, Algorithmica, 76:3, (630-653), Online publication date: 1-Nov-2016.
  958. Rastegin A (2016). Notes on use of Generalized Entropies in Counting, Graphs and Combinatorics, 32:6, (2625-2641), Online publication date: 1-Nov-2016.
  959. ACM
    Gideon J, Zhang B, Aldeneh Z, Kim Y, Khorram S, Le D and Provost E Wild wild emotion: a multimodal ensemble approach Proceedings of the 18th ACM International Conference on Multimodal Interaction, (501-505)
  960. ACM
    Setlur V, Battersby S, Tory M, Gossweiler R and Chang A Eviza Proceedings of the 29th Annual Symposium on User Interface Software and Technology, (365-377)
  961. Hino H, Akaho S and Murata N An Entropy Estimator Based on Polynomial Regression with Poisson Error Structure Proceedings of the 23rd International Conference on Neural Information Processing - Volume 9948, (11-19)
  962. Cao N, Choi S, Masazade E and Varshney P (2016). Sensor Selection for Target Tracking in Wireless Sensor Networks With Uncertainty, IEEE Transactions on Signal Processing, 64:20, (5191-5204), Online publication date: 15-Oct-2016.
  963. (2016). Initialization of the HMM-based delay model in networked control systems, Information Sciences: an International Journal, 364:C, (1-15), Online publication date: 10-Oct-2016.
  964. Muller P, del Peral-Rosado J, Piche R and Seco-Granados G (2016). Statistical Trilateration With Skew-t Distributed Errors in LTE Networks, IEEE Transactions on Wireless Communications, 15:10, (7114-7127), Online publication date: 1-Oct-2016.
  965. Hong S, Maric I and Hui D (2016). Short Message Noisy Network Coding With Sliding-Window Decoding for Half-Duplex Multihop Relay Networks, IEEE Transactions on Wireless Communications, 15:10, (6676-6689), Online publication date: 1-Oct-2016.
  966. Barni M and Tondi B (2016). Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective, IEEE Transactions on Information Forensics and Security, 11:10, (2145-2159), Online publication date: 1-Oct-2016.
  967. Leeuwen M, Bie T, Spyropoulou E and Mesnage C (2016). Subjective interestingness of subgraph patterns, Machine Language, 105:1, (41-75), Online publication date: 1-Oct-2016.
  968. Qi Y, Shakir M, Imran M, Qaraqe K, Quddus A and Tafazolli R (2016). Fronthaul data compression for Uplink CoMP in cloud radio access network C-RAN, Transactions on Emerging Telecommunications Technologies, 27:10, (1409-1425), Online publication date: 1-Oct-2016.
  969. ACM
    Chiang F and Sitaramachandran S (2016). Unifying Data and Constraint Repairs, Journal of Data and Information Quality, 7:3, (1-26), Online publication date: 27-Sep-2016.
  970. Ding G and Chen L Load balancing and speed scaling interaction in processor-sharing systems with exponential power functions 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1197-1203)
  971. Sankararaman A and Baccelli F Spatial birth-death wireless networks 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (916-923)
  972. Ahn K, Lee K and Suh C Community recovery in hypergraphs 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (657-663)
  973. Chan C, Al-Bashabsheh A, Zhou Q and Liu T Duality between feature selection and data clustering 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (142-147)
  974. Han D, Mo Y, Wu J and Shi L (2016). An Opportunistic Sensor Scheduling Solution to Remote State Estimation Over Multiple Channels, IEEE Transactions on Signal Processing, 64:18, (4905-4917), Online publication date: 15-Sep-2016.
  975. ACM
    Wang W, Yang L and Zhang Q Touch-and-guard Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (670-681)
  976. Cai S and Lau V (2016). MIMO Precoding for Networked Control Systems with Energy Harvesting Sensors, IEEE Transactions on Signal Processing, 64:17, (4469-4478), Online publication date: 1-Sep-2016.
  977. Deng Y, Bao F, Deng X, Wang R, Kong Y and Dai Q (2016). Deep and Structured Robust Information Theoretic Learning for Image Analysis, IEEE Transactions on Image Processing, 25:9, (4209-4221), Online publication date: 1-Sep-2016.
  978. Mansour A, Schaefer R and Boche H (2016). On the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel, IEEE Transactions on Information Forensics and Security, 11:9, (2107-2122), Online publication date: 1-Sep-2016.
  979. Obin N and Roebel A (2016). Similarity search of acted voices for automatic voice casting, IEEE/ACM Transactions on Audio, Speech and Language Processing, 24:9, (1638-1647), Online publication date: 1-Sep-2016.
  980. Huang P, Siegel P and Yaakobi E (2016). Performance of Multilevel Flash Memories With Different Binary Labelings, IEEE Journal on Selected Areas in Communications, 34:9, (2336-2353), Online publication date: 1-Sep-2016.
  981. Maxhuni A, Muñoz-Meléndez A, Osmani V, Perez H, Mayora O and Morales E (2016). Classification of bipolar disorder episodes based on analysis of voice and motor activity of patients, Pervasive and Mobile Computing, 31:C, (50-66), Online publication date: 1-Sep-2016.
  982. Odeh N, Abolhasan M, Safaei F, Franklin D and Mao G (2016). Utility-based resource allocation for interference limited OFDMA cooperative relay networks, Physical Communication, 20:C, (74-84), Online publication date: 1-Sep-2016.
  983. Hao H, Wang Q, Li P and Zhang L (2016). Evaluation of ground distances and features in EMD-based GMM matching for texture classification, Pattern Recognition, 57:C, (152-163), Online publication date: 1-Sep-2016.
  984. Geng Y (2016). Local Stereo Matching Based on Information Entropy of Image, 3D Research, 7:3, (1-10), Online publication date: 1-Sep-2016.
  985. Rens G, Meyer T and Casini G On revision of partially specified convex probabilistic belief bases Proceedings of the Twenty-second European Conference on Artificial Intelligence, (921-929)
  986. Son J, Gupta S and Tan G Bayesian Optimization in High Dimensional Input Space Proceedings of the 9th EAI International Conference on Simulation Tools and Techniques, (18-27)
  987. Somyanonthanakul R and Theeramunkong T An investigation of objective interestingness measures for association rule mining Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence, (472-481)
  988. Held P and Kruse R Detecting overlapping community hierarchies in dynamic graphs Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1063-1070)
  989. ACM
    Gao Y and Parameswaran A Squish Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1575-1584)
  990. ACM
    Wei Y, Zheng Y and Yang Q Transfer Knowledge between Cities Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1905-1914)
  991. ACM
    Bertens R, Vreeken J and Siebes A Keeping it Short and Simple Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (735-744)
  992. Simonini G, Bergamaschi S and Jagadish H (2016). BLAST, Proceedings of the VLDB Endowment, 9:12, (1173-1184), Online publication date: 1-Aug-2016.
  993. Shuai W, Maillé P and Pelov A (2016). Charging Electric Vehicles in the Smart City: A Survey of Economy-Driven Approaches, IEEE Transactions on Intelligent Transportation Systems, 17:8, (2089-2106), Online publication date: 1-Aug-2016.
  994. Liu Y, Feng J, Simeone O, Tang J, Wen Z, Haimovich A and Zhou M (2016). Topology Discovery for Linear Wireless Networks With Application to Train Backbone Inauguration, IEEE Transactions on Intelligent Transportation Systems, 17:8, (2159-2170), Online publication date: 1-Aug-2016.
  995. Matta V, Braca P, Marano S and Sayed A (2016). Diffusion-Based Adaptive Distributed Detection: Steady-State Performance in the Slow Adaptation Regime, IEEE Transactions on Information Theory, 62:8, (4710-4732), Online publication date: 1-Aug-2016.
  996. Jog V and Anantharam V (2016). A Geometric Analysis of the AWGN Channel With a $(\sigma , \rho )$ -Power Constraint, IEEE Transactions on Information Theory, 62:8, (4413-4438), Online publication date: 1-Aug-2016.
  997. Baryshnikov Y, Duda J and Szpankowski W (2016). Types of Markov Fields and Tilings, IEEE Transactions on Information Theory, 62:8, (4361-4375), Online publication date: 1-Aug-2016.
  998. Tapia J, Perez C and Bowyer K (2016). Gender Classification From the Same Iris Code Used for Recognition, IEEE Transactions on Information Forensics and Security, 11:8, (1760-1770), Online publication date: 1-Aug-2016.
  999. Liu Y, Déforges O and Samrouth K (2016). LAR-LLC: A Low-Complexity Multiresolution Lossless Image Codec, IEEE Transactions on Circuits and Systems for Video Technology, 26:8, (1490-1501), Online publication date: 1-Aug-2016.
  1000. Ibrahim O and Landa-Silva D (2016). Term frequency with average term occurrences for textual information retrieval, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:8, (3045-3061), Online publication date: 1-Aug-2016.
  1001. Apostolico A, Guerra C, Landau G and Pizzi C (2016). Sequence similarity measures based on bounded hamming distance, Theoretical Computer Science, 638:C, (76-90), Online publication date: 25-Jul-2016.
  1002. Chen L and Li B Clustering-based joint feature selection for semantic attribute prediction Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (3338-3344)
  1003. Alippi C, Boracchi G, Carrera D and Roveri M Change detection in multivariate datastreams Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1368-1374)
  1004. ACM
    Mangaravite V and Santos R On Information-Theoretic Document-Person Associations for Expert Search in Academia Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, (925-928)
  1005. Rujeerapaiboon N, Kuhn D and Wiesemann W (2016). Robust Growth-Optimal Portfolios, Management Science, 62:7, (2090-2109), Online publication date: 1-Jul-2016.
  1006. Shi Y, Zhang J and Letaief K (2016). Low-Rank Matrix Completion for Topological Interference Management by Riemannian Pursuit, IEEE Transactions on Wireless Communications, 15:7, (4703-4717), Online publication date: 1-Jul-2016.
  1007. Joda R, Lahouti F and Erkip E (2016). Distortion-Power Tradeoffs in Quasi-Stationary Source Transmission Over Delay and Buffer Limited Block Fading Channels, IEEE Transactions on Wireless Communications, 15:7, (4505-4520), Online publication date: 1-Jul-2016.
  1008. Bajović D, Moura J, Xavier J and Sinopoli B (2016). Distributed Inference Over Directed Networks: Performance Limits and Optimal Design, IEEE Transactions on Signal Processing, 64:13, (3308-3323), Online publication date: 1-Jul-2016.
  1009. van Ommen T, Koolen W, Feenstra T and Grünwald P (2016). Robust probability updating, International Journal of Approximate Reasoning, 74:C, (30-57), Online publication date: 1-Jul-2016.
  1010. ACM
    Fanti G, Kairouz P, Oh S, Ramchandran K and Viswanath P (2016). Rumor Source Obfuscation on Irregular Trees, ACM SIGMETRICS Performance Evaluation Review, 44:1, (153-164), Online publication date: 30-Jun-2016.
  1011. ACM
    Yoon D, Niu N and Mozafari B DBSherlock Proceedings of the 2016 International Conference on Management of Data, (1599-1614)
  1012. Yan P, Liang D, Tang J and Zhu M (2016). Local feature descriptor using entropy rate, Neurocomputing, 194:C, (157-167), Online publication date: 19-Jun-2016.
  1013. ACM
    Bhattacharyya A, Dey P and Woodruff D An Optimal Algorithm for l1-Heavy Hitters in Insertion Streams and Related Problems Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (385-400)
  1014. ACM
    Chen Y, Chong S, Kash I, Moran T and Vadhan S (2016). Truthful Mechanisms for Agents That Value Privacy, ACM Transactions on Economics and Computation, 4:3, (1-30), Online publication date: 15-Jun-2016.
  1015. ACM
    Fanti G, Kairouz P, Oh S, Ramchandran K and Viswanath P Rumor Source Obfuscation on Irregular Trees Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, (153-164)
  1016. ACM
    Chang C, Cheng J, Huang T, Lee D and Chen C (2016). Coding Rate Analysis of Forbidden Overlap Codes in High-Speed Buses, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 1:2, (1-25), Online publication date: 7-Jun-2016.
  1017. Gong X and Kiyavash N (2016). Quantifying the information leakage in timing side channels in deterministic work-conserving schedulers, IEEE/ACM Transactions on Networking, 24:3, (1841-1852), Online publication date: 1-Jun-2016.
  1018. Karamchandani N, Niesen U, Maddah-Ali M and Diggavi S (2016). Hierarchical Coded Caching, IEEE Transactions on Information Theory, 62:6, (3212-3229), Online publication date: 1-Jun-2016.
  1019. Chan C, Al-Bashabsheh A, Zhou Q, Ding N, Liu T and Sprintson A (2016). Successive Omniscience, IEEE Transactions on Information Theory, 62:6, (3270-3289), Online publication date: 1-Jun-2016.
  1020. Soni A, Jain S, Haupt J and Gonella S (2016). Noisy Matrix Completion Under Sparse Factor Models, IEEE Transactions on Information Theory, 62:6, (3636-3661), Online publication date: 1-Jun-2016.
  1021. Wang L, Wornell G and Zheng L (2016). Fundamental Limits of Communication With Low Probability of Detection, IEEE Transactions on Information Theory, 62:6, (3493-3503), Online publication date: 1-Jun-2016.
  1022. Tandon R, Amuru S, Clancy T and Buehrer R (2016). Toward Optimal Secure Distributed Storage Systems With Exact Repair, IEEE Transactions on Information Theory, 62:6, (3477-3492), Online publication date: 1-Jun-2016.
  1023. Abrardo A, Barni M, Kallas K and Tondi B (2016). A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines, IEEE Transactions on Information Forensics and Security, 11:6, (1333-1345), Online publication date: 1-Jun-2016.
  1024. Diyanat A, Khonsari A and Shariatpanahi S (2016). A Dummy-Based Approach for Preserving Source Rate Privacy, IEEE Transactions on Information Forensics and Security, 11:6, (1321-1332), Online publication date: 1-Jun-2016.
  1025. Harmandaris V, Kalligiannaki E, Katsoulakis M and Plecháč P (2016). Path-space variational inference for non-equilibrium coarse-grained systems, Journal of Computational Physics, 314:C, (355-383), Online publication date: 1-Jun-2016.
  1026. Harrow A, Natarajan A and Wu X Tight SoS-degree bounds for approximate nash equilibria Proceedings of the 31st Conference on Computational Complexity, (1-25)
  1027. Dinur I and Meir O Toward the KRW composition conjecture Proceedings of the 31st Conference on Computational Complexity, (1-51)
  1028. Chen R, Santhanam R and Srinivasan S Average-case lower bounds and satisfiability algorithms for small threshold circuits Proceedings of the 31st Conference on Computational Complexity, (1-35)
  1029. ACM
    Sarker H, Tyburski M, Rahman M, Hovsepian K, Sharmin M, Epstein D, Preston K, Furr-Holden C, Milam A, Nahum-Shani I, al'Absi M and Kumar S Finding Significant Stress Episodes in a Discontinuous Time Series of Rapidly Varying Mobile Sensor Data Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (4489-4501)
  1030. Jamali V, Michalopoulos D, Uysal M and Schober R (2016). Link Allocation for Multiuser Systems With Hybrid RF/FSO Backhaul: Delay-Limited and Delay-Tolerant Designs, IEEE Transactions on Wireless Communications, 15:5, (3281-3295), Online publication date: 1-May-2016.
  1031. Fortunati S, Gini F and Greco M (2016). The Misspecified Cramér-Rao Bound and Its Application to Scatter Matrix Estimation in Complex Elliptically Symmetric Distributions, IEEE Transactions on Signal Processing, 64:9, (2387-2399), Online publication date: 1-May-2016.
  1032. Wen C, Wang C, Jin S, Wong K and Ting P (2016). Bayes-Optimal Joint Channel-and-Data Estimation for Massive MIMO With Low-Precision ADCs, IEEE Transactions on Signal Processing, 64:10, (2541-2556), Online publication date: 1-May-2016.
  1033. Jiang S (2016). Group Key Agreement with Local Connectivity, IEEE Transactions on Dependable and Secure Computing, 13:3, (326-339), Online publication date: 1-May-2016.
  1034. Puljiz Z and Vikalo H (2016). Decoding genetic variations, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13:3, (518-530), Online publication date: 1-May-2016.
  1035. Gurakan B and Ulukus S (2016). Cooperative Diamond Channel With Energy Harvesting Nodes, IEEE Journal on Selected Areas in Communications, 34:5, (1604-1617), Online publication date: 1-May-2016.
  1036. Wang Z, Aggarwal V and Wang X (2016). Optimal Energy-Bandwidth Allocation for Energy-Harvesting Networks in Multiuser Fading Channels, IEEE Journal on Selected Areas in Communications, 34:5, (1565-1577), Online publication date: 1-May-2016.
  1037. Mahzoon M, Li C, Li X and Grover P (2016). Energy-Constrained Distributed Learning and Classification by Exploiting Relative Relevance of Sensors’ Data, IEEE Journal on Selected Areas in Communications, 34:5, (1417-1430), Online publication date: 1-May-2016.
  1038. Jeong C and Shin W (2016). HierHybNET, Wireless Networks, 22:4, (1133-1144), Online publication date: 1-May-2016.
  1039. Yao S, Amin M, Su L, Hu S, Li S, Wang S, Zhao Y, Abdelzaher T, Kaplan L, Aggarwal C and Yener A Recursive ground truth estimator for social data streams Proceedings of the 15th International Conference on Information Processing in Sensor Networks, (1-12)
  1040. ACM
    Liberzon D and Mitra S Entropy and Minimal Data Rates for State Estimation and Model Detection Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control, (247-256)
  1041. Song E, Cuff P and Poor H (2016). The Likelihood Encoder for Lossy Compression, IEEE Transactions on Information Theory, 62:4, (1836-1849), Online publication date: 1-Apr-2016.
  1042. Thakor S, Grant A and Chan T (2016). Cut-Set Bounds on Network Information Flow, IEEE Transactions on Information Theory, 62:4, (1850-1865), Online publication date: 1-Apr-2016.
  1043. Müller M and Pastena M (2016). A Generalization of Majorization that Characterizes Shannon Entropy, IEEE Transactions on Information Theory, 62:4, (1711-1720), Online publication date: 1-Apr-2016.
  1044. Simmons D, Coon J and Warsi N (2016). Capacity and Power Scaling Laws for Finite Antenna MIMO Amplify-and-Forward Relay Networks, IEEE Transactions on Information Theory, 62:4, (1993-2008), Online publication date: 1-Apr-2016.
  1045. de Moura Estevão Filho R, Rodríguez Carneiro Gomes J and Petraglia A (2016). Codebook Calibration Method for Vector Quantizers Implemented at the Focal Plane of CMOS Imagers, IEEE Transactions on Circuits and Systems for Video Technology, 26:4, (750-761), Online publication date: 1-Apr-2016.
  1046. Qian Z and Zhang X (2016). Reversible Data Hiding in Encrypted Images With Distributed Source Encoding, IEEE Transactions on Circuits and Systems for Video Technology, 26:4, (636-646), Online publication date: 1-Apr-2016.
  1047. Saxena N, Roy A and Kim H (2016). Traffic-Aware Cloud RAN: A Key for Green 5G Networks, IEEE Journal on Selected Areas in Communications, 34:4, (1010-1021), Online publication date: 1-Apr-2016.
  1048. Liu Y, Ding Z, Elkashlan M and Poor H (2016). Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer, IEEE Journal on Selected Areas in Communications, 34:4, (938-953), Online publication date: 1-Apr-2016.
  1049. Dai B and Yu W (2016). Energy Efficiency of Downlink Transmission Strategies for Cloud Radio Access Networks, IEEE Journal on Selected Areas in Communications, 34:4, (1037-1050), Online publication date: 1-Apr-2016.
  1050. Gillani F, Al-Shaer E and AsSadhan B (2016). Economic metric to improve spam detectors, Journal of Network and Computer Applications, 65:C, (131-143), Online publication date: 1-Apr-2016.
  1051. Kumari P and Vaish A (2016). Feature-level fusion of mental task's brain signal for an efficient identification system, Neural Computing and Applications, 27:3, (659-669), Online publication date: 1-Apr-2016.
  1052. Campobello G, Segreto A and Serrano S (2016). Data Gathering Techniques for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2016, (31), Online publication date: 1-Mar-2016.
  1053. Jin X and Kim H (2016). Switched-Power Two-Layer Superposition Coding in Cooperative Decode-Forward Relay Systems, IEEE Transactions on Wireless Communications, 15:3, (2193-2204), Online publication date: 1-Mar-2016.
  1054. Wang Z, Wang X and Aggarwal V (2016). Transmission With Energy Harvesting Nodes in Frequency-Selective Fading Channels, IEEE Transactions on Wireless Communications, 15:3, (1642-1656), Online publication date: 1-Mar-2016.
  1055. Üney M, Mulgrew B and Clark D (2016). A Cooperative Approach to Sensor Localisation in Distributed Fusion Networks, IEEE Transactions on Signal Processing, 64:5, (1187-1199), Online publication date: 1-Mar-2016.
  1056. Thakoor K (2016). Cognitive Mechanisms Underlying the Classification of Reduced Dimensionality, Information Rich Image Representations, IEEE Intelligent Systems, 31:2, (9-20), Online publication date: 1-Mar-2016.
  1057. Michelusi N, Boedicker J, El-Naggar M and Mitra U (2016). Queuing Models for Abstracting Interactions in Bacterial Communities, IEEE Journal on Selected Areas in Communications, 34:3, (584-599), Online publication date: 1-Mar-2016.
  1058. Zhang Y, Hoang T, Low K and Kankanhalli M Near-optimal active learning of multi-output Gaussian processes Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, (2351-2357)
  1059. Saghafian S and Tomlin B (2016). The Newsvendor under Demand Ambiguity, Operations Research, 64:1, (167-185), Online publication date: 1-Feb-2016.
  1060. Tugnait J (2016). Comparing Multivariate Complex Random Signals: Algorithm, Performance Analysis and Application, IEEE Transactions on Signal Processing, 64:4, (934-947), Online publication date: 1-Feb-2016.
  1061. Rétvári G, Tapolcai J, Kőrösi A, Majdán A and Heszberger Z (2016). Compressing IP forwarding tables, IEEE/ACM Transactions on Networking, 24:1, (149-162), Online publication date: 1-Feb-2016.
  1062. Viswanatha K, Akyol E and Rose K (2016). Combinatorial Message Sharing and a New Achievable Region for Multiple Descriptions, IEEE Transactions on Information Theory, 62:2, (769-792), Online publication date: 1-Feb-2016.
  1063. Estella Aguerri I and Gunduz D (2016). Joint Source-Channel Coding With Time-Varying Channel and Side-Information, IEEE Transactions on Information Theory, 62:2, (736-753), Online publication date: 1-Feb-2016.
  1064. Xu G, Liu W and Chen B (2016). A Lossy Source Coding Interpretation of Wyner’s Common Information, IEEE Transactions on Information Theory, 62:2, (754-768), Online publication date: 1-Feb-2016.
  1065. Kopetz T, Permuter H and Shamai S (2016). Multiple Access Channels With Combined Cooperation and Partial Cribbing, IEEE Transactions on Information Theory, 62:2, (825-848), Online publication date: 1-Feb-2016.
  1066. Lazaro F, Paolini E, Liva G and Bauch G (2016). Distance Spectrum of Fixed-Rate Raptor Codes With Linear Random Precoders, IEEE Journal on Selected Areas in Communications, 34:2, (422-436), Online publication date: 1-Feb-2016.
  1067. ACM
    Zhang K, Wang Z, Zhang J and Schölkopf B (2015). On Estimation of Functional Causal Models, ACM Transactions on Intelligent Systems and Technology, 7:2, (1-22), Online publication date: 22-Jan-2016.
  1068. ACM
    Papadimitriou C and Piliouras G From Nash Equilibria to Chain Recurrent Sets Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (227-235)
  1069. ACM
    Cohen G and Shinkar I The Complexity of DNF of Parities Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (47-58)
  1070. Chiang F, Andritsos P and Miller R Data Driven Discovery of Attribute Dictionaries Transactions on Computational Collective Intelligence XXI - Volume 9630, (69-96)
  1071. Vanello N, Ricciardi E and Landini L (2016). Analysis of residual dependencies of independent components extracted from fMRI data, Computational Intelligence and Neuroscience, 2016, (9-9), Online publication date: 1-Jan-2016.
  1072. Timin V and Kurdyukov A (2016). Suboptimal anisotropic filtering in a finite horizon, Automation and Remote Control, 77:1, (1-20), Online publication date: 1-Jan-2016.
  1073. Ding Z, Adachi F and Poor H (2016). The Application of MIMO to Non-Orthogonal Multiple Access, IEEE Transactions on Wireless Communications, 15:1, (537-552), Online publication date: 1-Jan-2016.
  1074. Pulliyakode S, Kalyani S and Narendran K (2016). Rate Prediction and Selection in LTE Systems Using Modified Source Encoding Techniques, IEEE Transactions on Wireless Communications, 15:1, (416-429), Online publication date: 1-Jan-2016.
  1075. Beirami A, Sardari M and Fekri F (2016). Wireless Network Compression Via Memory-Enabled Overhearing Helpers, IEEE Transactions on Wireless Communications, 15:1, (176-190), Online publication date: 1-Jan-2016.
  1076. Huang Y, Narayanan K and Liu T (2015). Coding for Parallel Gaussian Bidirectional Relay Channels: A Deterministic Approach, IEEE Transactions on Information Theory, 62:1, (260-271), Online publication date: 1-Jan-2016.
  1077. Sutter D, Sutter T, Mohajerin Esfahani P and Renner R (2015). Efficient Approximation of Quantum Channel Capacities, IEEE Transactions on Information Theory, 62:1, (578-598), Online publication date: 1-Jan-2016.
  1078. Calabuig D, Gohary R and Yanikomeroglu H (2015). Optimum Transmission Through the Multiple-Antenna Gaussian Multiple Access Channel, IEEE Transactions on Information Theory, 62:1, (230-243), Online publication date: 1-Jan-2016.
  1079. Du J, Medard M, Xiao M and Skoglund M (2015). Scalable Capacity Bounding Models for Wireless Networks, IEEE Transactions on Information Theory, 62:1, (208-229), Online publication date: 1-Jan-2016.
  1080. Luo K, Gohary R and Yanikomeroglu H (2015). Exploiting the $N$ -to-1 Mapping in Compress-and-Forward Relaying, IEEE Transactions on Information Theory, 62:1, (290-308), Online publication date: 1-Jan-2016.
  1081. Rini S and Goldsmith A (2015). A Unified Graphical Approach to Random Coding for Single-Hop Networks, IEEE Transactions on Information Theory, 62:1, (56-88), Online publication date: 1-Jan-2016.
  1082. Fan B, Leng S and Yang K (2016). A dynamic bandwidth allocation algorithm in mobile networks with big data of users and networks, IEEE Network: The Magazine of Global Internetworking, 30:1, (6-10), Online publication date: 1-Jan-2016.
  1083. Nagpal A and Gaur D A New Proposed Feature Subset Selection Algorithm Based on Maximization of Gain Ratio Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (181-197)
  1084. Tan C (2015). Wireless Network Optimization by Perron-Frobenius Theory, Foundations and Trends® in Networking, 9:2-3, (107-218), Online publication date: 1-Dec-2015.
  1085. Alnajjab B, Jiangfan Zhang and Blum R (2015). Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing, IEEE Transactions on Signal Processing, 63:24, (6659-6672), Online publication date: 1-Dec-2015.
  1086. Schlegel C and Jar M (2015). Iterative Demodulation and Channel Estimation for Asynchronous Joint Multiple Access Reception, IEEE Transactions on Signal Processing, 63:23, (6429-6439), Online publication date: 1-Dec-2015.
  1087. Bergel I, Perets Y and Shamai S (2015). Uplink Downlink Rate Balancing in Cooperating Cellular Networks, IEEE Transactions on Signal Processing, 63:23, (6272-6284), Online publication date: 1-Dec-2015.
  1088. Sicheng Xiong , Yuanli Pei , Rosales R and Fern X (2015). Active Learning from Relative Comparisons, IEEE Transactions on Knowledge and Data Engineering, 27:12, (3166-3175), Online publication date: 1-Dec-2015.
  1089. MolavianJazi E and Laneman J (2015). A Second-Order Achievable Rate Region for Gaussian Multi-Access Channels via a Central Limit Theorem for Functions, IEEE Transactions on Information Theory, 61:12, (6719-6733), Online publication date: 1-Dec-2015.
  1090. Natarajan L, Yi Hong and Viterbo E (2015). Lattice Index Coding, IEEE Transactions on Information Theory, 61:12, (6505-6525), Online publication date: 1-Dec-2015.
  1091. Quinn C, Kiyavash N and Coleman T (2015). Directed Information Graphs, IEEE Transactions on Information Theory, 61:12, (6887-6909), Online publication date: 1-Dec-2015.
  1092. Bachega L, Hariharan S, Bouman C and Shroff N (2015). Distributed Signal Decorrelation and Detection in Multi View Camera Networks Using the Vector Sparse Matrix Transform, IEEE Transactions on Image Processing, 24:12, (6011-6024), Online publication date: 1-Dec-2015.
  1093. Xiangyuan Lan , Ma A, Yuen P and Chellappa R (2015). Joint Sparse Representation and Robust Feature-Level Fusion for Multi-Cue Visual Tracking, IEEE Transactions on Image Processing, 24:12, (5826-5841), Online publication date: 1-Dec-2015.
  1094. Liang X, Chen H and Lozano J (2015). A Boltzmann-Based Estimation of Distribution Algorithm for a General Resource Scheduling Model, IEEE Transactions on Evolutionary Computation, 19:6, (793-806), Online publication date: 1-Dec-2015.
  1095. Cheng-Shang Chang , Jay Cheng , Tien-Ke Huang , Xuan-Chao Huang , Duan-Shin Lee and Chao-Yi Chen (2015). Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching, IEEE Transactions on Computers, 64:12, (3404-3416), Online publication date: 1-Dec-2015.
  1096. Orhan O and Erkip E (2015). Energy Harvesting Two-Hop Communication Networks, IEEE Journal on Selected Areas in Communications, 33:12, (2658-2670), Online publication date: 1-Dec-2015.
  1097. Arafa A and Ulukus S (2015). Optimal Policies for Wireless Networks With Energy Harvesting Transmitters and Receivers: Effects of Decoding Costs, IEEE Journal on Selected Areas in Communications, 33:12, (2611-2625), Online publication date: 1-Dec-2015.
  1098. Gheorghe L, Marin B, Gibson G, Mogosanu L, Deaconescu R, Voiculescu V and Carabas M (2015). Smart malware detection on Android, Security and Communication Networks, 8:18, (4254-4272), Online publication date: 1-Dec-2015.
  1099. Vasudevan A and Selvakumar S (2015). Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset, Security and Communication Networks, 8:18, (3441-3458), Online publication date: 1-Dec-2015.
  1100. ACM
    Xu K, Huang H, Shi Y, Li H, Long P, Caichen J, Sun W and Chen B (2015). Autoscanning for coupled scene reconstruction and proactive object analysis, ACM Transactions on Graphics, 34:6, (1-14), Online publication date: 4-Nov-2015.
  1101. Sheikholeslami A, Goeckel D and Pishro-Nik H (2015). Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments, IEEE Transactions on Wireless Communications, 14:11, (6072-6081), Online publication date: 1-Nov-2015.
  1102. Wei Kang , Nan Liu and Weiwei Chong (2015). The Gaussian Multiple Access Diamond Channel, IEEE Transactions on Information Theory, 61:11, (6049-6059), Online publication date: 1-Nov-2015.
  1103. Ordentlich O and Shayevitz O (2015). Minimum MS. E. Gerber’s Lemma, IEEE Transactions on Information Theory, 61:11, (5883-5891), Online publication date: 1-Nov-2015.
  1104. Yanjun Han , Jiantao Jiao and Weissman T (2015). Minimax Estimation of Discrete Distributions Under $\ell _{1}$ Loss, IEEE Transactions on Information Theory, 61:11, (6343-6354), Online publication date: 1-Nov-2015.
  1105. Ashraphijuo M, Aggarwal V and Xiaodong Wang (2015). On the Capacity Regions of Two-Way Diamond Channels, IEEE Transactions on Information Theory, 61:11, (6060-6090), Online publication date: 1-Nov-2015.
  1106. Yu-Chih Huang , Niesen U and Gupta P (2015). Energy-Efficient Communication in the Presence of Synchronization Errors, IEEE Transactions on Information Theory, 61:11, (6131-6144), Online publication date: 1-Nov-2015.
  1107. Girardin V and Lhote L (2015). Rescaling Entropy and Divergence Rates, IEEE Transactions on Information Theory, 61:11, (5868-5882), Online publication date: 1-Nov-2015.
  1108. Chou R, Bloch M and Abbe E (2015). Polar Coding for Secret-Key Generation, IEEE Transactions on Information Theory, 61:11, (6213-6237), Online publication date: 1-Nov-2015.
  1109. Meyer F, Wymeersch H, Frohle M and Hlawatsch F (2015). Distributed Estimation With Information-Seeking Control in Agent Networks, IEEE Journal on Selected Areas in Communications, 33:11, (2439-2456), Online publication date: 1-Nov-2015.
  1110. Crescenzo A and Longobardi M (2015). Some properties and applications of cumulative Kullback-Leibler information, Applied Stochastic Models in Business and Industry, 31:6, (875-891), Online publication date: 1-Nov-2015.
  1111. Freitag S, Weyers B, Bönsch A and Kuhlen T Comparison and evaluation of viewpoint quality estimation algorithms for immersive virtual environments Proceedings of the 25th International Conference on Artificial Reality and Telexistence and 20th Eurographics Symposium on Virtual Environments, (53-60)
  1112. Javidbakht O and Venkitasubramaniam P Relay selection for optimal delay anonymity tradeoff in anonymous networks MILCOM 2015 - 2015 IEEE Military Communications Conference, (960-965)
  1113. ACM
    Pradhan N, Deolalikar V and Li K Atypical Queries in eCommerce Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1767-1770)
  1114. ACM
    Sellam T, Müller E and Kersten M Semi-Automated Exploration of Data Warehouses Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1321-1330)
  1115. ACM
    Zafarani R and Liu H 10 Bits of Surprise Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (423-431)
  1116. Burnashev M (2015). On the BSC reliability function, Problems of Information Transmission, 51:4, (307-325), Online publication date: 1-Oct-2015.
  1117. Quist B and Jensen M (2015). Maximization of the Channel-Based Key Establishment Rate in MIMO Systems, IEEE Transactions on Wireless Communications, 14:10, (5565-5573), Online publication date: 1-Oct-2015.
  1118. Biglieri E, Kung Yao and Cheng-An Yang (2015). Fading Models From Spherically Invariant Processes, IEEE Transactions on Wireless Communications, 14:10, (5526-5538), Online publication date: 1-Oct-2015.
  1119. Gopal L, Yue Rong and Zhuquan Zang (2015). Tomlinson-Harashima Precoding Based Transceiver Design for MIMO Relay Systems With Channel Covariance Information, IEEE Transactions on Wireless Communications, 14:10, (5513-5525), Online publication date: 1-Oct-2015.
  1120. Jianhua Mo and Heath R (2015). Capacity Analysis of One-Bit Quantized MIMO Systems With Transmitter Channel State Information, IEEE Transactions on Signal Processing, 63:20, (5498-5512), Online publication date: 1-Oct-2015.
  1121. Lin Han , Wilson R and Hancock E (2015). Generative Graph Prototypes from Information Theory, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:10, (2013-2027), Online publication date: 1-Oct-2015.
  1122. Perlaza S, Tandon R, Poor H and Zhu Han (2015). Perfect Output Feedback in the Two-User Decentralized Interference Channel, IEEE Transactions on Information Theory, 61:10, (5441-5462), Online publication date: 1-Oct-2015.
  1123. Braun G and Pokutta S (2015). The Matching Problem Has No Fully Polynomial Size Linear Programming Relaxation Schemes, IEEE Transactions on Information Theory, 61:10, (5754-5764), Online publication date: 1-Oct-2015.
  1124. Sreekumar S, Dey B and Pillai S (2015). Distributed Rate Adaptation and Power Control in Fading Multiple Access Channels, IEEE Transactions on Information Theory, 61:10, (5504-5524), Online publication date: 1-Oct-2015.
  1125. Carmon Y and Shamai S (2015). Lower Bounds and Approximations for the Information Rate of the ISI Channel, IEEE Transactions on Information Theory, 61:10, (5417-5431), Online publication date: 1-Oct-2015.
  1126. Ozel O, Ekrem E and Ulukus S (2015). Gaussian Wiretap Channel With Amplitude and Variance Constraints, IEEE Transactions on Information Theory, 61:10, (5553-5563), Online publication date: 1-Oct-2015.
  1127. Voloshynovskiy S, Holotyak T and Beekhof F (2015). Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition, IEEE Transactions on Information Forensics and Security, 10:10, (2033-2047), Online publication date: 1-Oct-2015.
  1128. Yi Fang , Guoan Bi , Yong Liang Guan and Lau F (2015). A Survey on Protograph LDPC Codes and Their Applications, IEEE Communications Surveys & Tutorials, 17:4, (1989-2016), Online publication date: 1-Oct-2015.
  1129. ACM
    Tune P and Roughan M (2015). Spatiotemporal Traffic Matrix Synthesis, ACM SIGCOMM Computer Communication Review, 45:4, (579-592), Online publication date: 22-Sep-2015.
  1130. ACM
    Awan H and Chou C Impact of Receiver Molecular Circuits on the Performance of Reaction Shift Keying Proceedings of the Second Annual International Conference on Nanoscale Computing and Communication, (1-6)
  1131. ACM
    Tian M, Yu Z, Wang Z and Guo B Combining social media and location-based services for shop type recommendation Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, (161-164)
  1132. ACM
    Liu Q, Xiao J and Rao W Clustering Large Undirected Graphs on External Memory Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, (25-30)
  1133. Satir E, Alpkocak A and Kilinc D Word-context matrix based query expansion in information retrieval for Turkish text Proceedings of the 6th Symposium on Future Directions in Information Access, (55-58)
  1134. Avestimehr A, Diggavi S, Tian C and Tse D (2015). An Approximation Approach to Network Information Theory, Foundations and Trends in Communications and Information Theory, 12:1-2, (1-183), Online publication date: 1-Sep-2015.
  1135. Bai Y, Snyder J, Peshkin M and MacIver M (2015). Finding and identifying simple objects underwater with active electrosense, International Journal of Robotics Research, 34:10, (1255-1277), Online publication date: 1-Sep-2015.
  1136. Pad P and Unser M (2015). Optimality of Operator-Like Wavelets for Representing Sparse AR(1) Processes, IEEE Transactions on Signal Processing, 63:18, (4827-4837), Online publication date: 1-Sep-2015.
  1137. Manesh A, Murthy C and Annavajjala R (2015). Physical Layer Data Fusion Via Distributed Co-Phasing With General Signal Constellations, IEEE Transactions on Signal Processing, 63:17, (4660-4672), Online publication date: 1-Sep-2015.
  1138. Dongliang He , Chong Luo , Cuiling Lan , Feng Wu and Wenjun Zeng (2015). Structure-Preserving Hybrid Digital-Analog Video Delivery in Wireless Networks, IEEE Transactions on Multimedia, 17:9, (1658-1670), Online publication date: 1-Sep-2015.
  1139. Toni L, Maugey T and Frossard P (2015). Optimized Packet Scheduling in Multiview Video Navigation Systems, IEEE Transactions on Multimedia, 17:9, (1604-1616), Online publication date: 1-Sep-2015.
  1140. Boucheron S, Gassiat E and Ohannessian M (2015). About Adaptive Coding on Countable Alphabets: Max-Stable Envelope Classes, IEEE Transactions on Information Theory, 61:9, (4948-4967), Online publication date: 1-Sep-2015.
  1141. Chao Tian , Bandemer B and Shamai Shitz S (2015). Gaussian State Amplification with Noisy Observations, IEEE Transactions on Information Theory, 61:9, (4587-4597), Online publication date: 1-Sep-2015.
  1142. Lapidoth A, Malar A and Ligong Wang (2015). Covering Point Patterns, IEEE Transactions on Information Theory, 61:9, (4521-4533), Online publication date: 1-Sep-2015.
  1143. Mostafa A and Lampe L (2015). Physical-Layer Security for MISO Visible Light Communication Channels, IEEE Journal on Selected Areas in Communications, 33:9, (1806-1818), Online publication date: 1-Sep-2015.
  1144. ACM
    Gao W and Sebastiani F Tweet Sentiment Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (97-104)
  1145. Duarte L, Oliveira Pereira F, Attux R, Suyama R and Romano J Source Separation in Post-nonlinear Mixtures by Means of Monotonic Networks Proceedings of the 12th International Conference on Latent Variable Analysis and Signal Separation - Volume 9237, (176-183)
  1146. ACM
    Tune P and Roughan M Spatiotemporal Traffic Matrix Synthesis Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (579-592)
  1147. ACM
    Yi J, Zhang L, Yang T, Liu W and Wang J An Efficient Semi-Supervised Clustering Algorithm with Sequential Constraints Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1405-1414)
  1148. ACM
    Shah N, Koutra D, Zou T, Gallagher B and Faloutsos C TimeCrunch Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1055-1064)
  1149. ACM
    Vulić I and Moens M Monolingual and Cross-Lingual Information Retrieval Models Based on (Bilingual) Word Embeddings Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, (363-372)
  1150. Shaila S and Vadivel A (2015). TAG term weight-based N gram Thesaurus generation for query expansion in information retrieval application, Journal of Information Science, 41:4, (467-485), Online publication date: 1-Aug-2015.
  1151. Chao Wang and Skoglund M (2015). Multi-User Multi-Hop Relay Networks: Transmission Schemes and Degrees of Freedom, IEEE Transactions on Wireless Communications, 14:8, (4582-4596), Online publication date: 1-Aug-2015.
  1152. Xuemin Hong , Chao Zheng , Jing Wang , Jianghong Shi and Cheng-Xiang Wang (2015). Optimal Resource Allocation and EE-SE Trade-Off in Hybrid Cognitive Gaussian Relay Channels, IEEE Transactions on Wireless Communications, 14:8, (4170-4181), Online publication date: 1-Aug-2015.
  1153. Emad A and Milenkovic O (2015). Poisson Group Testing: A Probabilistic Model for Boolean Compressed Sensing, IEEE Transactions on Signal Processing, 63:16, (4396-4410), Online publication date: 1-Aug-2015.
  1154. Wei Han , An Liu and Lau V (2015). Degrees of Freedom in Cached MIMO Relay Networks, IEEE Transactions on Signal Processing, 63:15, (3986-3997), Online publication date: 1-Aug-2015.
  1155. Tridenski S, Zamir R and Ingber A (2015). The Ziv–Zakai–Rényi Bound for Joint Source-Channel Coding, IEEE Transactions on Information Theory, 61:8, (4293-4315), Online publication date: 1-Aug-2015.
  1156. Sharov A and Roth R (2015). New Bounds and Constructions for Granular Media Coding, IEEE Transactions on Information Theory, 61:8, (4227-4238), Online publication date: 1-Aug-2015.
  1157. Badr A, Lui D and Khisti A (2015). Streaming Codes for Multicast Over Burst Erasure Channels, IEEE Transactions on Information Theory, 61:8, (4181-4208), Online publication date: 1-Aug-2015.
  1158. Akyol E, Rose K and Basar T (2015). Optimal Zero-Delay Jamming Over an Additive Noise Channel, IEEE Transactions on Information Theory, 61:8, (4331-4344), Online publication date: 1-Aug-2015.
  1159. Hung Gia Hoang , Ba-Ngu Vo , Ba-Tuong Vo and Mahler R (2015). The Cauchy–Schwarz Divergence for Poisson Point Processes, IEEE Transactions on Information Theory, 61:8, (4475-4485), Online publication date: 1-Aug-2015.
  1160. Liu Y, Man Y, Song M, Zhang H and Wang L (2015). A cooperative diversity transmission scheme by superposition coding relaying for a wireless system with multiple relays, Wireless Networks, 21:6, (1801-1817), Online publication date: 1-Aug-2015.
  1161. ACM
    Dimitrov S, Sami R and Epelman M (2015). Subsidized Prediction Mechanisms for Risk-Averse Agents, ACM Transactions on Economics and Computation, 3:4, (1-23), Online publication date: 31-Jul-2015.
  1162. Bellemare M Count-based frequency estimation with bounded memory Proceedings of the 24th International Conference on Artificial Intelligence, (3337-3344)
  1163. Orhan O, Gunduz D and Erkip E (2015). Source-Channel Coding Under Energy, Delay, and Buffer Constraints, IEEE Transactions on Wireless Communications, 14:7, (3836-3849), Online publication date: 1-Jul-2015.
  1164. Kailkhura B, Vempaty A and Varshney P (2015). Distributed Inference in Tree Networks Using Coding Theory, IEEE Transactions on Signal Processing, 63:14, (3715-3726), Online publication date: 1-Jul-2015.
  1165. Bo Tang , Naghsh M and Jun Tang (2015). Relative Entropy-Based Waveform Design for MIMO Radar Detection in the Presence of Clutter and Interference, IEEE Transactions on Signal Processing, 63:14, (3783-3796), Online publication date: 1-Jul-2015.
  1166. Moshksar K and Khandani A (2015). Decentralized Wireless Networks With Asynchronous Users and Burst Transmissions, IEEE Transactions on Information Theory, 61:7, (3851-3881), Online publication date: 1-Jul-2015.
  1167. Aref V, Macris N and Vuffray M (2015). Approaching the Rate-Distortion Limit With Spatial Coupling, Belief Propagation, and Decimation, IEEE Transactions on Information Theory, 61:7, (3954-3979), Online publication date: 1-Jul-2015.
  1168. Nazari A, Pradhan S and Anastasopoulos A (2015). Error Exponent for Multiple Access Channels: Upper Bounds, IEEE Transactions on Information Theory, 61:7, (3605-3621), Online publication date: 1-Jul-2015.
  1169. Kailkhura B, Brahma S, Dulek B, Han Y and Varshney P (2015). Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques, IEEE Transactions on Information Forensics and Security, 10:7, (1499-1512), Online publication date: 1-Jul-2015.
  1170. Manohar R (2015). Comparing Stochastic and Deterministic Computing, IEEE Computer Architecture Letters, 14:2, (119-122), Online publication date: 1-Jul-2015.
  1171. Depatla S, Muralidharan A and Mostofi Y (2015). Occupancy Estimation Using Only WiFi Power Measurements, IEEE Journal on Selected Areas in Communications, 33:7, (1381-1393), Online publication date: 1-Jul-2015.
  1172. Choi H and Ha J (2015). Informative windowed forecasting of continuous-time linear systems for mutual information-based sensor planning, Automatica (Journal of IFAC), 57:C, (97-104), Online publication date: 1-Jul-2015.
  1173. ACM
    Jain R (2015). New Strong Direct Product Results in Communication Complexity, Journal of the ACM, 62:3, (1-27), Online publication date: 30-Jun-2015.
  1174. ACM
    Kash I, Friedman E and Halpern J (2015). An Equilibrium Analysis of Scrip Systems, ACM Transactions on Economics and Computation, 3:3, (1-32), Online publication date: 23-Jun-2015.
  1175. ACM
    Carrara B and Adams C On Characterizing and Measuring Out-of-Band Covert Channels Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (43-54)
  1176. ACM
    Su Y, Wang Y and Agrawal G In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, (61-72)
  1177. ACM
    Bresler G Efficiently Learning Ising Models on Arbitrary Graphs Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (771-782)
  1178. ACM
    Braverman M and Garg A Small Value Parallel Repetition for General Games Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (335-340)
  1179. ACM
    Braverman M and Weinstein O An Interactive Information Odometer and Applications Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (341-350)
  1180. Lin X, Wang X, Xiao N, Huang X and Wang J A Feature Selection Method Based on Feature Grouping and Genetic Algorithm Revised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 9243, (150-158)
  1181. ACM
    Weinstein O (2015). Information Complexity and the Quest for Interactive Compression, ACM SIGACT News, 46:2, (41-64), Online publication date: 4-Jun-2015.
  1182. ACM
    Lin B and Kifer D (2015). Information Measures in Statistical Privacy and Data Processing Applications, ACM Transactions on Knowledge Discovery from Data, 9:4, (1-29), Online publication date: 1-Jun-2015.
  1183. ACM
    Esuli A and Sebastiani F (2015). Optimizing Text Quantifiers for Multivariate Loss Functions, ACM Transactions on Knowledge Discovery from Data, 9:4, (1-27), Online publication date: 1-Jun-2015.
  1184. Hamza D, Ki-Hong Park , Alouini M and Aissa S (2015). Throughput Maximization for Cognitive Radio Networks Using Active Cooperation and Superposition Coding, IEEE Transactions on Wireless Communications, 14:6, (3322-3336), Online publication date: 1-Jun-2015.
  1185. Shimin Gong , Ping Wang and Lingjie Duan (2015). Distributed Power Control With Robust Protection for PUs in Cognitive Radio Networks, IEEE Transactions on Wireless Communications, 14:6, (3247-3258), Online publication date: 1-Jun-2015.
  1186. Baggenstoss P (2015). Maximum Entropy PDF Design Using Feature Density Constraints: Applications in Signal Processing, IEEE Transactions on Signal Processing, 63:11, (2815-2825), Online publication date: 1-Jun-2015.
  1187. Alustiza I, Crespo P and Beferull-Lozano B (2015). Analog Multiple Description Joint Source-Channel Coding Based on Lattice Scaling, IEEE Transactions on Signal Processing, 63:12, (3046-3061), Online publication date: 1-Jun-2015.
  1188. Kamyshanska H and Memisevic R (2015). The Potential Energy of an Autoencoder, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:6, (1261-1273), Online publication date: 1-Jun-2015.
  1189. Junbiao Pang , Fei Jia , Chunjie Zhang , Weigang Zhang , Qingming Huang and Baocai Yin (2015). Unsupervised Web Topic Detection Using A Ranked Clustering-Like Pattern Across Similarity Cascades, IEEE Transactions on Multimedia, 17:6, (843-853), Online publication date: 1-Jun-2015.
  1190. Ling-Yu Duan , Jie Lin , Zhe Wang , Tiejun Huang and Wen Gao (2015). Weighted Component Hashing of Binary Aggregated Descriptors for Fast Visual Search, IEEE Transactions on Multimedia, 17:6, (828-842), Online publication date: 1-Jun-2015.
  1191. Ray A, Sanghavi S and Shakkottai S (2015). Improved Greedy Algorithms for Learning Graphical Models, IEEE Transactions on Information Theory, 61:6, (3457-3468), Online publication date: 1-Jun-2015.
  1192. Shaofeng Zou , Yingbin Liang , Lifeng Lai and Shamai S (2015). An Information Theoretic Approach to Secret Sharing, IEEE Transactions on Information Theory, 61:6, (3121-3136), Online publication date: 1-Jun-2015.
  1193. Karbasi A, Ioannidis S and Massoulie L (2015). From Small-World Networks to Comparison-Based Search, IEEE Transactions on Information Theory, 61:6, (3056-3074), Online publication date: 1-Jun-2015.
  1194. Naghibi F, Salimi S and Skoglund M (2015). The CEO Problem With Secrecy Constraints, IEEE Transactions on Information Forensics and Security, 10:6, (1234-1249), Online publication date: 1-Jun-2015.
  1195. Sonee A and Hodtani G (2015). On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information, IEEE Transactions on Information Forensics and Security, 10:6, (1151-1166), Online publication date: 1-Jun-2015.
  1196. Fangming Ye , Zhaobo Zhang , Chakrabarty K and Xinli Gu (2015). Information-Theoretic Syndrome Evaluation, Statistical Root-Cause Analysis, and Correlation-Based Feature Selection for Guiding Board-Level Fault Diagnosis, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:6, (1014-1026), Online publication date: 1-Jun-2015.
  1197. Yu P, Verma G and Sadler B (2015). Wireless physical layer authentication via fingerprint embedding, IEEE Communications Magazine, 53:6, (48-53), Online publication date: 1-Jun-2015.
  1198. Pohl D, Bouchachia A and Hellwagner H (2015). Social media for crisis management, Multimedia Tools and Applications, 74:11, (3901-3932), Online publication date: 1-Jun-2015.
  1199. ACM
    Ribeiro B Challenges of Forecasting and Measuring a Complex Networked World Proceedings of the 24th International Conference on World Wide Web, (1067-1067)
  1200. ACM
    Abujabal A and Berberich K Important Events in the Past, Present, and Future Proceedings of the 24th International Conference on World Wide Web, (1315-1320)
  1201. Zhiyuan Jiang , Molisch A, Caire G and Zhisheng Niu (2015). Achievable Rates of FDD Massive MIMO Systems With Spatial Channel Correlation, IEEE Transactions on Wireless Communications, 14:5, (2868-2882), Online publication date: 1-May-2015.
  1202. Jazaie M and Sharafat A (2015). Downlink Capacity and Optimal Power Allocation in Hybrid Underlay–Interweave Secondary Networks, IEEE Transactions on Wireless Communications, 14:5, (2562-2570), Online publication date: 1-May-2015.
  1203. Tsiligkaridis T, Sadler B and Hero A (2015). On Decentralized Estimation With Active Queries, IEEE Transactions on Signal Processing, 63:10, (2610-2622), Online publication date: 1-May-2015.
  1204. Vempaty A and Varshney L (2015). The Non-Regular CEO Problem, IEEE Transactions on Information Theory, 61:5, (2764-2775), Online publication date: 1-May-2015.
  1205. Li G, Bennis M and Yu G (2015). Full duplex communications [Guest Editorial], IEEE Communications Magazine, 53:5, (90-90), Online publication date: 1-May-2015.
  1206. Li B, Hoi S, Sahoo D and Liu Z (2015). Moving average reversion strategy for on-line portfolio selection, Artificial Intelligence, 222:C, (104-123), Online publication date: 1-May-2015.
  1207. Aydın S, Tunga M and Yetkin S (2015). Mutual Information Analysis of Sleep EEG in Detecting Psycho-Physiological Insomnia, Journal of Medical Systems, 39:5, (1-10), Online publication date: 1-May-2015.
  1208. ACM
    Pavlovic D Towards a science of trust Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, (1-9)
  1209. Ketseoglou T and Ayanoglu E (2015). Linear Precoding for MIMO With LDPC Coding and Reduced Complexity, IEEE Transactions on Wireless Communications, 14:4, (2192-2204), Online publication date: 1-Apr-2015.
  1210. Iftikhar S, Kamran M and Anwar Z (2015). RRW—A Robust and Reversible Watermarking Technique for Relational Data, IEEE Transactions on Knowledge and Data Engineering, 27:4, (1132-1145), Online publication date: 1-Apr-2015.
  1211. Weinberger N and Merhav N (2015). Optimum Tradeoffs Between the Error Exponent and the Excess-Rate Exponent of Variable-Rate Slepian–Wolf Coding, IEEE Transactions on Information Theory, 61:4, (2165-2190), Online publication date: 1-Apr-2015.
  1212. Bardhan B, Garcia-Patron R, Wilde M and Winter A (2015). Strong Converse for the Classical Capacity of Optical Quantum Communication Channels, IEEE Transactions on Information Theory, 61:4, (1842-1850), Online publication date: 1-Apr-2015.
  1213. Carmon Y, Shamai S and Weissman T (2015). Comparison of the Achievable Rates in OFDM and Single Carrier Modulation with I.I.D. Inputs, IEEE Transactions on Information Theory, 61:4, (1795-1818), Online publication date: 1-Apr-2015.
  1214. Correa G, Assuncao P, Volcan Agostini L and da Silva Cruz L (2015). Fast HEVC Encoding Decisions Using Data Mining, IEEE Transactions on Circuits and Systems for Video Technology, 25:4, (660-673), Online publication date: 1-Apr-2015.
  1215. Yanjiao Chen , Kaishun Wu and Qian Zhang (2015). From QoS to QoE: A Tutorial on Video Quality Assessment, IEEE Communications Surveys & Tutorials, 17:2, (1126-1165), Online publication date: 1-Apr-2015.
  1216. ACM
    Yin H, Cui B, Chen L, Hu Z and Zhou X (2015). Dynamic User Modeling in Social Media Systems, ACM Transactions on Information Systems, 33:3, (1-44), Online publication date: 23-Mar-2015.
  1217. ACM
    Waters A, Tinapple D and Baraniuk R BayesRank Proceedings of the Second (2015) ACM Conference on Learning @ Scale, (177-183)
  1218. ACM
    Hsieh H, Chang C and Liao W (2015). Not Every Bit Counts, ACM Transactions on Sensor Networks, 11:2, (1-33), Online publication date: 2-Mar-2015.
  1219. Rui Yin , Guanding Yu , Huazi Zhang , Zhaoyang Zhang and Li G (2015). Pricing-Based Interference Coordination for D2D Communications in Cellular Networks, IEEE Transactions on Wireless Communications, 14:3, (1519-1532), Online publication date: 1-Mar-2015.
  1220. Jamali V, Zlatanov N and Schober R (2015). Bidirectional Buffer-Aided Relay Networks With Fixed Rate Transmission—Part I: Delay-Unconstrained Case, IEEE Transactions on Wireless Communications, 14:3, (1323-1338), Online publication date: 1-Mar-2015.
  1221. Junan Zhu , Baron D and Duarte M (2015). Recovery From Linear Measurements With Complexity-Matching Universal Signal Estimation, IEEE Transactions on Signal Processing, 63:6, (1512-1527), Online publication date: 1-Mar-2015.
  1222. Oksanen J and Koivunen V (2015). An Order Optimal Policy for Exploiting Idle Spectrum in Cognitive Radio Networks, IEEE Transactions on Signal Processing, 63:5, (1214-1227), Online publication date: 1-Mar-2015.
  1223. Jiangfan Zhang , Blum R, Xuanxuan Lu and Conus D (2015). Asymptotically Optimum Distributed Estimation in the Presence of Attacks, IEEE Transactions on Signal Processing, 63:5, (1086-1101), Online publication date: 1-Mar-2015.
  1224. Chun Tung Chou (2015). Impact of Receiver Reaction Mechanisms on the Performance of Molecular Communication Networks, IEEE Transactions on Nanotechnology, 14:2, (304-317), Online publication date: 1-Mar-2015.
  1225. Basciftci Y, Gungor O, Koksal C and Ozguner F (2015). On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary, IEEE Transactions on Information Theory, 61:3, (1325-1343), Online publication date: 1-Mar-2015.
  1226. Palaiyanur H and Sahai A (2015). On Haroutunian’s Exponent for Parallel Channels and an Application to Fixed-Delay Codes Without Feedback, IEEE Transactions on Information Theory, 61:3, (1298-1308), Online publication date: 1-Mar-2015.
  1227. Yisong Chen and Chan A (2015). Enhanced Figure-Ground Classification With Background Prior Propagation, IEEE Transactions on Image Processing, 24:3, (873-885), Online publication date: 1-Mar-2015.
  1228. Lin Y and Johnson E (2015). Network testing [Series Editorial], IEEE Communications Magazine, 53:3, (172-172), Online publication date: 1-Mar-2015.
  1229. Zhe Wang , Aggarwal V and Xiaodong Wang (2015). Iterative Dynamic Water-Filling for Fading Multiple-Access Channels With Energy Harvesting, IEEE Journal on Selected Areas in Communications, 33:3, (382-395), Online publication date: 1-Mar-2015.
  1230. Ulukus S, Yener A, Erkip E, Simeone O, Zorzi M, Grover P and Huang K (2015). Energy Harvesting Wireless Communications: A Review of Recent Advances, IEEE Journal on Selected Areas in Communications, 33:3, (360-381), Online publication date: 1-Mar-2015.
  1231. Tutuncuoglu K, Yener A and Ulukus S (2015). Optimum Policies for an Energy Harvesting Transmitter Under Energy Storage Losses, IEEE Journal on Selected Areas in Communications, 33:3, (467-481), Online publication date: 1-Mar-2015.
  1232. De Mulder W, Bethard S and Moens M (2015). A survey on the application of recurrent neural networks to statistical language modeling, Computer Speech and Language, 30:1, (61-98), Online publication date: 1-Mar-2015.
  1233. Rini S and Huppert C (2015). On the capacity of the cognitive interference channel with a common cognitive message, Transactions on Emerging Telecommunications Technologies, 26:3, (432-447), Online publication date: 1-Mar-2015.
  1234. Bonaventura X, Guo J, Meng W, Feixas M, Zhang X and Sbert M (2015). 3D shape retrieval using viewpoint information-theoretic measures, Computer Animation and Virtual Worlds, 26:2, (147-156), Online publication date: 1-Mar-2015.
  1235. ACM
    Peters C and Klein R Moment shadow mapping Proceedings of the 19th Symposium on Interactive 3D Graphics and Games, (7-14)
  1236. ACM
    Nguyen T, Lauw H and Tsaparas P Review Synthesis for Micro-Review Summarization Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, (169-178)
  1237. Francis J and Mehta N (2015). Characterizing the Impact of Feedback Delays on Wideband Rate Adaptation, IEEE Transactions on Wireless Communications, 14:2, (960-971), Online publication date: 1-Feb-2015.
  1238. Yi Fang , Guoan Bi and Yong Liang Guan (2015). Design and Analysis of Root-Protograph LDPC Codes for Non-Ergodic Block-Fading Channels, IEEE Transactions on Wireless Communications, 14:2, (738-749), Online publication date: 1-Feb-2015.
  1239. Dulek B, Ozdemir O, Varshney P and Wei Su (2015). Distributed Maximum Likelihood Classification of Linear Modulations Over Nonidentical Flat Block-Fading Gaussian Channels, IEEE Transactions on Wireless Communications, 14:2, (724-737), Online publication date: 1-Feb-2015.
  1240. Geng-Shen Fu , Phlypo R, Anderson M and Adali T (2015). Complex Independent Component Analysis Using Three Types of Diversity: Non-Gaussianity, Nonwhiteness, and Noncircularity, IEEE Transactions on Signal Processing, 63:3, (794-805), Online publication date: 1-Feb-2015.
  1241. Chepuri S and Leus G (2015). Sparsity-Promoting Sensor Selection for Non-Linear Measurement Models, IEEE Transactions on Signal Processing, 63:3, (684-698), Online publication date: 1-Feb-2015.
  1242. Guoquan Huang , Ke Zhou , Trawny N and Roumeliotis S (2015). A Bank of Maximum A Posteriori (MAP) Estimators for Target Tracking, IEEE Transactions on Robotics, 31:1, (85-103), Online publication date: 1-Feb-2015.
  1243. Somekh-Baruch A (2015). On Achievable Rates and Error Exponents for Channels With Mismatched Decoding, IEEE Transactions on Information Theory, 61:2, (727-740), Online publication date: 1-Feb-2015.
  1244. Bobkov S and Chistyakov G (2015). Entropy Power Inequality for the Rényi Entropy, IEEE Transactions on Information Theory, 61:2, (708-714), Online publication date: 1-Feb-2015.
  1245. Shuhang Wu , Shuangqing Wei , Yue Wang , Vaidyanathan R and Jian Yuan (2015). Partition Information and its Transmission Over Boolean Multi-Access Channels, IEEE Transactions on Information Theory, 61:2, (1010-1027), Online publication date: 1-Feb-2015.
  1246. Venkitasubramaniam P and Mishra A (2015). Anonymity of Memory-Limited Chaum Mixes Under Timing Analysis: An Information Theoretic Perspective, IEEE Transactions on Information Theory, 61:2, (996-1009), Online publication date: 1-Feb-2015.
  1247. Sengupta A, Tandon R and Clancy T (2015). Fundamental Limits of Caching With Secure Delivery, IEEE Transactions on Information Forensics and Security, 10:2, (355-370), Online publication date: 1-Feb-2015.
  1248. Namyoon Lee and Heath R (2015). Space–Time Physical-Layer Network Coding, IEEE Journal on Selected Areas in Communications, 33:2, (323-336), Online publication date: 1-Feb-2015.
  1249. Tao Yang , Sun Q, Zhang J and Jinhong Yuan (2015). A Linear Network Coding Approach for Uplink Distributed MIMO Systems: Protocol and Outage Behavior, IEEE Journal on Selected Areas in Communications, 33:2, (250-263), Online publication date: 1-Feb-2015.
  1250. Zahedi A, Østergaard J, Jensen S, Bech S and Naylor P (2015). Audio coding in wireless acoustic sensor networks, Signal Processing, 107:C, (141-152), Online publication date: 1-Feb-2015.
  1251. Kamkar I, Gupta S, Phung D and Venkatesh S (2015). Stable feature selection for clinical prediction, Journal of Biomedical Informatics, 53:C, (277-290), Online publication date: 1-Feb-2015.
  1252. Khalil K and Ekici E (2015). Turning foes to allies in cognitive radio networks, Ad Hoc Networks, 25:PA, (237-250), Online publication date: 1-Feb-2015.
  1253. Hong Y, Bradley D, Kim D, Li D, Tokuta A and Ding Z (2015). Construction of higher spectral efficiency virtual backbone in wireless networks, Ad Hoc Networks, 25:PA, (228-236), Online publication date: 1-Feb-2015.
  1254. ACM
    Canonne C, Guruswami V, Meka R and Sudan M Communication with Imperfectly Shared Randomness Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (257-262)
  1255. Bontempi G and Flauder M (2015). From dependency to causality, The Journal of Machine Learning Research, 16:1, (2437-2457), Online publication date: 1-Jan-2015.
  1256. Santhanam N and Anantharam V (2015). Agnostic insurability of model classes, The Journal of Machine Learning Research, 16:1, (2329-2355), Online publication date: 1-Jan-2015.
  1257. Germain P, Lacasse A, Laviolette F, Marchand M and Roy J (2015). Risk bounds for the majority vote, The Journal of Machine Learning Research, 16:1, (787-860), Online publication date: 1-Jan-2015.
  1258. Hu Y and Liang J (2015). CFAR decision fusion approaches in the clustered radar sensor networks using LEACH and HEED, International Journal of Distributed Sensor Networks, 2015, (19-19), Online publication date: 1-Jan-2015.
  1259. Singh J and Sharan A (2015). Relevance feedback based query expansion model using Borda count and semantic similarity approach, Computational Intelligence and Neuroscience, 2015, (96-96), Online publication date: 1-Jan-2015.
  1260. Gao Y, Xue P, Li Y, Yu H, Wang X and Gao S (2015). Energy aware optimal resource allocation in backhaul constraint wireless networks, International Journal of Distributed Sensor Networks, 2015, (8-8), Online publication date: 1-Jan-2015.
  1261. Stefanov A (2015). Distortion performance of underwater acoustic sensor networks, International Journal of Distributed Sensor Networks, 2015, (2-2), Online publication date: 1-Jan-2015.
  1262. Ghaffar R, Knopp R and Pin-Han Ho (2015). Low Complexity BICM MIMO OFDM Demodulator, IEEE Transactions on Wireless Communications, 14:1, (558-569), Online publication date: 1-Jan-2015.
  1263. Pedarsani R, Leveque O and Sheng Yang (2015). On the DMT Optimality of Time-Varying Distributed Rotation Over Slow Fading Relay Channels, IEEE Transactions on Wireless Communications, 14:1, (421-434), Online publication date: 1-Jan-2015.
  1264. Khairnar P and Mehta N (2015). Discrete-Rate Adaptation and Selection in Energy Harvesting Wireless Systems, IEEE Transactions on Wireless Communications, 14:1, (219-229), Online publication date: 1-Jan-2015.
  1265. Venturino L, Zappone A, Risi C and Buzzi S (2015). Energy-Efficient Scheduling and Power Allocation in Downlink OFDMA Networks With Base Station Coordination, IEEE Transactions on Wireless Communications, 14:1, (1-14), Online publication date: 1-Jan-2015.
  1266. Jensen J and Tan Z (2015). Minimum mean-square error estimation of mel-frequency cepstral features-a theoretically consistent approach, IEEE/ACM Transactions on Audio, Speech and Language Processing, 23:1, (186-197), Online publication date: 1-Jan-2015.
  1267. Campobello G, Giordano O, Segreto A and Serrano S (2015). Comparison of local lossless compression algorithms for Wireless Sensor Networks, Journal of Network and Computer Applications, 47:C, (23-31), Online publication date: 1-Jan-2015.
  1268. Claude F, Navarro G and Ordóñez A (2015). The wavelet matrix, Information Systems, 47:C, (15-32), Online publication date: 1-Jan-2015.
  1269. Ying K, Yu Z, Baxley R and Zhou G (2015). Optimization of signal-to-noise-plus-distortion ratio for dynamic-range-limited nonlinearities, Digital Signal Processing, 36:C, (104-114), Online publication date: 1-Jan-2015.
  1270. Li Z, Gu J, Zhuang H, Kang L, Zhao X and Guo Q (2015). Adaptive molecular docking method based on information entropy genetic algorithm, Applied Soft Computing, 26:C, (299-302), Online publication date: 1-Jan-2015.
  1271. Ciftcioglu E, Michaloliakos A, Yener A, Psounis K, La Porta T and Govindan R (2014). Operational information content sum capacity, Computer Networks: The International Journal of Computer and Telecommunications Networking, 75:PA, (1-17), Online publication date: 24-Dec-2014.
  1272. Liu F and Lee R Random Fill Cache Architecture Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, (203-215)
  1273. ACM
    Zhang T and Lee R New models of cache architectures characterizing information leakage from cache side channels Proceedings of the 30th Annual Computer Security Applications Conference, (96-105)
  1274. Ali-Eldin A, Seleznjev O, Sjöstedt-de Luna S, Tordsson J and Elmroth E Measuring Cloud Workload Burstiness Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (566-572)
  1275. Johnson O, Sejdinovic D, Cruise J, Piechocki R and Ganesh A (2014). Non-Parametric Change-Point Estimation using String Matching Algorithms, Methodology and Computing in Applied Probability, 16:4, (987-1008), Online publication date: 1-Dec-2014.
  1276. Chen Z, Son S, Hendrix W, Agrawal A, Liao W and Choudhary A NUMARCK Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (733-744)
  1277. ACM
    Walton S, Maguire E and Chen M Multiple queries with conditional attributes (QCATs) for anomaly detection and visualization Proceedings of the Eleventh Workshop on Visualization for Cyber Security, (17-24)
  1278. ACM
    Quercini G and Samet H Uncovering the spatial relatedness in Wikipedia Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (153-162)
  1279. ACM
    Gillani F and Al-Shaer E Improving Efficiency of Spam Detection using Economic Model Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, (11-18)
  1280. Bandi C and Bertsimas D (2014). Optimal Design for Multi-Item Auctions, Mathematics of Operations Research, 39:4, (1012-1038), Online publication date: 1-Nov-2014.
  1281. ACM
    Xu Z, Ke Y, Wang Y, Cheng H and Cheng J (2014). GBAGC, ACM Transactions on Knowledge Discovery from Data, 9:1, (1-43), Online publication date: 28-Oct-2014.
  1282. Zhang C, Tong Y and Chen L (2014). Where to, Proceedings of the VLDB Endowment, 7:14, (2005-2016), Online publication date: 1-Oct-2014.
  1283. ACM
    Rossi L and Musolesi M It's the way you check-in Proceedings of the second ACM conference on Online social networks, (215-226)
  1284. Kudryashov B and Porov A (2014). Universal coding for memoryless sources with countably infinite alphabets, Problems of Information Transmission, 50:4, (390-399), Online publication date: 1-Oct-2014.
  1285. Hong X, Chen S, Qatawneh A, Daqrouq K, Sheikh M and Morfeq A (2014). A radial basis function network classifier to maximise leave-one-out mutual information, Applied Soft Computing, 23, (9-18), Online publication date: 1-Oct-2014.
  1286. Pöppelmann T, Ducas L and Güneysu T Enhanced Lattice-Based Signatures on Reconfigurable Hardware Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (353-370)
  1287. ACM
    Sen S and Maitra S (2014). Three levels three dimensional compact coding, ACM SIGARCH Computer Architecture News, 42:2, (9-14), Online publication date: 15-Sep-2014.
  1288. ACM
    Sarker H, Sharmin M, Ali A, Rahman M, Bari R, Hossain S and Kumar S Assessing the availability of users to engage in just-in-time intervention in the natural environment Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (909-920)
  1289. ACM
    Gavai G, Kumar S, Liu J, Brdiczka O and Hanley J Predicting Company Quitting From Online Social Enterprise Activity Proceedings of the 8th Workshop on Social Network Mining and Analysis, (1-5)
  1290. ACM
    Cao C, Chen L and Jagadish H From labor to trader Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1067-1076)
  1291. Hautamäki V, Pöllänen A, Kinnunen T, Lee K, Li H and Fränti P A Comparison of Categorical Attribute Data Clustering Methods Proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition - Volume 8621, (53-62)
  1292. Reittu H, Bazsó F and Weiss R Regular Decomposition of Multivariate Time Series and Other Matrices Proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition - Volume 8621, (424-433)
  1293. Alim M, Nguyen N, Dinh T and Thai M Structural Vulnerability Analysis of Overlapping Communities in Complex Networks Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, (5-12)
  1294. Linial N and Luria Z (2014). An upper bound on the number of high-dimensional permutations, Combinatorica, 34:4, (471-486), Online publication date: 1-Aug-2014.
  1295. Tenzer Y and Elidan G HELM Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, (790-799)
  1296. Geiger P, Janzing D and Schölkopf B Estimating causal effects by bounding confounding Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, (240-249)
  1297. ACM
    Cai Y, Riedl B, Ratan R, Shen C and Picot A FeatureSelector Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, (1-7)
  1298. ACM
    Woolley B and Stanley K A novel human-computer collaboration Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (233-240)
  1299. ACM
    Rafique M, Chen P, Huygens C and Joosen W Evolutionary algorithms for classification of malware families through different network behaviors Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1167-1174)
  1300. Mondal M, Liu Y, Viswanath B, Gummadi K and Mislove A Understanding and specifying social access control lists Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, (271-283)
  1301. Son S, Chen Z, Hendrix W, Agrawal A, Liao W and Choudhary A (2014). Data Compression for the Exascale Computing Era - Survey, Supercomputing Frontiers and Innovations: an International Journal, 1:2, (76-88), Online publication date: 9-Jul-2014.
  1302. ACM
    Bing L, Guo R, Lam W, Niu Z and Wang H Web page segmentation with structured prediction and its application in web page classification Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, (767-776)
  1303. ACM
    Bai X, Guerraoui R and Kermarrec A (2014). Personalizing Top-k Processing Online in a Peer-to-Peer Social Tagging Network, ACM Transactions on Internet Technology, 13:4, (1-36), Online publication date: 1-Jul-2014.
  1304. Yu J, Lee B and Park D (2014). Real-time cooling load forecasting using a hierarchical multi-class SVDD, Multimedia Tools and Applications, 71:1, (293-307), Online publication date: 1-Jul-2014.
  1305. ACM
    Su Y, Agrawal G, Woodring J, Biswas A and Shen H Supporting correlation analysis on scientific datasets in parallel and distributed settings Proceedings of the 23rd international symposium on High-performance parallel and distributed computing, (191-202)
  1306. Maherin I and Liang Q Information Theory Based Opportunistic Sensing in Radar Sensor Networks Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491, (706-717)
  1307. ACM
    Walton N (2014). Concave switching in single and multihop networks, ACM SIGMETRICS Performance Evaluation Review, 42:1, (139-151), Online publication date: 20-Jun-2014.
  1308. ACM
    Yin H, Cui B, Chen L, Hu Z and Huang Z A temporal context-aware model for user behavior modeling in social media systems Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (1543-1554)
  1309. ACM
    Walton N Concave switching in single and multihop networks The 2014 ACM international conference on Measurement and modeling of computer systems, (139-151)
  1310. ACM
    Hur C, Nori A, Rajamani S and Samuel S Slicing probabilistic programs Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, (133-144)
  1311. ACM
    Hur C, Nori A, Rajamani S and Samuel S (2014). Slicing probabilistic programs, ACM SIGPLAN Notices, 49:6, (133-144), Online publication date: 5-Jun-2014.
  1312. ACM
    Ponzanelli L, Bavota G, Di Penta M, Oliveto R and Lanza M Mining StackOverflow to turn the IDE into a self-confident programming prompter Proceedings of the 11th Working Conference on Mining Software Repositories, (102-111)
  1313. ACM
    Christiano P Online local learning via semidefinite programming Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (468-474)
  1314. ACM
    Dekel O, Ding J, Koren T and Peres Y Bandits with switching costs Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (459-467)
  1315. ACM
    Gavinsky D, Meir O, Weinstein O and Wigderson A Toward better formula lower bounds Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (213-222)
  1316. ACM
    Androutsopoulos K, Clark D, Dan H, Hierons R and Harman M An analysis of the relationship between conditional entropy and failed error propagation in software testing Proceedings of the 36th International Conference on Software Engineering, (573-583)
  1317. ACM
    Su G and Rosenblum D Perturbation analysis of stochastic systems with empirical distribution parameters Proceedings of the 36th International Conference on Software Engineering, (311-321)
  1318. ACM
    Kuscu M An Information-Theoretic Model and Analysis of Graphene Plasmon-Assisted FRET-Based Nanocommunication Channel Proceedings of ACM The First Annual International Conference on Nanoscale Computing and Communication, (1-7)
  1319. Piliouras G, Nieto-Granda C, Christensen H and Shamma J Persistent patterns Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (181-188)
  1320. Lin B and Kifer D (2014). On arbitrage-free pricing for general data queries, Proceedings of the VLDB Endowment, 7:9, (757-768), Online publication date: 1-May-2014.
  1321. ACM
    Lei C and Rundensteiner E (2014). Robust Distributed Query Processing for Streaming Data, ACM Transactions on Database Systems, 39:2, (1-45), Online publication date: 1-May-2014.
  1322. ACM
    Fan W, Ma S, Tang N and Yu W (2014). Interaction between Record Matching and Data Repairing, Journal of Data and Information Quality, 4:4, (1-38), Online publication date: 1-May-2014.
  1323. Liu H, Wu X and Zhang S (2014). A NEW SUPERVISED FEATURE SELECTION METHOD FOR PATTERN CLASSIFICATION, Computational Intelligence, 30:2, (342-361), Online publication date: 1-May-2014.
  1324. ACM
    Dong R, Ratliff L, Ohlsson H and Sastry S Fundamental limits of nonintrusive load monitoring Proceedings of the 3rd international conference on High confidence networked systems, (11-18)
  1325. ACM
    Liu P, Azimi J and Zhang R Automatic keywords generation for contextual advertising Proceedings of the 23rd International Conference on World Wide Web, (345-346)
  1326. ACM
    Beutel A, Murray K, Faloutsos C and Smola A CoBaFi Proceedings of the 23rd international conference on World wide web, (97-108)
  1327. ACM
    Chen C, Zheng L, Thomo A, Wu K and Srinivasan V Comparing the staples in latent factor models for recommender systems Proceedings of the 29th Annual ACM Symposium on Applied Computing, (91-96)
  1328. ACM
    Chuah S and Cheung N Layered Coding for Mobile Cloud Gaming Proceedings of International Workshop on Massively Multiuser Virtual Environments, (1-6)
  1329. ACM
    Bellogín A, Castells P and Cantador I (2014). Neighbor Selection and Weighting in User-Based Collaborative Filtering, ACM Transactions on the Web, 8:2, (1-30), Online publication date: 1-Mar-2014.
  1330. ACM
    Ada A, Chattopadhyay A, Cook S, Fontes L, Koucký M and Pitassi T (2014). The Hardness of Being Private, ACM Transactions on Computation Theory, 6:1, (1-24), Online publication date: 1-Mar-2014.
  1331. Biryukov A, Nakahara J and Yıldırım H (2014). Differential entropy analysis of the IDEA block cipher, Journal of Computational and Applied Mathematics, 259, (561-570), Online publication date: 1-Mar-2014.
  1332. Sachlas A and Papaioannou T (2014). Residual and Past Entropy in Actuarial Science and Survival Models, Methodology and Computing in Applied Probability, 16:1, (79-99), Online publication date: 1-Mar-2014.
  1333. Gibson J and Hu J (2014). Rate Distortion Bounds for Voice and Video, Foundations and Trends in Communications and Information Theory, 10:4, (379-514), Online publication date: 18-Feb-2014.
  1334. Jensen J and Taal C (2014). Speech Intelligibility Prediction Based on Mutual Information, IEEE/ACM Transactions on Audio, Speech and Language Processing, 22:2, (430-440), Online publication date: 1-Feb-2014.
  1335. ACM
    Fischer E, Goldhirsh Y and Lachish O Partial tests, universal tests and decomposability Proceedings of the 5th conference on Innovations in theoretical computer science, (483-500)
  1336. ACM
    Haramaty E and Sudan M Deterministic compression with uncertain priors Proceedings of the 5th conference on Innovations in theoretical computer science, (377-386)
  1337. ACM
    Brandão F, Harrow A, Lee J and Peres Y Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements Proceedings of the 5th conference on Innovations in theoretical computer science, (183-194)
  1338. Piliouras G and Shamma J Optimization despite chaos Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (861-873)
  1339. Szabó Z (2014). Information theoretical estimators toolbox, The Journal of Machine Learning Research, 15:1, (283-287), Online publication date: 1-Jan-2014.
  1340. Su Z, Wei H and Wei S (2014). Crowd event perception based on spatiotemporal Weber field, Journal of Electrical and Computer Engineering, 2014, (1-1), Online publication date: 1-Jan-2014.
  1341. ACM
    Li B and Hoi S (2014). Online portfolio selection, ACM Computing Surveys, 46:3, (1-36), Online publication date: 1-Jan-2014.
  1342. Ferreira A and Figueiredo M (2014). Incremental filter and wrapper approaches for feature discretization, Neurocomputing, 123, (60-74), Online publication date: 1-Jan-2014.
  1343. Elalami M (2014). A new matching strategy for content based image retrieval system, Applied Soft Computing, 14, (407-418), Online publication date: 1-Jan-2014.
  1344. Pati S, Das A and Ghosh A Gene Selection Using Multi-objective Genetic Algorithm Integrating Cellular Automata and Rough Set Theory Proceedings of the 4th International Conference on Swarm, Evolutionary, and Memetic Computing - Volume 8298, (144-155)
  1345. Hassanin M, Fresnedo O, Garcia-Frias J and Castedo L Analog Joint Source Channel Coding for Gaussian Multiple Access Channels Proceedings of the 6th International Workshop on Multiple Access Communcations - Volume 8310, (21-32)
  1346. ACM
    Ahmedin A, Pandit K, Ghosal D and Ghosh A Content and buffer aware scheduling for video delivery over LTE Proceedings of the 2013 workshop on Student workhop, (43-46)
  1347. Shang C, Li M, Feng S, Jiang Q and Fan J (2013). Feature selection via maximizing global information gain for text classification, Knowledge-Based Systems, 54:C, (298-309), Online publication date: 1-Dec-2013.
  1348. ACM
    Chen X, Mu Y, Liu H, Yan S, Rui Y and Chua T (2013). Large-scale multilabel propagation based on efficient sparse graph construction, ACM Transactions on Multimedia Computing, Communications, and Applications, 10:1, (1-20), Online publication date: 1-Dec-2013.
  1349. Hashorva E, Macci C and Pacchiarotti B (2013). Large Deviations for Proportions of Observations Which Fall in Random Sets Determined by Order Statistics, Methodology and Computing in Applied Probability, 15:4, (875-896), Online publication date: 1-Dec-2013.
  1350. Jiang J and Bai Q Provenance-Based Trust Estimation for Service Composition Proceedings of the 26th Australasian Joint Conference on AI 2013: Advances in Artificial Intelligence - Volume 8272, (68-73)
  1351. Kasick M, Narasimhan P and Harms K Making problem diagnosis work for large-scale, production storage systems Proceedings of the 27th USENIX conference on Large Installation System Administration, (27-44)
  1352. Kasick M, Narasimhan P and Harms K Making problem diagnosiswork for large-scale, production storage systems Proceedings of the 27th international conference on Large Installation System Administration, (27-44)
  1353. ACM
    Pouliopoulou M, Gkotsis G and Makris C Alternate views of graph clusterings based on thresholds Proceedings of the sixth workshop on Ph.D. students in information and knowledge management, (19-26)
  1354. ACM
    Tan C, Chi E, Huffaker D, Kossinets G and Smola A Instant foodie Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1127-1136)
  1355. ACM
    Krstovski K, Smith D, Wallach H and McGregor A Efficient Nearest-Neighbor Search in the Probability Simplex Proceedings of the 2013 Conference on the Theory of Information Retrieval, (101-108)
  1356. Lu L, Jian B, Wu D and Wolf M A New Algorithm of Electronic Cleansing for Weak Faecal-Tagging CT Colonography Proceedings of the 4th International Workshop on Machine Learning in Medical Imaging - Volume 8184, (57-65)
  1357. ACM
    Rétvári G, Tapolcai J, Kőrösi A, Majdán A and Heszberger Z (2013). Compressing IP forwarding tables, ACM SIGCOMM Computer Communication Review, 43:4, (111-122), Online publication date: 19-Sep-2013.
  1358. Delfosse N and Zémor G (2013). Upper bounds on the rate of low density stabilizer codes for the quantum erasure channel, Quantum Information & Computation, 13:9-10, (793-826), Online publication date: 1-Sep-2013.
  1359. Ma H, Zhao W and Shi Z (2013). A nonnegative matrix factorization framework for semi-supervised document clustering with dual constraints, Knowledge and Information Systems, 36:3, (629-651), Online publication date: 1-Sep-2013.
  1360. Kepski M and Kwolek B Unobtrusive Fall Detection at Home Using Kinect Sensor Proceedings, Part I, of the 15th International Conference on Computer Analysis of Images and Patterns - Volume 8047, (457-464)
  1361. Pereira Nunes B, Mera A, Casanova M, Fetahu B, P. Paes Leme L and Dietze S Complex Matching of RDF Datatype Properties Proceedings of the 24th International Conference on Database and Expert Systems Applications - Volume 8055, (195-208)
  1362. ACM
    Baratchi M, Meratnia N and Havinga P On the use of mobility data for discovery and description of social ties Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1229-1236)
  1363. ACM
    Nguyen N, Alim M, Shen Y and Thai M Assessing network vulnerability in a community structure point of view Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (231-235)
  1364. ACM
    Rétvári G, Tapolcai J, Kőrösi A, Majdán A and Heszberger Z Compressing IP forwarding tables Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (111-122)
  1365. ACM
    Chen Y, Liu W, Yi J, Schwaighofer A and Yan T Query clustering based on bid landscape for sponsored search auction optimization Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1150-1158)
  1366. ACM
    Abrahao B, Chierichetti F, Kleinberg R and Panconesi A Trace complexity of network inference Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (491-499)
  1367. ACM
    Karamshuk D, Noulas A, Scellato S, Nicosia V and Mascolo C Geo-spotting Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (793-801)
  1368. Anselmi J, D'Auria B and Walton N (2013). Closed Queueing Networks Under Congestion, Mathematics of Operations Research, 38:3, (469-491), Online publication date: 1-Aug-2013.
  1369. Pessiot J, Kim H and Fujibuchi W (2013). Pairwise ranking component analysis, Knowledge and Information Systems, 36:2, (459-487), Online publication date: 1-Aug-2013.
  1370. ACM
    Golbus P and Aslam J A mutual information-based framework for the analysis of information retrieval systems Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, (683-692)
  1371. Costa Junior I Data mining with ant colony algorithms Proceedings of the 9th international conference on Intelligent Computing Theories and Technology, (30-38)
  1372. Lee S, Belkasim S and Zhang Y Multi-document text summarization using topic model and fuzzy logic Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (159-168)
  1373. ACM
    Martins J and Delbem A The influence of linkage-learning in the linkage-tree GA when solving multidimensional knapsack problems Proceedings of the 15th annual conference on Genetic and evolutionary computation, (821-828)
  1374. Friedman A and Goldberger J Information theoretic pairwise clustering Proceedings of the Second international conference on Similarity-Based Pattern Recognition, (106-119)
  1375. Nielsen F Pattern learning and recognition on statistical manifolds Proceedings of the Second international conference on Similarity-Based Pattern Recognition, (1-25)
  1376. ACM
    Yoo S, Harman M and Clark D (2013). Fault localization prioritization, ACM Transactions on Software Engineering and Methodology, 22:3, (1-29), Online publication date: 1-Jul-2013.
  1377. ACM
    Huang X and Rubin I (2013). Capacity- and energy-aware activation of sensor nodes for area phenomenon reproduction using wireless network transport, ACM Transactions on Sensor Networks, 9:4, (1-24), Online publication date: 1-Jul-2013.
  1378. Huy T, Shao H, Tong B and Suzuki E (2013). A feature-free and parameter-light multi-task clustering framework, Knowledge and Information Systems, 36:1, (251-276), Online publication date: 1-Jul-2013.
  1379. Bramon R, Ruiz M, Bardera A, Boada I, Feixas M and Sbert M An information-theoretic observation channel for volume visualization Proceedings of the 15th Eurographics Conference on Visualization, (411-420)
  1380. Li P, Pan H, Li J, Han Q, Xie X and Zhang Z A novel model for medical image similarity retrieval Proceedings of the 14th international conference on Web-Age Information Management, (595-606)
  1381. ACM
    Braverman M and Moitra A An information complexity approach to extended formulations Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (161-170)
  1382. ACM
    Braverman M, Garg A, Pankratov D and Weinstein O From information to exact communication Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (151-160)
  1383. ACM
    Jayram T and Woodruff D (2013). Optimal Bounds for Johnson-Lindenstrauss Transforms and Streaming Problems with Subconstant Error, ACM Transactions on Algorithms, 9:3, (1-17), Online publication date: 1-Jun-2013.
  1384. Kostal L, Lansky P and Pokora O (2013). Measures of statistical dispersion based on Shannon and Fisher information concepts, Information Sciences: an International Journal, 235, (214-223), Online publication date: 1-Jun-2013.
  1385. ACM
    Kim Y, Park Y and Shim K DIGTOBI Proceedings of the 22nd international conference on World Wide Web, (691-702)
  1386. Cao N, Low K and Dolan J Multi-robot informative path planning for active sensing of environmental phenomena Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (7-14)
  1387. ACM
    Kumar S, Morstatter F, Zafarani R and Liu H Whom should I follow? Proceedings of the 24th ACM Conference on Hypertext and Social Media, (139-147)
  1388. ACM
    Petkov V, Rajagopal R and Obraczka K (2013). Characterizing per-application network traffic using entropy, ACM Transactions on Modeling and Computer Simulation, 23:2, (1-25), Online publication date: 1-May-2013.
  1389. Zheng L, Li L, Hong W and Li T (2013). PENETRATE, Expert Systems with Applications: An International Journal, 40:6, (2127-2136), Online publication date: 1-May-2013.
  1390. ACM
    Oulasvirta A, Roos T, Modig A and Leppänen L Information capacity of full-body movements Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1289-1298)
  1391. ACM
    Le Ny J and Pappas G Privacy-preserving release of aggregate dynamic models Proceedings of the 2nd ACM international conference on High confidence networked systems, (49-56)
  1392. ACM
    Zhao Y, Patwari N, Phillips J and Venkatasubramanian S Radio tomographic imaging and tracking of stationary and moving people via kernel distance Proceedings of the 12th international conference on Information processing in sensor networks, (229-240)
  1393. ACM
    Jaiswal A, Miller D and Mitra P (2013). Schema matching and embedded value mapping for databases with opaque column names and mixed continuous and discrete-valued data fields, ACM Transactions on Database Systems, 38:1, (1-34), Online publication date: 1-Apr-2013.
  1394. Lippincott T, Rimell L, Verspoor K and Korhonen A (2013). Methodological Review, Journal of Biomedical Informatics, 46:2, (212-227), Online publication date: 1-Apr-2013.
  1395. ACM
    Kucerova J, Varhanikova I and Cernekova Z Best view methods suitability for different types of objects Proceedings of the 28th Spring Conference on Computer Graphics, (55-61)
  1396. ACM
    Zohar H, Liebeskind C, Schler J and Dagan I (2013). Automatic thesaurus construction for cross generation corpus, Journal on Computing and Cultural Heritage , 6:1, (1-19), Online publication date: 1-Mar-2013.
  1397. ACM
    Li B, Hoi S, Zhao P and Gopalkrishnan V (2013). Confidence Weighted Mean Reversion Strategy for Online Portfolio Selection, ACM Transactions on Knowledge Discovery from Data, 7:1, (1-38), Online publication date: 1-Mar-2013.
  1398. Raskhodnikova S, Ron D, Rubinfeld R and Smith A (2013). Sublinear Algorithms for Approximating String Compressibility, Algorithmica, 65:3, (685-709), Online publication date: 1-Mar-2013.
  1399. ACM
    Xu L, Zhan Z, Xu S and Ye K Cross-layer detection of malicious websites Proceedings of the third ACM conference on Data and application security and privacy, (141-152)
  1400. ACM
    Liu J, Zhang F, Song X, Song Y, Lin C and Hon H What's in a name? Proceedings of the sixth ACM international conference on Web search and data mining, (495-504)
  1401. Cavagnaro D, Gonzalez R, Myung J and Pitt M (2013). Optimal Decision Stimuli for Risky Choice Experiments, Management Science, 59:2, (358-375), Online publication date: 1-Feb-2013.
  1402. ACM
    Batu T, Fortnow L, Rubinfeld R, Smith W and White P (2013). Testing Closeness of Discrete Distributions, Journal of the ACM, 60:1, (1-25), Online publication date: 1-Feb-2013.
  1403. Pernkopf F and Wohlmayr M (2013). Stochastic margin-based structure learning of Bayesian network classifiers, Pattern Recognition, 46:2, (464-471), Online publication date: 1-Feb-2013.
  1404. BellogíN A, Cantador I and Castells P (2013). A comparative study of heterogeneous item recommendations in social systems, Information Sciences: an International Journal, 221, (142-169), Online publication date: 1-Feb-2013.
  1405. Mishra M and Prakash H (2013). Bipartite coherent-state quantum key distribution with strong reference pulse, Quantum Information Processing, 12:2, (907-920), Online publication date: 1-Feb-2013.
  1406. Cripps M, Ely J, Mailath G and Samuelson L (2013). Common learning with intertemporal dependence, International Journal of Game Theory, 42:1, (55-98), Online publication date: 1-Feb-2013.
  1407. Biondi F, Legay A, Malacaria P and Wąsowski A Quantifying Information Leakage of Randomized Protocols Proceedings of the 14th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 7737, (68-87)
  1408. Malyutov M Search for sparse active inputs Information Theory, Combinatorics, and Search Theory, (609-647)
  1409. Heup C L-identification for uniformly distributed sources and the q-ary identification entropy of second order Information Theory, Combinatorics, and Search Theory, (11-43)
  1410. Coluccia A, D'Alconzo A and Ricciato F Distribution-Based anomaly detection in network traffic DataTraffic Monitoring and Analysis, (202-216)
  1411. Pola A, Cousseau J, Agazzi O and Hueda M (2013). A low-complexity decision feedforward equalizer architecture for high-speed receivers on highly dispersive channels, Journal of Control Science and Engineering, 2013, (3-3), Online publication date: 1-Jan-2013.
  1412. Eiland E and Liebrock L (2013). Efficacious end user measures part 1, Advances in Artificial Intelligence, 2013, (2-2), Online publication date: 1-Jan-2013.
  1413. ACM
    Corazza A, Lavelli A and Satta G (2013). An information-theoretic measure to evaluate parsing difficulty across treebanks, ACM Transactions on Speech and Language Processing , 9:4, (1-31), Online publication date: 1-Jan-2013.
  1414. ACM
    Mhamdi T, Hasan O and Tahar S (2013). Formalization of Measure Theory and Lebesgue Integration for Probabilistic Analysis in HOL, ACM Transactions on Embedded Computing Systems, 12:1, (1-23), Online publication date: 1-Jan-2013.
  1415. Muraro D, Vob U, Wilson M, Bennett M, Byrne H, De Smet I, Hodgman C and King J (2013). Inference of the Genetic Network Regulating Lateral Root Initiation in Arabidopsis thaliana, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:1, (50-60), Online publication date: 1-Jan-2013.
  1416. Xu S and Wilde M (2013). Sequential, successive, and simultaneous decoders for entanglement-assisted classical communication, Quantum Information Processing, 12:1, (641-683), Online publication date: 1-Jan-2013.
  1417. Röck A and Nyberg K (2013). Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers, Designs, Codes and Cryptography, 66:1-3, (175-193), Online publication date: 1-Jan-2013.
  1418. Skaba W Binary space partitioning as intrinsic reward Proceedings of the 5th international conference on Artificial General Intelligence, (282-291)
  1419. ACM
    Ranjan G, Zang H, Zhang Z and Bolot J (2012). Are call detail records biased for sampling human mobility?, ACM SIGMOBILE Mobile Computing and Communications Review, 16:3, (33-44), Online publication date: 5-Dec-2012.
  1420. Feng Y, Yuen P and Lim M Distance entropy as an information measure for binary biometric representation Proceedings of the 7th Chinese conference on Biometric Recognition, (332-339)
  1421. ACM
    Houshmand S and Aggarwal S Building better passwords using probabilistic techniques Proceedings of the 28th Annual Computer Security Applications Conference, (109-118)
  1422. Shih S and Chen K (2012). Compressed sensing construction of spectrum map for routing in cognitive radio networks, Wireless Communications & Mobile Computing, 12:18, (1592-1607), Online publication date: 1-Dec-2012.
  1423. Guo J and Wang Z Linear cryptanalysis and security tradeoff of block ciphering systems with channel errors Proceedings of the 6th international conference on Network and System Security, (405-416)
  1424. Mhamdi T, Hasan O and Tahar S Quantitative analysis of information flow using theorem proving Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering, (119-134)
  1425. ACM
    Weimer J, Ahmadi S, Araujo J, Mele F, Papale D, Shames I, Sandberg H and Johansson K Active actuator fault detection and diagnostics in HVAC systems Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, (107-114)
  1426. Tsytsarau M, Bonchi F, Gionis A and Palpanas T (2012). Diverse dimension decomposition for itemset spaces, Knowledge and Information Systems, 33:2, (447-473), Online publication date: 1-Nov-2012.
  1427. ACM
    Li T, Chubak P, Lakshmanan L and Pottinger R Efficient extraction of ontologies from domain specific text corpora Proceedings of the 21st ACM international conference on Information and knowledge management, (1537-1541)
  1428. ACM
    Chen Y People search and activity mining in large-scale community-contributed photos Proceedings of the 20th ACM international conference on Multimedia, (1385-1388)
  1429. ACM
    Makke A, Salem O, Assaad M, Moungla H and Mehaoua A Flooding attacks detection in backbone traffic using power divergence Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (15-20)
  1430. ACM
    Le Thi H and Safavi-Naini R An information theoretic framework for web inference detection Proceedings of the 5th ACM workshop on Security and artificial intelligence, (25-36)
  1431. Zhang W and Wu S Neural population decoding in short-time windows Proceedings of the third Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering, (56-63)
  1432. ACM
    Chaitankar V, Ghosh P, Elasri M, Gust K and Perkins E Genome scale inference of transcriptional regulatory networks using mutual information on complex interactions Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (643-648)
  1433. ACM
    Clarkson K, Hazan E and Woodruff D (2012). Sublinear optimization for machine learning, Journal of the ACM, 59:5, (1-49), Online publication date: 1-Oct-2012.
  1434. Cui N, Tang J and Schultz S Differential entropy of multivariate neural spike trains Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part I, (280-287)
  1435. Xu L Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus Revised Selected Papers of the 7th International Symposium on Trustworthy Global Computing - Volume 8191, (198-212)
  1436. ACM
    Barni M, Fontani M and Tondi B A universal technique to hide traces of histogram-based image manipulations Proceedings of the on Multimedia and security, (97-104)
  1437. Kurowicka D (2012). Conditionalization of Copula-Based Models, Decision Analysis, 9:3, (219-230), Online publication date: 1-Sep-2012.
  1438. Dong G, Pan Y, Xie N, Varanasi C and Zhang T (2012). Estimating information-theoretical NAND flash memory storage capacity and its implication to memory system design space exploration, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20:9, (1705-1714), Online publication date: 1-Sep-2012.
  1439. FarríS O, Gracia I, MartíN S and Padró C (2012). Linear threshold multisecret sharing schemes, Information Processing Letters, 112:17-18, (667-673), Online publication date: 1-Sep-2012.
  1440. Morgan R and Gallagher M Length scale for characterising continuous optimization problems Proceedings of the 12th international conference on Parallel Problem Solving from Nature - Volume Part I, (407-416)
  1441. Iclănzan D A multi-parent search operator for bayesian network building Proceedings of the 12th international conference on Parallel Problem Solving from Nature - Volume Part I, (246-255)
  1442. Hodnefjell S and Costa Junior I Classification rule discovery with ant colony optimization algorithm Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (678-687)
  1443. Mandyam S and Sridhar U Community Learning from External Information Sources Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (1329-1334)
  1444. Bellare M, Tessaro S and Vardy A Semantic Security for the Wiretap Channel Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (294-311)
  1445. Matusevych S, Smola A and Ahmed A Hokusai — sketching streams in real time Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (594-603)
  1446. Hazan T, Peng J and Shashua A Tightening fractional covering upper bounds on the partition function for high-order region graphs Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (356-366)
  1447. ACM
    Bellala G, Marwah M, Arlitt M, Lyon G and Bash C Following the electrons Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (994-1002)
  1448. ACM
    Al Bawab Z, Mills G and Crespo J Finding trending local topics in search queries for personalization of a recommendation system Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (397-405)
  1449. Bennett C (2012). Utilizing RxNorm to support practical computing applications, Journal of Biomedical Informatics, 45:4, (634-641), Online publication date: 1-Aug-2012.
  1450. Pérez García-Plaza A, Zubiaga A, Fresno V and Martínez R (2012). Reorganizing clouds, Expert Systems with Applications: An International Journal, 39:10, (9483-9493), Online publication date: 1-Aug-2012.
  1451. Jansson J, Sadakane K and Sung W CRAM Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (510-521)
  1452. Stankovski P, Hell M and Johansson T Analysis of xorrotation with application to an HC-128 variant Proceedings of the 17th Australasian conference on Information Security and Privacy, (419-425)
  1453. ACM
    Iclanzan D Higher-order linkage learning in the ECGA Proceedings of the 14th annual conference on Genetic and evolutionary computation, (265-272)
  1454. Abuhaija B (2012). Performance analysis of LTE multiuser flat downlink power spectrum and radio resources scheduling, Journal of High Speed Networks, 18:3, (173-184), Online publication date: 1-Jul-2012.
  1455. ACM
    Wang S, Schuurmans D and Zhao Y (2012). The Latent Maximum Entropy Principle, ACM Transactions on Knowledge Discovery from Data, 6:2, (1-42), Online publication date: 1-Jul-2012.
  1456. Barrera F, Lumbreras F and Sappa A Evaluation of similarity functions in multimodal stereo Proceedings of the 9th international conference on Image Analysis and Recognition - Volume Part I, (320-329)
  1457. Madsen J, Jensen B and Larsen J Predictive Modeling of Expressed Emotions in Music Using Pairwise Comparisons Revised Selected Papers of the 9th International Symposium on From Sounds to Music and Emotions - Volume 7900, (253-277)
  1458. ACM
    Abdullah A, Moeller J and Venkatasubramanian S Approximate bregman near neighbors in sublinear time Proceedings of the twenty-eighth annual symposium on Computational geometry, (31-40)
  1459. Yang X, Wang M, Fang L, Yue L and Lv Y Research on domain-specific features clustering based spectral clustering Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II, (84-92)
  1460. Adeel Nawab R, Stevenson M and Clough P Detecting text reuse with modified and weighted n-grams Proceedings of the First Joint Conference on Lexical and Computational Semantics - Volume 1: Proceedings of the main conference and the shared task, and Volume 2: Proceedings of the Sixth International Workshop on Semantic Evaluation, (54-58)
  1461. Gutman A and Nisan N Fair allocation without trade Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (719-728)
  1462. ACM
    Nissim K, Orlandi C and Smorodinsky R Privacy-aware mechanism design Proceedings of the 13th ACM Conference on Electronic Commerce, (774-789)
  1463. Das D and Smith N Graph-based lexicon expansion with sparsity-inducing penalties Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (677-687)
  1464. Haiduc S, Bavota G, Oliveto R, Marcus A and De Lucia A Evaluating the specificity of text retrieval queries to support software engineering tasks Proceedings of the 34th International Conference on Software Engineering, (1273-1276)
  1465. Liao C, Lee W and Lai S (2012). A Flexible PCB Inspection System Based on Statistical Learning, Journal of Signal Processing Systems, 67:3, (279-290), Online publication date: 1-Jun-2012.
  1466. Park Y, Qi Z, Chari S and Molloy I Generating balanced classifier-independent training samples from unlabeled data Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (266-281)
  1467. ACM
    Xu Z, Ke Y, Wang Y, Cheng H and Cheng J A model-based approach to attributed graph clustering Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, (505-516)
  1468. ACM
    Woodruff D and Zhang Q Tight bounds for distributed functional monitoring Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (941-960)
  1469. ACM
    Hassanieh H, Indyk P, Katabi D and Price E Nearly optimal sparse fourier transform Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (563-578)
  1470. ACM
    Braverman M Interactive information complexity Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (505-524)
  1471. Olszewski D (2012). Employing Kullback-Leibler divergence and Latent Dirichlet Allocation for fraud detection in telecommunications, Intelligent Data Analysis, 16:3, (467-485), Online publication date: 1-May-2012.
  1472. Beaudry N and Renner R (2012). An intuitive proof of the data processing inequality, Quantum Information & Computation, 12:5-6, (432-441), Online publication date: 1-May-2012.
  1473. ACM
    Ver Steeg G and Galstyan A Information transfer in social media Proceedings of the 21st international conference on World Wide Web, (509-518)
  1474. Tan B, Duan L, Gou C, Huang S, Fang Y, Zhao X and Tang C Detection of high-risk zones and potential infected neighbors from infectious disease monitoring data Proceedings of the 17th international conference on Database Systems for Advanced Applications, (262-273)
  1475. Hu H, Sha C, Wang X and Zhou A Estimate unlabeled-data-distribution for semi-supervised PU learning Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications, (22-33)
  1476. Pendse G (2012). PMOG, Neural Networks, 28:C, (40-60), Online publication date: 1-Apr-2012.
  1477. LaValle S (2012). Sensing and Filtering, Foundations and Trends in Robotics, 1:4, (253-372), Online publication date: 1-Apr-2012.
  1478. Lanzagorta M and Martin K (2012). Teleportation with an imperfect state, Theoretical Computer Science, 430, (117-125), Online publication date: 1-Apr-2012.
  1479. Meo R, Bachar D and Ienco D (2012). LODE, Pattern Recognition, 45:4, (1409-1425), Online publication date: 1-Apr-2012.
  1480. Liu Q and Dong G (2012). CPCQ, Pattern Recognition, 45:4, (1739-1748), Online publication date: 1-Apr-2012.
  1481. Szabó Z, PóCzos B and Lrincz A (2012). Separation theorem for independent subspace analysis and its consequences, Pattern Recognition, 45:4, (1782-1791), Online publication date: 1-Apr-2012.
  1482. Tam T, Ferreira A and Lourenço A Automatic foldering of email messages Proceedings of the 34th European conference on Advances in Information Retrieval, (232-243)
  1483. ACM
    Chen S, Zhou S and Bhowmick S Integrating historical noisy answers for improving data utility under differential privacy Proceedings of the 15th International Conference on Extending Database Technology, (62-73)
  1484. ACM
    Gong F, Basir-Kazeruni S, Dolecek L and He L A fast estimation of SRAM failure rate using probability collectives Proceedings of the 2012 ACM international symposium on International Symposium on Physical Design, (41-48)
  1485. ACM
    Cao Z, Deng H, Guan Z and Chen Z (2012). Information-theoretic modeling of false data filtering schemes in wireless sensor networks, ACM Transactions on Sensor Networks, 8:2, (1-19), Online publication date: 1-Mar-2012.
  1486. ACM
    Ghandour W, Akkary H and Masri W (2012). Leveraging Strength-Based Dynamic Information Flow Analysis to Enhance Data Value Prediction, ACM Transactions on Architecture and Code Optimization, 9:1, (1-33), Online publication date: 1-Mar-2012.
  1487. Saad M (2012). On optimal spectrum-efficient routing in TDMA and FDMA multihop wireless networks, Computer Communications, 35:5, (628-636), Online publication date: 1-Mar-2012.
  1488. Kokalj-Filipović S and Soljanin E (2012). Suppressing the Cliff Effect in Video Reproduction Quality, Bell Labs Technical Journal, 16:4, (171-185), Online publication date: 1-Mar-2012.
  1489. ACM
    Shim E, Singla V and Krishnaswamy V Application frameworks and methods for assisting tracking of actionable items Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-7)
  1490. ACM
    Rosales R, Cheng H and Manavoglu E Post-click conversion modeling and analysis for non-guaranteed delivery display advertising Proceedings of the fifth ACM international conference on Web search and data mining, (293-302)
  1491. Olszewski D (2012). A probabilistic approach to fraud detection in telecommunications, Knowledge-Based Systems, 26, (246-258), Online publication date: 1-Feb-2012.
  1492. Avin C, Cohen A, Haddad Y, Kantor E, Lotker Z, Parter M and Peleg D SINR diagram with interference cancellation Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (502-515)
  1493. Phillips J, Verbin E and Zhang Q Lower bounds for number-in-hand multiparty communication complexity, made easy Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (486-501)
  1494. Henry C Perceptual indiscernibility, rough sets, descriptively near sets, and image analysis Transactions on Rough Sets XV, (41-121)
  1495. Youmaran R and Adler A (2012). Measuring biometric sample quality in terms of biometric feature information in iris images, Journal of Electrical and Computer Engineering, 2012, (22-22), Online publication date: 1-Jan-2012.
  1496. Wellock C and Reeke G (2012). Quantitative tools for examining the vocalizations of juvenile songbirds, Computational Intelligence and Neuroscience, 2012, (2-2), Online publication date: 1-Jan-2012.
  1497. Kapnadak V, Senel M and Coyle E (2012). Distributed iterative quantization for interference characterization in wireless networks, Digital Signal Processing, 22:1, (96-105), Online publication date: 1-Jan-2012.
  1498. ACM
    Sbert M, Feixas M, Viola I, Rigau J and Chover M Information theory in computer graphics and visualization SIGGRAPH Asia 2011 Courses, (1-58)
  1499. Ranellucci S, Tapp A, Winkler S and Wullschleger J On the efficiency of bit commitment reductions Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (520-537)
  1500. Wei D, Zhu J, Zheng W and Lai J Main dialect identification in Mainland China, Hong Kong and Taiwan Proceedings of the 6th Chinese conference on Biometric recognition, (186-194)
  1501. ACM
    Cheng A, Chen Y, Huang Y, Hsu W and Liao H Personalized travel recommendation by mining people attributes from community-contributed photos Proceedings of the 19th ACM international conference on Multimedia, (83-92)
  1502. ACM
    Lemmouchi S, Haddad M and Kheddouci H Study of robustness of community emerged from exchanges in networks communication Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (189-196)
  1503. ACM
    She J, Yang E and Ho P Coded wireless video broadcast/ multicast Proceedings of the 6th ACM workshop on Wireless multimedia networking and computing, (17-24)
  1504. ACM
    Koch T On bandlimited fading channels at high SNR Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  1505. ACM
    Baldi M, Bianchi M, Chiaraluce F, Rosenthal J and Schipani D On fuzzy syndrome hashing with LDPC coding Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  1506. ACM
    Bhamidipati N and Kota N A diversity measure leveraging domain specific auxiliary information Proceedings of the 20th ACM international conference on Information and knowledge management, (2213-2216)
  1507. ACM
    Cardoso B and Magalhães J Google, bing and a new perspective on ranking similarity Proceedings of the 20th ACM international conference on Information and knowledge management, (1933-1936)
  1508. ACM
    Liu H, Wu X and Zhang S Feature selection using hierarchical feature clustering Proceedings of the 20th ACM international conference on Information and knowledge management, (979-984)
  1509. ACM
    Karimzadehgan M and Zhai C Improving retrieval accuracy of difficult queries through generalizing negative document language models Proceedings of the 20th ACM international conference on Information and knowledge management, (27-36)
  1510. Lin H, Koul N and Honavar V Learning relational bayesian classifiers from RDF data Proceedings of the 10th international conference on The semantic web - Volume Part I, (389-404)
  1511. ACM
    Mishra A and Venkitasubramaniam P (2011). Dummy rate analysis of buffer constrained chaum mix, ACM SIGCOMM Computer Communication Review, 41:4, (408-409), Online publication date: 22-Oct-2011.
  1512. ACM
    Johnson A, Syverson P, Dingledine R and Mathewson N Trust-based anonymous communication Proceedings of the 18th ACM conference on Computer and communications security, (175-186)
  1513. Etehadtavakol M, Ng E, Lucas C, Sadri S and Gheissari N (2011). Estimating the Mutual Information Between Bilateral Breast in Thermograms Using Nonparametric Windows, Journal of Medical Systems, 35:5, (959-967), Online publication date: 1-Oct-2011.
  1514. Han L, Hancock E and Wilson R An information theoretic approach to learning generative graph prototypes Proceedings of the First international conference on Similarity-based pattern recognition, (133-148)
  1515. Carpentieri B LZ-based adaptive compression for images Proceedings of the 2nd international conference on Applied informatics and computing theory, (88-91)
  1516. Sun J, Chen J, Yu X and Zhong N ExpertRec Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (385-392)
  1517. ACM
    Anceaume E, Busnel Y and Gambs S Characterizing the adversarial power in uniform and ergodic node sampling Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing, (12-19)
  1518. ACM
    Jakubczak S and Katabi D A cross-layer design for scalable mobile video Proceedings of the 17th annual international conference on Mobile computing and networking, (289-300)
  1519. ACM
    Aditya S and Katti S FlexCast Proceedings of the 17th annual international conference on Mobile computing and networking, (277-288)
  1520. Avni U, Greenspan H and Goldberger J X-ray categorization and spatial localization of chest pathologies Proceedings of the 14th international conference on Medical image computing and computer-assisted intervention - Volume Part III, (199-206)
  1521. Hintea D, Brusey J, Gaura E, Beloe N and Bridge D Mutual information-based sensor positioning for car cabin comfort control Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part III, (483-492)
  1522. Chaaban A, Sezgin A, Bandemer B and Paulraj A On Gaussian multiple access channels with interference Proceedings of the 4th international conference on Multiple access communications, (87-96)
  1523. Nguyen P, Sunehag P and Hutter M Feature reinforcement learning in practice Proceedings of the 9th European conference on Recent Advances in Reinforcement Learning, (66-77)
  1524. Rath M and Graening L Modeling design and flow feature interactions for automotive synthesis Proceedings of the 12th international conference on Intelligent data engineering and automated learning, (262-270)
  1525. Picheny M, Nahamoo D, Goel V, Kingsbury B, Ramabhadran B, Rennie S and Saon G (2011). Trends and advances in speech recognition, IBM Journal of Research and Development, 55:5, (447-464), Online publication date: 1-Sep-2011.
  1526. Wu S and Wang S Parameter-free anomaly detection for categorical data Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (112-126)
  1527. Bruni V, Rossi E and Vitulano D Optimal image restoration using HVS-based rate-distortion curves Proceedings of the 14th international conference on Computer analysis of images and patterns - Volume Part II, (269-276)
  1528. Fang Y, Ashrafi M and Ng S Privacy beyond single sensitive attribute Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I, (187-201)
  1529. Bai X, Zhao Y, Huang Y and Luo S Normalized joint mutual information measure for image segmentation evaluation with multiple ground-truth images Proceedings of the 14th international conference on Computer analysis of images and patterns - Volume Part I, (110-117)
  1530. Lakshminarasimhan S, Shah N, Ethier S, Klasky S, Latham R, Ross R and Samatova N Compressing the incompressible with ISABELA Proceedings of the 17th international conference on Parallel processing - Volume Part I, (366-379)
  1531. Lee C, Lu C and Tsai S Computational randomness from generalized hardcore sets Proceedings of the 18th international conference on Fundamentals of computation theory, (78-89)
  1532. Mhamdi T, Hasan O and Tahar S Formalization of entropy measures in HOL Proceedings of the Second international conference on Interactive theorem proving, (233-248)
  1533. ACM
    Bekkerman R and Gavish M High-precision phrase-based document classification on a modern scale Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (231-239)
  1534. ACM
    Mishra A and Venkitasubramaniam P Dummy rate analysis of buffer constrained chaum mix Proceedings of the ACM SIGCOMM 2011 conference, (408-409)
  1535. Maherin I and Liang Q An entropy based approach for sense-through foliage target detection using UWB radar Proceedings of the 6th international conference on Wireless algorithms, systems, and applications, (180-189)
  1536. Epstein S and Betke M An information theoretic representation of agent dynamics as set intersections Proceedings of the 4th international conference on Artificial general intelligence, (72-81)
  1537. Cussens J Online bayesian inference for the parameters of PRISM programs Proceedings of the 21st international conference on Inductive Logic Programming, (14-19)
  1538. Deoras A, Mikolov T and Church K A fast re-scoring strategy to capture long-distance dependencies Proceedings of the Conference on Empirical Methods in Natural Language Processing, (1116-1127)
  1539. Perito D, Castelluccia C, Kaafar M and Manils P How unique and traceable are usernames? Proceedings of the 11th international conference on Privacy enhancing technologies, (1-17)
  1540. ACM
    Jethava V, Calderón-Benavides L, Baeza-Yates R, Bhattacharyya C and Dubhashi D Scalable multi-dimensional user intent identification using tree structured distributions Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, (395-404)
  1541. ACM
    Aktolga E, Ros I and Assogba Y Detecting outlier sections in us congressional legislation Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, (235-244)
  1542. Beal R and Adjeroh D p-Suffix sorting as arithmetic coding Proceedings of the 22nd international conference on Combinatorial Algorithms, (44-56)
  1543. Celikkaya E, Shelton C and Lam W Factored filtering of continuous-time systems Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, (61-68)
  1544. Laarman A, Van De Pol J and Weber M Parallel recursive state compression for free Proceedings of the 18th international SPIN conference on Model checking software, (38-56)
  1545. Karanasou P, Yvon F and Lamel L Measuring the confusability of pronunciations in speech recognition Proceedings of the 9th International Workshop on Finite State Methods and Natural Language Processing, (107-115)
  1546. ACM
    Rafique M, Alrayes N and Khan M Application of evolutionary algorithms in detecting SMS spam at access layer Proceedings of the 13th annual conference on Genetic and evolutionary computation, (1787-1794)
  1547. ACM
    Rubio A and Gámez J Flexible learning of k-dependence Bayesian network classifiers Proceedings of the 13th annual conference on Genetic and evolutionary computation, (1219-1226)
  1548. Epstein S, Missimer E and Betke M An information theoretic mouse trajectory measure Proceedings of the 6th international conference on Universal access in human-computer interaction: users diversity - Volume Part II, (301-309)
  1549. Karbasi A, Ioannidis S and Massoulié L Content search through comparisons Proceedings of the 38th international conference on Automata, languages and programming - Volume Part II, (601-612)
  1550. ACM
    Baykan E, Henzinger M, Marian L and Weber I (2011). A Comprehensive Study of Features and Algorithms for URL-Based Topic Classification, ACM Transactions on the Web, 5:3, (1-29), Online publication date: 1-Jul-2011.
  1551. ACM
    Krause A and Guestrin C (2011). Submodularity and its applications in optimized information gathering, ACM Transactions on Intelligent Systems and Technology, 2:4, (1-20), Online publication date: 1-Jul-2011.
  1552. Jin X, Zhang N and Das G (2011). ASAP, Information Systems, 36:5, (859-880), Online publication date: 1-Jul-2011.
  1553. ACM
    Connor R, Simeoni F, Iakovos M and Moss R Towards a universal information distance for structured data Proceedings of the Fourth International Conference on SImilarity Search and APplications, (69-77)
  1554. Buhmann J Context sensitive information Proceedings of the Third Mexican conference on Pattern recognition, (12-21)
  1555. ACM
    Mathur S, Miller R, Varshavsky A, Trappe W and Mandayam N ProxiMate Proceedings of the 9th international conference on Mobile systems, applications, and services, (211-224)
  1556. Said N, Hammami M and Ghedira K MulO-AntMiner Proceedings of the 2011 international conference on Computational science and its applications - Volume Part II, (594-609)
  1557. Kobdani H, Schütze H, Schiehlen M and Kamp H Bootstrapping coreference resolution using word associations Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, (783-792)
  1558. Hino H and Murata N A computationally efficient information estimator for weighted data Proceedings of the 21st international conference on Artificial neural networks - Volume Part II, (301-308)
  1559. Hou B, Yao Y and Peng S Empirical Study on Entity Interaction Graph of Large-Scale Parallel Simulations Proceedings of the 2011 IEEE Workshop on Principles of Advanced and Distributed Simulation, (1-6)
  1560. ACM
    Fan W, Li J, Ma S, Tang N and Yu W Interaction between record matching and data repairing Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (469-480)
  1561. Brasselet R, Johansson R and Arleo A Isometric coding of spiking haptic signals by peripheral somatosensory neurons Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I, (528-536)
  1562. Carmona P, Sotoca J, Pla F, Phoa F and Dias J Feature selection in regression tasks using conditional mutual information Proceedings of the 5th Iberian conference on Pattern recognition and image analysis, (224-231)
  1563. Ferreira A and Figueiredo M Unsupervised joint feature discretization and selection Proceedings of the 5th Iberian conference on Pattern recognition and image analysis, (200-207)
  1564. Zhang Z and Hancock E Feature Selection for Gender Classification Proceedings of the 5th Iberian conference on Pattern recognition and image analysis, (76-83)
  1565. ACM
    Shafiq M, Ji L, Liu A and Wang J (2011). Characterizing and modeling internet traffic dynamics of cellular devices, ACM SIGMETRICS Performance Evaluation Review, 39:1, (265-276), Online publication date: 7-Jun-2011.
  1566. ACM
    Anandkumar A, Hassidim A and Kelner J (2011). Topology discovery of sparse random graphs with few participants, ACM SIGMETRICS Performance Evaluation Review, 39:1, (253-264), Online publication date: 7-Jun-2011.
  1567. ACM
    Shafiq M, Ji L, Liu A and Wang J Characterizing and modeling internet traffic dynamics of cellular devices Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (305-316)
  1568. ACM
    Anandkumar A, Hassidim A and Kelner J Topology discovery of sparse random graphs with few participants Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (293-304)
  1569. ACM
    De Choudhury M, Counts S and Czerwinski M Identifying relevant social media content Proceedings of the 22nd ACM conference on Hypertext and hypermedia, (161-170)
  1570. ACM
    Khot S and Moshkovitz D NP-hardness of approximately solving linear equations over reals Proceedings of the forty-third annual ACM symposium on Theory of computing, (413-420)
  1571. ACM
    Katz Y, Rimon M, Ziv A and Shaked G Learning microarchitectural behaviors to improve stimuli generation quality Proceedings of the 48th Design Automation Conference, (848-853)
  1572. Lundin R and Lindskog S Entropy of selectively encrypted strings Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (234-243)
  1573. Shani G, Gunawardana A and Meek C (2011). Unsupervised hierarchical probabilistic segmentation of discrete events, Intelligent Data Analysis, 15:4, (483-501), Online publication date: 1-Jun-2011.
  1574. Gross J and Reyer M (2011). Performance prediction for OFDMA systems with dynamic power and subcarrier allocation, Computer Communications, 34:8, (973-984), Online publication date: 1-Jun-2011.
  1575. Poelmans J, Van Hulle M, Viaene S, Elzinga P and Dedene G (2011). Text mining with emergent self organizing maps and multi-dimensional scaling, Applied Soft Computing, 11:4, (3870-3876), Online publication date: 1-Jun-2011.
  1576. Chen L and Hung H (2011). A Two-State Markov-Based Wireless Error Model for Bluetooth Networks, Wireless Personal Communications: An International Journal, 58:4, (657-668), Online publication date: 1-Jun-2011.
  1577. Beimel A Secret-sharing schemes Proceedings of the Third international conference on Coding and cryptology, (11-46)
  1578. ACM
    Oliveto R, Gethers M, Bavota G, Poshyvanyk D and De Lucia A Identifying method friendships to remove the feature envy bad smell (NIER track) Proceedings of the 33rd International Conference on Software Engineering, (820-823)
  1579. Perlaza S, Lasaulce S, Tembine H and Debbah M Learning to use the spectrum in self-configuring heterogenous networks Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (565-571)
  1580. Shen F and Jorswieck E Universal linear pricing for multiple access and broadcast channels under QoS requirements Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (538-547)
  1581. Zander S, Armitage G and Branch P Stealthier inter-packet timing covert channels Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I, (458-470)
  1582. ACM
    Paek T and Hsu B Sampling representative phrase sets for text entry experiments Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2477-2480)
  1583. Zhang L (2011). Proportional response dynamics in the Fisher market, Theoretical Computer Science, 412:24, (2691-2698), Online publication date: 1-May-2011.
  1584. Seraco E and Gomes J (2011). Computation of the complexity of vector quantizers by affine modeling, Signal Processing, 91:5, (1134-1142), Online publication date: 1-May-2011.
  1585. Thatte G, Mitra U and Heidemann J (2011). Parametric methods for anomaly detection in aggregate traffic, IEEE/ACM Transactions on Networking, 19:2, (512-525), Online publication date: 1-Apr-2011.
  1586. ACM
    Bakalov A, Fuxman A, Talukdar P and Chakrabarti S SCAD Proceedings of the 20th international conference on World wide web, (447-456)
  1587. ACM
    Termehchy A and Winslett M (2011). Using structural information in XML keyword search effectively, ACM Transactions on Database Systems, 36:1, (1-39), Online publication date: 1-Mar-2011.
  1588. Ratsaby J (2011). On the sysRatio and its critical point, Mathematical and Computer Modelling: An International Journal, 53:5-6, (939-944), Online publication date: 1-Mar-2011.
  1589. ACM
    Kemkar A and Sontakke T Cooperative ARQ techniques for wireless networks Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (871-874)
  1590. Jayram T and Woodruff D Optimal bounds for Johnson-Lindenstrauss transforms and streaming problems with sub-constant error Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1-10)
  1591. Nielsen F and Nock R Skew jensen-bregman voronoi diagrams Transactions on Computational Science XIV, (102-128)
  1592. Bouraoui I, Chitroub S and Bouridane A Flexible-ICA algorithm for a reliable iris recognition Transactions on large-scale data- and knowledge-centered systems IV, (188-208)
  1593. Wallace R and Wallace D Cultural epigenetics Transactions on computational systems biology XIII, (131-170)
  1594. Makrehchi M and Kamel M (2011). An information theoretic approach to generating fuzzy hypercubes for if-then classifiers, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 22:1, (33-52), Online publication date: 1-Jan-2011.
  1595. Souihli O and Ohtsuki T (2011). Typical set cognitive sensing, ISRN Communications and Networking, 2011, (1-10), Online publication date: 1-Jan-2011.
  1596. Wang J, Wen O, Chen H and Li S (2011). Power allocation between pilot and data symbols for MIMO systems with MMSE detection under MMSE channel estimation, EURASIP Journal on Wireless Communications and Networking, 2011, (1-9), Online publication date: 1-Jan-2011.
  1597. Kaviani S and Krzymień W (2011). Optimal multiuser zero forcing with per-antenna power constraints for network MIMO coordination, EURASIP Journal on Wireless Communications and Networking, 2011, (1-12), Online publication date: 1-Jan-2011.
  1598. Gong L, Bouaynaya N and Schonfeld D (2011). Information-Theoretic Model of Evolution over Protein Communication Channel, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8:1, (143-151), Online publication date: 1-Jan-2011.
  1599. Tang S, Jiang X, Ma L, Zheng Z and Zhang Z Analysis of complexity in interacting diffusion systems by entropy characteristic Proceedings of the 15th WSEAS international conference on Applied mathematics, (128-133)
  1600. Ozonat K and Singhal S Design of negotiation agents based on behavior models Proceedings of the 11th international conference on Web information systems engineering, (308-321)
  1601. Nguyen K and Cao J Relevant answers for XML keyword search Proceedings of the 11th international conference on Web information systems engineering, (216-224)
  1602. Ozonat K and Singhal S Design of Negotiation Agents Based on Behavior Models 11th International Conference on Web Information Systems Engineering --- WISE 2010 - Volume 6488, (308-321)
  1603. Nguyen K and Cao J Relevant Answers for XML Keyword Search 11th International Conference on Web Information Systems Engineering --- WISE 2010 - Volume 6488, (216-224)
  1604. Guo Y Active instance sampling via matrix partition Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 1, (802-810)
  1605. Bellala G, Bhavnani S and Scott C Extensions of Generalized Binary Search to group identification and exponential costs Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 1, (154-162)
  1606. Araya-López M, Buffet O, Thomas V and Charpillet F A POMDP extension with belief-dependent rewards Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 1, (64-72)
  1607. Bickel J (2010). Scoring Rules and Decision Analysis Education, Decision Analysis, 7:4, (346-357), Online publication date: 1-Dec-2010.
  1608. Chuang C and Chen Y (2010). Sensibility of linkage information and effectiveness of estimated distributions, Evolutionary Computation, 18:4, (547-579), Online publication date: 1-Dec-2010.
  1609. Wang C, Fan Y, Thompson J, Skoglund M and Poor H (2010). Approaching the optimal diversity-multiplexing tradeoff in a four-node cooperative network, IEEE Transactions on Wireless Communications, 9:12, (3690-3700), Online publication date: 1-Dec-2010.
  1610. Gohary R and Willink T (2010). Joint routing and resource allocation via superposition coding for wireless data networks, IEEE Transactions on Signal Processing, 58:12, (6387-6399), Online publication date: 1-Dec-2010.
  1611. Dabora R and Goldsmith A (2010). Capacity theorems for discrete, finite-state broadcast channels with feedback and unidirectional receiver cooperation, IEEE Transactions on Information Theory, 56:12, (5958-5983), Online publication date: 1-Dec-2010.
  1612. Koch T and Lapidoth A (2010). On multipath fading channels at high SNR, IEEE Transactions on Information Theory, 56:12, (5945-5957), Online publication date: 1-Dec-2010.
  1613. Liu N, Gündüz D, Goldsmith A and Poor H (2010). Interference channels with correlated receiver side information, IEEE Transactions on Information Theory, 56:12, (5984-5998), Online publication date: 1-Dec-2010.
  1614. Ayaso O, Shah D and Dahleh M (2010). Information theoretic bounds for distributed computation over networks of point-to-point channels, IEEE Transactions on Information Theory, 56:12, (6020-6039), Online publication date: 1-Dec-2010.
  1615. Wu X and Zhang X (2010). Joint color decrosstalk and demosaicking for CFA cameras, IEEE Transactions on Image Processing, 19:12, (3181-3189), Online publication date: 1-Dec-2010.
  1616. Pareschi F, Setti G and Rovatti R (2010). Implementation and testing of high-speed CMOS true random number generators based on chaotic systems, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:12, (3124-3137), Online publication date: 1-Dec-2010.
  1617. Choi C, Kwon U, Kim Y and Im G (2010). Spectral efficient cooperative diversity technique with multi-layered modulation, IEEE Transactions on Communications, 58:12, (3480-3490), Online publication date: 1-Dec-2010.
  1618. Calvo E, Palomar D, Fonollosa J and Vidal J (2010). On the computation of the capacity region of the discrete MAC, IEEE Transactions on Communications, 58:12, (3512-3525), Online publication date: 1-Dec-2010.
  1619. Zhang R (2010). Cooperative multi-cell block diagonalization with per-base-station power constraints, IEEE Journal on Selected Areas in Communications, 28:9, (1435-1445), Online publication date: 1-Dec-2010.
  1620. Wen C and Wong K (2010). On the sum-rate of uplink MIMO cellular systems with amplify-and-forward relaying and collaborative base stations, IEEE Journal on Selected Areas in Communications, 28:9, (1409-1424), Online publication date: 1-Dec-2010.
  1621. Gesbert D, Hanly S, Huang H, Shitz S, Simeone O and Yu W (2010). Multi-cell MIMO cooperative networks, IEEE Journal on Selected Areas in Communications, 28:9, (1380-1408), Online publication date: 1-Dec-2010.
  1622. Deisy C, Baskar S, Ramraj N, Saravanan Koori J and Jeevanandam P (2010). A novel information theoretic-interact algorithm (IT-IN) for feature selection using three machine learning algorithms, Expert Systems with Applications: An International Journal, 37:12, (7589-7597), Online publication date: 1-Dec-2010.
  1623. Dai X (2010). Successive Interference Cancellation Amenable Space---Time Codes with Good Multiplexing-Diversity Tradeoffs, Wireless Personal Communications: An International Journal, 55:4, (645-654), Online publication date: 1-Dec-2010.
  1624. Phithakkitnukoon S, Veloso M, Bento C, Biderman A and Ratti C Taxi-aware map Proceedings of the First international joint conference on Ambient intelligence, (86-95)
  1625. Rigau J, Feixas M and Sbert M Image information in digital photography Proceedings of the 2010 international conference on Computer vision - Volume part II, (122-131)
  1626. ACM
    Namin A and Sridharan M Bayesian reasoning for software testing Proceedings of the FSE/SDP workshop on Future of software engineering research, (349-354)
  1627. ACM
    Magalhães J and Rüger S (2010). An information-theoretic framework for semantic-multimedia retrieval, ACM Transactions on Information Systems, 28:4, (1-32), Online publication date: 1-Nov-2010.
  1628. Wen C (2010). Performance analysis of MIMO cellular network with channel estimation errors, IEEE Transactions on Wireless Communications, 9:11, (3414-3424), Online publication date: 1-Nov-2010.
  1629. Yetis C and Kayran A (2010). A new training protocol for channel state estimation in wireless relay networks, IEEE Transactions on Signal Processing, 58:11, (5950-5955), Online publication date: 1-Nov-2010.
  1630. Chen X and Zhang Z (2010). Exploiting channel angular domain information for precoder design in distributed antenna systems, IEEE Transactions on Signal Processing, 58:11, (5791-5801), Online publication date: 1-Nov-2010.
  1631. Alfano G, De Maio A and Tulino A (2010). A theoretical framework for LMS MIMO communication systems performance analysis, IEEE Transactions on Information Theory, 56:11, (5614-5630), Online publication date: 1-Nov-2010.
  1632. Nam W, Chung S and Lee Y (2010). Capacity of the Gaussian two-way relay channel to within 1/2 bit, IEEE Transactions on Information Theory, 56:11, (5488-5494), Online publication date: 1-Nov-2010.
  1633. Weissman T (2010). Capacity of channels with action-dependent states, IEEE Transactions on Information Theory, 56:11, (5396-5411), Online publication date: 1-Nov-2010.
  1634. Aubry A, Lops M, Tulino A and Venturino L (2010). On MIMO detection under non-gaussian target scattering, IEEE Transactions on Information Theory, 56:11, (5822-5838), Online publication date: 1-Nov-2010.
  1635. Nguyen X, Wainwright M and Jordan M (2010). Estimating divergence functionals and the likelihood ratio by convex risk minimization, IEEE Transactions on Information Theory, 56:11, (5847-5861), Online publication date: 1-Nov-2010.
  1636. Zhang R and Comer M (2010). Rate distortion analysis for spatially scalable video coding, IEEE Transactions on Image Processing, 19:11, (2947-2957), Online publication date: 1-Nov-2010.
  1637. Socheleau F, Laot C and Passerieux J (2010). Concise derivation of scattering function from channel entropy maximization, IEEE Transactions on Communications, 58:11, (3098-3103), Online publication date: 1-Nov-2010.
  1638. Jang Y and Lee Y (2010). Performance analysis of user selection for multiuser two-way amplify-and-forward relay, IEEE Communications Letters, 14:11, (1086-1088), Online publication date: 1-Nov-2010.
  1639. ACM
    Pérez-García T, Pérez-Sancho C and Iñesta J Harmonic and instrumental information fusion for musical genre classification Proceedings of 3rd international workshop on Machine learning and music, (49-52)
  1640. ACM
    Chen X, Mu Y, Yan S and Chua T Efficient large-scale image annotation by probabilistic collaborative multi-label propagation Proceedings of the 18th ACM international conference on Multimedia, (35-44)
  1641. Baignères T, Sepehrdad P and Vaudenay S Distinguishing distributions using Chernoff information Proceedings of the 4th international conference on Provable security, (144-165)
  1642. Koolen W and de Rooij S Switching investments Proceedings of the 21st international conference on Algorithmic learning theory, (239-254)
  1643. Higgs M and Shawe-Taylor J A PAC-bayes bound for tailored density estimation Proceedings of the 21st international conference on Algorithmic learning theory, (148-162)
  1644. Wang X and Zhang X (2010). Linear transmission for rate optimization in MIMO broadcast channels, IEEE Transactions on Wireless Communications, 9:10, (3247-3257), Online publication date: 1-Oct-2010.
  1645. Namazi A, Nourani M and Saquib M (2010). A fault-tolerant interconnect mechanism for NMR nanoarchitectures, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:10, (1433-1446), Online publication date: 1-Oct-2010.
  1646. Janzing D and Schölkopf B (2010). Causal inference using the algorithmic Markov condition, IEEE Transactions on Information Theory, 56:10, (5168-5194), Online publication date: 1-Oct-2010.
  1647. Aeron S, Saligrama V and Zhao M (2010). Information theoretic bounds for compressed sensing, IEEE Transactions on Information Theory, 56:10, (5111-5130), Online publication date: 1-Oct-2010.
  1648. Tian C and Chen J (2010). New coding schemes for the symmetric K -description problem, IEEE Transactions on Information Theory, 56:10, (5344-5365), Online publication date: 1-Oct-2010.
  1649. Dong G, Li S and Zhang T (2010). Using data postcompensation and predistortion to tolerate cell-to-cell interference in MLC NAND flash memory, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:10, (2718-2728), Online publication date: 1-Oct-2010.
  1650. Zhang W and Mitra U (2010). Spectrum shaping, IEEE Transactions on Communications, 58:10, (2971-2983), Online publication date: 1-Oct-2010.
  1651. Chatterjee D, Wong T and Lok T (2010). Cooperative transmission in a wireless relay network based on flow management, IEEE Transactions on Communications, 58:10, (2816-2822), Online publication date: 1-Oct-2010.
  1652. Ng C, Shum K, Sung C and Lok T (2010). Rate allocation for cooperative orthogonal-division channels with dirty-paper coding, IEEE Transactions on Communications, 58:10, (2949-2959), Online publication date: 1-Oct-2010.
  1653. Wen C, Wong K and Chen J (2010). Asymptotic mutual information for Rician MIMO-MA channels with arbitrary inputs, IEEE Transactions on Communications, 58:10, (2782-2788), Online publication date: 1-Oct-2010.
  1654. Pao W and Chen Y (2010). A fast power allocation strategy for OFDM systems, IEEE Transactions on Communications, 58:10, (2765-2769), Online publication date: 1-Oct-2010.
  1655. Douïeb K and Langerman S (2010). Near-Entropy Hotlink Assignments, Algorithmica, 58:2, (221-244), Online publication date: 1-Oct-2010.
  1656. Demiralp Ç and Laidlaw D Tract-based probability densities of diffusivity measures in DT-MRI Proceedings of the 13th international conference on Medical image computing and computer-assisted intervention: Part I, (542-549)
  1657. Bavaud F Euclidean distances, soft and spectral clustering on weighted graphs Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part I, (103-118)
  1658. ACM
    Jakubczak S and Katabi D SoftCast Proceedings of the 2010 ACM workshop on Wireless of the students, by the students, for the students, (9-12)
  1659. ACM
    Magistretti E, Gurewitz O and Knightly E Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks Proceedings of the sixteenth annual international conference on Mobile computing and networking, (305-316)
  1660. ACM
    Liu X, Sheth A, Kaminsky M, Papagiannaki K, Seshan S and Steenkiste P Pushing the envelope of indoor wireless spatial reuse using directional access points and clients Proceedings of the sixteenth annual international conference on Mobile computing and networking, (209-220)
  1661. ACM
    Ma C, Yau D, Yip N and Rao N Privacy vulnerability of published anonymous mobility traces Proceedings of the sixteenth annual international conference on Mobile computing and networking, (185-196)
  1662. Bavaud F Euclidean distances, soft and spectral clustering on weighted graphs Proceedings of the 2010th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (103-118)
  1663. Mesin L, Orione F, Taormina R and Pasero E A feature selection method for air quality forecasting Proceedings of the 20th international conference on Artificial neural networks: Part III, (489-494)
  1664. De Araújo D, Neto A, Melo J and Martins A Clustering using elements of information theory Proceedings of the 20th international conference on Artificial neural networks: Part III, (397-406)
  1665. ACM
    Lundin R and Lindskog S Security implications of selective encryption Proceedings of the 6th International Workshop on Security Measurements and Metrics, (1-8)
  1666. ACM
    Ghandour W, Akkary H and Masri W The potential of using dynamic information flow analysis in data value prediction Proceedings of the 19th international conference on Parallel architectures and compilation techniques, (431-442)
  1667. ACM
    Willems F and Ignatenko T Identification and secret-key generation in biometric systems with protected templates Proceedings of the 12th ACM workshop on Multimedia and security, (63-66)
  1668. Said F, Murat A, Ivan L, Marc B and Sofiane B Clustering based on kolmogorov information Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (452-460)
  1669. Dong X, Berti-Equille L, Hu Y and Srivastava D (2010). Global detection of complex copying relationships between sources, Proceedings of the VLDB Endowment, 3:1-2, (1358-1369), Online publication date: 1-Sep-2010.
  1670. Agrawal P, Sarma A, Ullman J and Widom J (2010). Foundations of uncertain-data integration, Proceedings of the VLDB Endowment, 3:1-2, (1080-1090), Online publication date: 1-Sep-2010.
  1671. Tuan H, Kha H, Nguyen H and Luong V (2010). Optimized training sequences for spatially correlated MIMO-OFDM, IEEE Transactions on Wireless Communications, 9:9, (2768-2778), Online publication date: 1-Sep-2010.
  1672. Li H, Ru G, Kim Y and Liu H (2010). OFDMA capacity analysis in MIMO channels, IEEE Transactions on Information Theory, 56:9, (4438-4446), Online publication date: 1-Sep-2010.
  1673. Bresler G, Parekh A and Tse D (2010). The approximate capacity of the many-to-one and one-to-many Gaussian interference channels, IEEE Transactions on Information Theory, 56:9, (4566-4592), Online publication date: 1-Sep-2010.
  1674. Hsieh M and Wilde M (2010). Trading classical communication, quantum communication, and entanglement in quantum Shannon theory, IEEE Transactions on Information Theory, 56:9, (4705-4730), Online publication date: 1-Sep-2010.
  1675. Hsieh M and Wilde M (2010). Entanglement-assisted communication of classical and quantum information, IEEE Transactions on Information Theory, 56:9, (4682-4704), Online publication date: 1-Sep-2010.
  1676. Harremoës P, Johnson O and Kontoyiannis I (2010). Thinning, entropy, and the law of thin numbers, IEEE Transactions on Information Theory, 56:9, (4228-4244), Online publication date: 1-Sep-2010.
  1677. Ay N, Müller M and Szkoła A (2010). Effective complexity and its relation to logical depth, IEEE Transactions on Information Theory, 56:9, (4593-4607), Online publication date: 1-Sep-2010.
  1678. Araujo L and Martinez-Romo J (2010). Web spam detection, IEEE Transactions on Information Forensics and Security, 5:3, (581-590), Online publication date: 1-Sep-2010.
  1679. Keller L, Siavoshani M, Fragouli C, Argyraki K and Diggavi D (2010). Joint identity-message coding, IEEE Journal on Selected Areas in Communications, 28:7, (1083-1093), Online publication date: 1-Sep-2010.
  1680. Oka A and Lampe L (2010). Distributed target tracking using signal strength measurements by a wireless sensor network, IEEE Journal on Selected Areas in Communications, 28:7, (1006-1015), Online publication date: 1-Sep-2010.
  1681. Dewaele G, Himura Y, Borgnat P, Fukuda K, Abry P, Michel O, Fontugne R, Cho K and Esaki H (2010). Unsupervised host behavior classification from connection patterns, International Journal of Network Management, 20:5, (317-337), Online publication date: 1-Sep-2010.
  1682. Alvim M, Andrés M and Palamidessi C Information flow in interactive systems Proceedings of the 21st international conference on Concurrency theory, (102-116)
  1683. Martyna J Data traffic scheduling algorithm for multiuser MIMO-OFDM system with the throughput maximization Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking, (436-447)
  1684. Suau P and Escolano F Analysis of the multi-dimensional scale saliency algorithm and its application to texture categorization Proceedings of the 2010 joint IAPR international conference on Structural, syntactic, and statistical pattern recognition, (698-707)
  1685. Xue Y, Wang Y and Han Y Adaptive independent component analysis by modified Kernel density estimation Proceedings of the 6th international conference on Advanced intelligent computing theories and applications: intelligent computing, (230-237)
  1686. Peyrard N, Sabbadin R and Farrokh Niaz U Decision-theoretic Optimal Sampling in Hidden Markov Random Fields Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (687-692)
  1687. Somekh O, Simeone O, Poor H and Shamai S (2010). Cellular systems with non-regenerative relaying and cooperative base stations, IEEE Transactions on Wireless Communications, 9:8, (2654-2663), Online publication date: 1-Aug-2010.
  1688. Goldberger J and Tassa T (2010). Efficient Anonymizations with Enhanced Utility, Transactions on Data Privacy, 3:2, (149-175), Online publication date: 1-Aug-2010.
  1689. Sung C and Collings I (2010). Multiuser cooperative multiplexing with interference suppression in wireless relay networks, IEEE Transactions on Wireless Communications, 9:8, (2528-2538), Online publication date: 1-Aug-2010.
  1690. Kim S and Giannakis G (2010). Sequential and cooperative sensing for multi-channel cognitive radios, IEEE Transactions on Signal Processing, 58:8, (4239-4253), Online publication date: 1-Aug-2010.
  1691. Braca P, Guerriero M, Marano S, Matta V and Willett P (2010). Selective measurement transmission in distributed estimation with data association, IEEE Transactions on Signal Processing, 58:8, (4311-4321), Online publication date: 1-Aug-2010.
  1692. Maor A and Merhav N (2010). On successive refinement for the Kaspi/Heegard-Berger problem, IEEE Transactions on Information Theory, 56:8, (3930-3945), Online publication date: 1-Aug-2010.
  1693. Gohari A and Anantharam V (2010). Information-theoretic key agreement of multiple terminal, IEEE Transactions on Information Theory, 56:8, (3997-4010), Online publication date: 1-Aug-2010.
  1694. Doshi V, Shah D, Médard M and Effros M (2010). Functional compression through graph coloring, IEEE Transactions on Information Theory, 56:8, (3901-3917), Online publication date: 1-Aug-2010.
  1695. Gohari A and Anantharam V (2010). Information-theoretic key agreement of multiple terminals, IEEE Transactions on Information Theory, 56:8, (3973-3996), Online publication date: 1-Aug-2010.
  1696. Sirkeci-Mergen B and Gastpar M (2010). On the broadcast capacity of wireless networks with cooperative relays, IEEE Transactions on Information Theory, 56:8, (3847-3861), Online publication date: 1-Aug-2010.
  1697. Hof E, Sason I and Shamai S (2010). Performance bounds for erasure, list and decision feedback schemes with linear block codes, IEEE Transactions on Information Theory, 56:8, (3754-3778), Online publication date: 1-Aug-2010.
  1698. Ong L and Motani M (2010). Optimal routing for decode-forward in cooperative wireless networks, IEEE Transactions on Communications, 58:8, (2345-2355), Online publication date: 1-Aug-2010.
  1699. Pischella M and Belfiore J (2010). Distributed margin adaptive resource allocation in MIMO OFDMA networks, IEEE Transactions on Communications, 58:8, (2371-2380), Online publication date: 1-Aug-2010.
  1700. Persson D and Eriksson T (2010). On multiple description coding of sources with memory, IEEE Transactions on Communications, 58:8, (2242-2251), Online publication date: 1-Aug-2010.
  1701. Chang C (2010). Generalized iterative RELIEF for supervised distance metric learning, Pattern Recognition, 43:8, (2971-2981), Online publication date: 1-Aug-2010.
  1702. Liu H, Liu L and Zhang H (2010). Ensemble gene selection for cancer classification, Pattern Recognition, 43:8, (2763-2772), Online publication date: 1-Aug-2010.
  1703. ACM
    Zhang M and Zhang K Multi-label learning by exploiting label dependency Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (999-1008)
  1704. ACM
    Sundaravaradan N, Hossain K, Sreedharan V, Slotta D, Vergara J, Heath L and Ramakrishnan N Extracting temporal signatures for comprehending systems biology models Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (453-462)
  1705. Wang X, Xu Z, Sha C, Ester M and Zhou A Semi-supervised learning from only positive and unlabeled data using entropy Proceedings of the 11th international conference on Web-age information management, (668-679)
  1706. ACM
    Chuang C and Hsu W Multivariate multi-model approach for globally multimodal problems Proceedings of the 12th annual conference on Genetic and evolutionary computation, (311-318)
  1707. ACM
    Xie L, Natsev A, Hill M, Smith J and Phillips A The accuracy and value of machine-generated image tags Proceedings of the ACM International Conference on Image and Video Retrieval, (58-65)
  1708. ACM
    Vedantam S, Mitra U and Sabharwal A (2010). Asymptotic distortion exponents for the estimation of time-varying channels in multihop sensor networks, ACM Transactions on Sensor Networks, 6:4, (1-33), Online publication date: 1-Jul-2010.
  1709. Kang X, Liang Y and Garg H (2010). Fading cognitive multiple access channels, IEEE Transactions on Wireless Communications, 9:7, (2382-2391), Online publication date: 1-Jul-2010.
  1710. Xu Z and Makur A (2010). Frame-theoretic analysis of robust filter bank frames to quantization and erasures, IEEE Transactions on Signal Processing, 58:7, (3531-3544), Online publication date: 1-Jul-2010.
  1711. Özçelikkale A, Ozaktas H and Arikan E (2010). Signal recovery with cost-constrained measurements, IEEE Transactions on Signal Processing, 58:7, (3607-3617), Online publication date: 1-Jul-2010.
  1712. Silva J and Narayanan S (2010). Nonproduct data-dependent partitions for mutual information estimation, IEEE Transactions on Signal Processing, 58:7, (3497-3511), Online publication date: 1-Jul-2010.
  1713. Chen B, Zhu Y and Bu J (2010). Mean-square convergence analysis of ADALINE training with minimum error entropy criterion, IEEE Transactions on Neural Networks, 21:7, (1168-1179), Online publication date: 1-Jul-2010.
  1714. Punithakumar K, Ayed I, Ross I, Islam A, Chong J and Li S (2010). Detection of left ventricular motion abnormality via information measures and Bayesian filtering, IEEE Transactions on Information Technology in Biomedicine, 14:4, (1106-1113), Online publication date: 1-Jul-2010.
  1715. Steiner A, Sanderovich A and Shamai S (2010). The multisession multilayer broadcast approach for two cooperating receivers, IEEE Transactions on Information Theory, 56:7, (3115-3138), Online publication date: 1-Jul-2010.
  1716. Sarwate A and Gastpar M (2010). Rateless codes for AVC models, IEEE Transactions on Information Theory, 56:7, (3105-3114), Online publication date: 1-Jul-2010.
  1717. Xue F and Shi J (2010). On the product-determinant-sum of central Wishart matrices and its application to wireless networks, IEEE Transactions on Information Theory, 56:7, (3413-3421), Online publication date: 1-Jul-2010.
  1718. Lee N, Lim J and Chun J (2010). Degrees of freedom of the MIMO Y channel, IEEE Transactions on Information Theory, 56:7, (3332-3342), Online publication date: 1-Jul-2010.
  1719. Bross S, Lapidoth A and Tinguely S (2010). Broadcasting correlated Gaussians, IEEE Transactions on Information Theory, 56:7, (3057-3068), Online publication date: 1-Jul-2010.
  1720. Giovannetti V, Lloyd S and Maccone L (2010). Quantum private queries, IEEE Transactions on Information Theory, 56:7, (3465-3477), Online publication date: 1-Jul-2010.
  1721. Vía J, Ramírez D and Santamaría I (2010). Properness and widely linear processing of quaternion random vectors, IEEE Transactions on Information Theory, 56:7, (3502-3515), Online publication date: 1-Jul-2010.
  1722. Timo R, Blackmore K and Hanlen L (2010). Word-valued sources, IEEE Transactions on Information Theory, 56:7, (3139-3148), Online publication date: 1-Jul-2010.
  1723. Yao S and Skoglund M (2010). Analog network coding mappings in Gaussian multiple-access relay channels, IEEE Transactions on Communications, 58:7, (1973-1983), Online publication date: 1-Jul-2010.
  1724. Bliss D (2010). Optimal S1SO and M1MO spectral efficiency to minimize hidden-node network interference, IEEE Communications Letters, 14:7, (620-622), Online publication date: 1-Jul-2010.
  1725. Kurkoski B and Dauwels J (2010). Reduced-memory decoding of low-density lattice codes, IEEE Communications Letters, 14:7, (659-661), Online publication date: 1-Jul-2010.
  1726. Zhang S, Ching W, Chen X and Tsing N (2010). Generating probabilistic Boolean networks from a prescribed stationary distribution, Information Sciences: an International Journal, 180:13, (2560-2570), Online publication date: 1-Jul-2010.
  1727. Wolpert D Inference concerning physical systems Proceedings of the Programs, proofs, process and 6th international conference on Computability in Europe, (438-447)
  1728. Ker A The square root law in stegosystems with imperfect information Proceedings of the 12th international conference on Information hiding, (145-160)
  1729. ACM
    Kadi N and Agha K Distributed switched code (DiSC) Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (716-720)
  1730. Srinivas N, Krause A, Kakade S and Seeger M Gaussian process optimization in the bandit setting Proceedings of the 27th International Conference on International Conference on Machine Learning, (1015-1022)
  1731. Bontempi G and Meyer P Causal filter selection in microarray data Proceedings of the 27th International Conference on International Conference on Machine Learning, (95-102)
  1732. Malacaria P and Heusser J Information theory and security Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems, (87-134)
  1733. Rigau J, Feixas M, Sbert M and Wallraven C Toward Auvers period Proceedings of the Sixth international conference on Computational Aesthetics in Graphics, Visualization and Imaging, (99-106)
  1734. ACM
    Andrew L, Lin M and Wierman A Optimality, fairness, and robustness in speed scaling designs Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (37-48)
  1735. ACM
    Andrew L, Lin M and Wierman A (2010). Optimality, fairness, and robustness in speed scaling designs, ACM SIGMETRICS Performance Evaluation Review, 38:1, (37-48), Online publication date: 12-Jun-2010.
  1736. ACM
    Othman A, Sandholm T, Pennock D and Reeves D A practical liquidity-sensitive automated market maker Proceedings of the 11th ACM conference on Electronic commerce, (377-386)
  1737. ACM
    Jayram T Information complexity Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (159-168)
  1738. Huang Y and Wang G Structure analysis of email networks by information-theoretic clustering Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II, (416-425)
  1739. ACM
    Barak B, Braverman M, Chen X and Rao A How to compress interactive communication Proceedings of the forty-second ACM symposium on Theory of computing, (67-76)
  1740. Barranco M and Martínez L A method for weighting multi-valued features in content-based filtering Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (409-418)
  1741. ACM
    Chakrabarti A, Cormode G and Mcgregor A (2010). A near-optimal algorithm for estimating the entropy of a stream, ACM Transactions on Algorithms, 6:3, (1-21), Online publication date: 1-Jun-2010.
  1742. Burnashev M and Yamamoto H (2010). On the reliability function for a BSC with noisy feedback, Problems of Information Transmission, 46:2, (103-121), Online publication date: 1-Jun-2010.
  1743. Kang X, Garg H, Liang Y and Zhang R (2010). Optimal power allocation for OFDM-based cognitive radio with new primary transmission protection criteria, IEEE Transactions on Wireless Communications, 9:6, (2066-2075), Online publication date: 1-Jun-2010.
  1744. Zhou N, Zhu X, Huang Y and Lin H (2010). Low complexity cross-layer design with packet dependent scheduling for heterogeneous traffic in multiuser OFDM systems, IEEE Transactions on Wireless Communications, 9:6, (1912-1923), Online publication date: 1-Jun-2010.
  1745. Agaskar A, He T and Tong L (2010). Distributed detection of multi-hop information flows with fusion capacity constraints, IEEE Transactions on Signal Processing, 58:6, (3373-3383), Online publication date: 1-Jun-2010.
  1746. Pang J, Scutari G, Palomar D and Facchinei F (2010). Design of cognitive radio systems under temperature-interference constraints, IEEE Transactions on Signal Processing, 58:6, (3251-3271), Online publication date: 1-Jun-2010.
  1747. Zhang Y and Ji Q (2010). Efficient sensor selection for active information fusion, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 40:3, (719-728), Online publication date: 1-Jun-2010.
  1748. Madiman M and Tetali P (2010). Information inequalities for joint distributions, with interpretations and applications, IEEE Transactions on Information Theory, 56:6, (2699-2713), Online publication date: 1-Jun-2010.
  1749. Diederichs E, Juditsky A, Spokoiny V and Schütte C (2010). Sparse non-Gaussian component analysis, IEEE Transactions on Information Theory, 56:6, (3033-3047), Online publication date: 1-Jun-2010.
  1750. Caire G, Jindal N, Kobayashi M and Ravindran N (2010). Multiuser MIMO achievable rates with downlink training and channel state, IEEE Transactions on Information Theory, 56:6, (2845-2866), Online publication date: 1-Jun-2010.
  1751. Dupuis F, Hayden P and Li K (2010). A father protocol for quantum broadcast channels, IEEE Transactions on Information Theory, 56:6, (2946-2956), Online publication date: 1-Jun-2010.
  1752. Rezaei S, Gharan S and Khandani A (2010). Relay scheduling in the half-duplex Gaussian parallel relay channel, IEEE Transactions on Information Theory, 56:6, (2668-2687), Online publication date: 1-Jun-2010.
  1753. Kannu A and Schniter P (2010). On the spectral efficiency of noncoherent doubly selective block-fading channels, IEEE Transactions on Information Theory, 56:6, (2829-2844), Online publication date: 1-Jun-2010.
  1754. Wang W, Wainwright M and Ramchandran K (2010). Information-theoretic limits on sparse signal recovery, IEEE Transactions on Information Theory, 56:6, (2967-2979), Online publication date: 1-Jun-2010.
  1755. Lapidoth A and Tinguely S (2010). Sending a bivariate Gaussian over a Gaussian MAC, IEEE Transactions on Information Theory, 56:6, (2714-2752), Online publication date: 1-Jun-2010.
  1756. Ignatenko T and Willems F (2010). Information leakage in fuzzy commitment schemes, IEEE Transactions on Information Forensics and Security, 5:2, (337-348), Online publication date: 1-Jun-2010.
  1757. Ye C, Mathur S, Reznik A, Shah Y, Trappe W and Mandayam N (2010). Information-theoretically secret key generation for fading wireless channels, IEEE Transactions on Information Forensics and Security, 5:2, (240-254), Online publication date: 1-Jun-2010.
  1758. Zhang W and Mitra U (2010). Spectrum shaping, IEEE Transactions on Communications, 58:6, (1857-1867), Online publication date: 1-Jun-2010.
  1759. Sun Z, Shao M, Chen J, Wong K and Wu X (2010). Achieving the rate-distortion bound with low-density generator matrix codes, IEEE Transactions on Communications, 58:6, (1643-1653), Online publication date: 1-Jun-2010.
  1760. Kim H, Annavajjala R, Cosman P and Milstein L (2010). Source-channel rate optimization for progressive image transmission over block fading relay channels, IEEE Transactions on Communications, 58:6, (1631-1642), Online publication date: 1-Jun-2010.
  1761. Martalò M and Ferrari G (2010). A simple information-theoretic analysis of clustered sensor networks with decentralized detection, IEEE Communications Letters, 14:6, (560-562), Online publication date: 1-Jun-2010.
  1762. Gagie T and Manzini G (2010). Move-to-Front, Distance Coding, and Inversion Frequencies revisited, Theoretical Computer Science, 411:31-33, (2925-2944), Online publication date: 1-Jun-2010.
  1763. Qiao D, Gursoy M and Velipasalar S (2010). Full length article, Physical Communication, 3:2, (97-104), Online publication date: 1-Jun-2010.
  1764. Martínez Sotoca J and Pla F (2010). Supervised feature selection by clustering using conditional mutual information-based distances, Pattern Recognition, 43:6, (2068-2081), Online publication date: 1-Jun-2010.
  1765. González J and Arévalo V (2010). Mesh Topological Optimization for Improving Piecewise-Linear Image Registration, Journal of Mathematical Imaging and Vision, 37:2, (166-182), Online publication date: 1-Jun-2010.
  1766. ACM
    Lacko J, Cernekova Z and Maricak M Geometry and image based view quality comparison for 3D models Proceedings of the 26th Spring Conference on Computer Graphics, (173-177)
  1767. Zaidi A, Shamai S, Piantanida P and Vandendorpe L On the capacity of a class of relay channels with orthogonal components and noncausal state information at source Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (528-533)
  1768. Choi J and To D On learning for fusion over fading channels in wireless sensor networks Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (319-324)
  1769. Karray M (2010). Analytical evaluation of QoS in the downlink of OFDMA wireless cellular networks serving streaming and elastic traffic, IEEE Transactions on Wireless Communications, 9:5, (1799-1807), Online publication date: 1-May-2010.
  1770. Kwon H, Kim S and Lee B (2010). Opportunistic multi-channel CSMA protocol for OFDMA systems, IEEE Transactions on Wireless Communications, 9:5, (1552-1557), Online publication date: 1-May-2010.
  1771. Guerriero M, Marano S, Matta V and Willett P (2010). Optimal relay function in the low-power regime for distributed estimation over a MAC, IEEE Transactions on Signal Processing, 58:5, (2907-2911), Online publication date: 1-May-2010.
  1772. Li X, Jin S, Gao X and McKay M (2010). Capacity bounds and low complexity transceiver design for double-scattering MIMO multiple access channels, IEEE Transactions on Signal Processing, 58:5, (2809-2822), Online publication date: 1-May-2010.
  1773. Kuhn L, Price B, Do M, Liu J, Zhou R, Schmidt T and De Kleer J (2010). Pervasive diagnosis, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 40:5, (932-944), Online publication date: 1-May-2010.
  1774. Steiner A and Shamai S (2010). On queueing and multilayer coding, IEEE Transactions on Information Theory, 56:5, (2392-2415), Online publication date: 1-May-2010.
  1775. Levy N and Shamai S (2010). Information theoretic aspects of users' activity in a Wyner-like cellular model, IEEE Transactions on Information Theory, 56:5, (2241-2248), Online publication date: 1-May-2010.
  1776. Niesen U, Gupta P and Shah D (2010). The balanced unicast and multicast capacity regions of large wireless networks, IEEE Transactions on Information Theory, 56:5, (2249-2271), Online publication date: 1-May-2010.
  1777. Zaidi A, Kotagiri S, Laneman J and Vandendorpe L (2010). Cooperative relaying with state available noncausally at the relay, IEEE Transactions on Information Theory, 56:5, (2272-2298), Online publication date: 1-May-2010.
  1778. Kotagiri S and Laneman J (2010). Variations on information embedding in multiple access and broadcast channels, IEEE Transactions on Information Theory, 56:5, (2225-2240), Online publication date: 1-May-2010.
  1779. Farias V, Moallemi C, Van Roy B and Weissman T (2010). Universal reinforcement learning, IEEE Transactions on Information Theory, 56:5, (2441-2454), Online publication date: 1-May-2010.
  1780. Khina A and Erez U (2010). On the robustness of dirty paper coding, IEEE Transactions on Communications, 58:5, (1437-1446), Online publication date: 1-May-2010.
  1781. Persson D and Eriksson T (2010). Power series quantization for noisy channels, IEEE Transactions on Communications, 58:5, (1405-1414), Online publication date: 1-May-2010.
  1782. Güney N, Deliç H and Alagöz F (2010). Achievable information rates of M-ary PPM impulse radio for UWB channels and rake reception, IEEE Transactions on Communications, 58:5, (1524-1535), Online publication date: 1-May-2010.
  1783. Lee J (2010). Lattice precoding and pre-distorted constellation in degraded broadcast channel with finite input alphabets, IEEE Transactions on Communications, 58:5, (1315-1320), Online publication date: 1-May-2010.
  1784. CoyneI D, Marrelec G, Perlbarg V, Doyon J and Benali H Conditional integration as a way of measuring mediated interactions between large-scale brain networks in functional MRI Proceedings of the 2010 IEEE international conference on Biomedical imaging: from nano to Macro, (652-655)
  1785. ACM
    Yang H and Xu X Bias towards regular configuration in 2D pointing Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1391-1400)
  1786. Malacaria P (2010). Risk assessment of security threats for looping constructs, Journal of Computer Security, 18:2, (191-228), Online publication date: 1-Apr-2010.
  1787. Dadbin S, Gholami R, Standage N and Hanafizadeh P (2010). The Core Critical Success Factors in Implementation of Enterprise Resource Planning Systems, International Journal of Enterprise Information Systems, 6:2, (82-111), Online publication date: 1-Apr-2010.
  1788. Sanli H and Çam H (2010). Collaborative event-driven coverage and rate allocation for event miss-ratio assurances in wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-20), Online publication date: 1-Apr-2010.
  1789. Luo H, Zhang Z, Chen Y, Wang W and Li S (2010). Opportunistic cognitive relaying, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  1790. Rößler J, Gerstacker W and Huber J (2010). Iterative soft decision interference cancellation for DS-CDMA employing the distribution of interference, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  1791. Le Nir V and Scheers B (2010). Distributed power allocation for parallel broadcast channels with only common information in cognitive tactical radio networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-10), Online publication date: 1-Apr-2010.
  1792. ACM
    Vlachos M, Kozat S and Yu P (2010). Optimal distance bounds for fast search on compressed time-series query logs, ACM Transactions on the Web, 4:2, (1-28), Online publication date: 1-Apr-2010.
  1793. Fan Y, Lai L, Erkip E and Poor H (2010). Rateless coding for MIMO fading channels, IEEE Transactions on Wireless Communications, 9:4, (1288-1292), Online publication date: 1-Apr-2010.
  1794. Cruces S (2010). Bounded component analysis of linear mixtures, IEEE Transactions on Signal Processing, 58:4, (2141-2154), Online publication date: 1-Apr-2010.
  1795. Jang Y, Jeong E and Lee Y (2010). A two-step approach to power allocation for OFDM signals over two-way amplify-and-forward relay, IEEE Transactions on Signal Processing, 58:4, (2426-2430), Online publication date: 1-Apr-2010.
  1796. Xiong W, Li H, Adali T, Li Y and Calhoun V (2010). On entropy rate for the complex domain and its application to i.i.d. sampling, IEEE Transactions on Signal Processing, 58:4, (2409-2414), Online publication date: 1-Apr-2010.
  1797. Dabora R and Goldsmith A (2010). The capacity region of the degraded finite-state broadcast channel, IEEE Transactions on Information Theory, 56:4, (1828-1851), Online publication date: 1-Apr-2010.
  1798. Loyka S, Kostina V and Gagnon F (2010). Error rates of the maximum-likelihood detector for arbitrary constellations, IEEE Transactions on Information Theory, 56:4, (1948-1960), Online publication date: 1-Apr-2010.
  1799. Korada S and Urbanke R (2010). Polar codes are optimal for lossy source coding, IEEE Transactions on Information Theory, 56:4, (1751-1768), Online publication date: 1-Apr-2010.
  1800. Nayak J, Tuncel E and Gündüz D (2010). Wyner-Ziv coding over broadcast channels, IEEE Transactions on Information Theory, 56:4, (1782-1799), Online publication date: 1-Apr-2010.
  1801. Liu R, Liu T, Poor H and Shamai S (2010). A vector generalization of costa's entropy-power inequality with applications, IEEE Transactions on Information Theory, 56:4, (1865-1879), Online publication date: 1-Apr-2010.
  1802. Marić I and Yates R (2010). Bandwidth and power allocation for cooperative strategies in Gaussian relay networks, IEEE Transactions on Information Theory, 56:4, (1880-1889), Online publication date: 1-Apr-2010.
  1803. Yang E and He D (2010). Interactive encoding and decoding for one way learning, IEEE Transactions on Information Theory, 56:4, (1808-1824), Online publication date: 1-Apr-2010.
  1804. Choi S, Park T and Han J (2010). A graph-based distributed reconstruction source coding with correlated messages, IEEE Communications Letters, 14:4, (345-347), Online publication date: 1-Apr-2010.
  1805. Lima L, Gheorghiu S, Barros J, Médard M and Toledo A (2010). Secure network coding for multi-resolution wireless video streaming, IEEE Journal on Selected Areas in Communications, 28:3, (377-388), Online publication date: 1-Apr-2010.
  1806. Chu D and Thye G (2010). A new and fast implementation for null space based linear discriminant analysis, Pattern Recognition, 43:4, (1373-1379), Online publication date: 1-Apr-2010.
  1807. Yao A, Wang G, Lin X and Chai X (2010). An incremental Bhattacharyya dissimilarity measure for particle filtering, Pattern Recognition, 43:4, (1244-1256), Online publication date: 1-Apr-2010.
  1808. Rissanen J, Roos T and Myllymäki P (2010). Model selection by sequentially normalized least squares, Journal of Multivariate Analysis, 101:4, (839-849), Online publication date: 1-Apr-2010.
  1809. Sha C, Li Y and Zhou A On t-closeness with KL-divergence and semantic privacy Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II, (153-167)
  1810. Martinez-Romo J and Araujo L Analyzing information retrieval methods to recover broken web links Proceedings of the 32nd European conference on Advances in Information Retrieval, (26-37)
  1811. ACM
    Jin X, Zhang N and Das G Algorithm-safe privacy-preserving data publishing Proceedings of the 13th International Conference on Extending Database Technology, (633-644)
  1812. Jain A, Kulkarni S and Verdú S Minimum energy per bit for wideband wireless multicasting Proceedings of the 29th conference on Information communications, (2393-2401)
  1813. Liu J, Shi Y and Hou Y A tractable and accurate cross-layer model for multi-hop MIMO networks Proceedings of the 29th conference on Information communications, (2348-2356)
  1814. Chang C, Cheng J, Huang T, Huang X and Lee D A bit-stuffing algorithm for crosstalk avoidance in high speed switching Proceedings of the 29th conference on Information communications, (839-847)
  1815. Anandkumar A, Michael N and Tang A Opportunistic spectrum access with multiple users Proceedings of the 29th conference on Information communications, (803-811)
  1816. Ghaderi J and Srikant R Towards a theory of anonymous networking Proceedings of the 29th conference on Information communications, (686-694)
  1817. Ma L, Wang Y, Tian Y and Yang Y On-line feature enhancement for adaptive object tracking Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1, (468-471)
  1818. Cheng Z, Zhang T and Yan L Thresholding using two-dimensional histogram based on local entropy Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1, (357-360)
  1819. Anand S and Chandramouli R (2010). On the location of an eavesdropper in multiterminal networks, IEEE Transactions on Information Forensics and Security, 5:1, (148-157), Online publication date: 1-Mar-2010.
  1820. Seldin Y and Tishby N (2010). PAC-Bayesian Analysis of Co-clustering and Beyond, The Journal of Machine Learning Research, 11, (3595-3646), Online publication date: 1-Mar-2010.
  1821. Vinh N, Epps J and Bailey J (2010). Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance, The Journal of Machine Learning Research, 11, (2837-2854), Online publication date: 1-Mar-2010.
  1822. Pernkopf F and Bilmes J (2010). Efficient Heuristics for Discriminative Structure Learning of Bayesian Network Classifiers, The Journal of Machine Learning Research, 11, (2323-2360), Online publication date: 1-Mar-2010.
  1823. Rodriguez-Lujan I, Huerta R, Elkan C and Cruz C (2010). Quadratic Programming Feature Selection, The Journal of Machine Learning Research, 11, (1491-1516), Online publication date: 1-Mar-2010.
  1824. Laparra V, Gutiérrez J, Camps-Valls G and Malo J (2010). Image Denoising with Kernels Based on Natural Image Relations, The Journal of Machine Learning Research, 11, (873-903), Online publication date: 1-Mar-2010.
  1825. Conne C and Kim I (2010). Outage probability of multi-hop amplify-and-forward relay systems, IEEE Transactions on Wireless Communications, 9:3, (1139-1149), Online publication date: 1-Mar-2010.
  1826. Jegbefume O, Saquib M and Torlak M (2010). Performance analysis of spread spectrum protocols with adaptive spreading, IEEE Transactions on Wireless Communications, 9:3, (1063-1073), Online publication date: 1-Mar-2010.
  1827. Rezaeian M and Vo B (2010). Error bounds for joint detection and estimation of a single object with random finite set observation, IEEE Transactions on Signal Processing, 58:3, (1493-1506), Online publication date: 1-Mar-2010.
  1828. Ramaswamy S, Nayak J and Rose K (2010). Fusion coding of correlated sources for storage and selective retrieval, IEEE Transactions on Signal Processing, 58:3, (1722-1731), Online publication date: 1-Mar-2010.
  1829. Rey F, Lamarca M and Vazquez G (2010). Linear precoder design through cut-off rate maximization in MIMO-OFDM coded systems with imperfect CSIT, IEEE Transactions on Signal Processing, 58:3, (1741-1755), Online publication date: 1-Mar-2010.
  1830. Yang Y, Blum R, He Z and Fuhrmann D (2010). MIMO radar waveform design via alternating projection, IEEE Transactions on Signal Processing, 58:3, (1440-1445), Online publication date: 1-Mar-2010.
  1831. Da Cunha A, Do M and Vetterli M (2010). On the information rates of the plenoptic function, IEEE Transactions on Information Theory, 56:3, (1306-1321), Online publication date: 1-Mar-2010.
  1832. Silva D, Kschischang F and Kötter R (2010). Communication over finite-field matrix channels, IEEE Transactions on Information Theory, 56:3, (1296-1305), Online publication date: 1-Mar-2010.
  1833. Wainwright M, Maneva E and Martinian E (2010). Lossy source compression using low-density generator matrix codes, IEEE Transactions on Information Theory, 56:3, (1351-1368), Online publication date: 1-Mar-2010.
  1834. Hsu C and Anastasopoulos A (2010). Capacity-achieving codes with bounded graphical complexity and maximum likelihood decoding, IEEE Transactions on Information Theory, 56:3, (992-1006), Online publication date: 1-Mar-2010.
  1835. Fresia M and Caire G (2010). A linear encoding approach to index assignment in lossy source-channel coding, IEEE Transactions on Information Theory, 56:3, (1322-1344), Online publication date: 1-Mar-2010.
  1836. Koch T and Lapidoth A (2010). Gaussian fading is the worst fading, IEEE Transactions on Information Theory, 56:3, (1158-1165), Online publication date: 1-Mar-2010.
  1837. Wang X and Wu X (2010). Index assignment optimization for joint source-channel MAP decoding, IEEE Transactions on Communications, 58:3, (901-910), Online publication date: 1-Mar-2010.
  1838. Fu Y, Yang L and Zhu W (2010). A nearly optimal amplify-and-forward relaying scheme for two-hop MIMO multi-relay networks, IEEE Communications Letters, 14:3, (229-231), Online publication date: 1-Mar-2010.
  1839. Lago-Fernández L and Corbacho F (2010). Normality-based validation for crisp clustering, Pattern Recognition, 43:3, (782-795), Online publication date: 1-Mar-2010.
  1840. Kasick M, Tan J, Gandhi R and Narasimhan P Black-box problem diagnosis in parallel file systems Proceedings of the 8th USENIX conference on File and storage technologies, (4-4)
  1841. ACM
    Du W, Tan S, Cheng X and Yun X Adapting information bottleneck method for automatic construction of domain-oriented sentiment lexicon Proceedings of the third ACM international conference on Web search and data mining, (111-120)
  1842. Szpankowski W Average case analysis of algorithms Algorithms and theory of computation handbook, (11-11)
  1843. Zhou N, Zhu X, Gao J and Huang Y (2010). Optimal asymmetric resource allocation with limited feedback for OFDM based relay systems, IEEE Transactions on Wireless Communications, 9:2, (552-557), Online publication date: 1-Feb-2010.
  1844. Knoblauch A, Palm G and Sommer F (2010). Memory capacities for synaptic and structural plasticity, Neural Computation, 22:2, (289-341), Online publication date: 1-Feb-2010.
  1845. Kim Y and Ortega A (2010). Distributed encoding algorithm for source localization in sensor networks, EURASIP Journal on Advances in Signal Processing, 2010, (1-13), Online publication date: 1-Feb-2010.
  1846. Soret B, Torres M and Entrambasaguas J (2010). Analysis of the tradeoff between delay and source rate in multiuser wireless systems, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Feb-2010.
  1847. Ives R, Bishop D, Du Y and Belcher C (2010). Iris recognition, EURASIP Journal on Advances in Signal Processing, 2010, (1-18), Online publication date: 1-Feb-2010.
  1848. Salim U and Slock D (2010). How much feedback is required for TDD multi-antenna broadcast channels with user selection?, EURASIP Journal on Advances in Signal Processing, 2010, (1-14), Online publication date: 1-Feb-2010.
  1849. ACM
    Kolahi S and Libkin L (2008). An information-theoretic analysis of worst-case redundancy in database design, ACM Transactions on Database Systems, 35:1, (1-32), Online publication date: 1-Feb-2010.
  1850. Bonello N, Yang D, Chen S and Hanzo L (2010). Generalized MIMO transmit preprocessing using pilot symbol assisted rateless codes, IEEE Transactions on Wireless Communications, 9:2, (754-763), Online publication date: 1-Feb-2010.
  1851. de Miguel R, Gardaševic V, Müller R and Knudsen F (2010). On overloaded vector precoding for single-user MIMO channels, IEEE Transactions on Wireless Communications, 9:2, (745-753), Online publication date: 1-Feb-2010.
  1852. Scutari G and Palomar D (2010). MIMO cognitive radio, IEEE Transactions on Signal Processing, 58:2, (761-780), Online publication date: 1-Feb-2010.
  1853. Simoens S, Muñoz-Medina O, Vidal J and Del Coso A (2010). Compress-and-forward cooperative MIMO relaying with full channel state information, IEEE Transactions on Signal Processing, 58:2, (781-791), Online publication date: 1-Feb-2010.
  1854. Braca P, Marano S, Matta V and Willett P (2010). Asymptotic optimality of running consensus in testing binary hypotheses, IEEE Transactions on Signal Processing, 58:2, (814-825), Online publication date: 1-Feb-2010.
  1855. Parker A, Dimitrov A and Gedeon T (2010). Symmetry breaking in soft clustering decoding of neural codes, IEEE Transactions on Information Theory, 56:2, (901-927), Online publication date: 1-Feb-2010.
  1856. Suksompong P and Berger T (2010). Capacity analysis for integrate-and-fire neurons with descending action potential thresholds, IEEE Transactions on Information Theory, 56:2, (838-851), Online publication date: 1-Feb-2010.
  1857. Sun Z, Tian C, Chen J and Wong K (2010). LDPC code design for asynchronous Slepian-Wolf coding, IEEE Transactions on Communications, 58:2, (511-520), Online publication date: 1-Feb-2010.
  1858. Zhang R, Gao F and Liang Y (2010). Cognitive beamforming made practical, IEEE Transactions on Communications, 58:2, (706-718), Online publication date: 1-Feb-2010.
  1859. Liu H, Liu L and Zhang H (2010). Ensemble gene selection by grouping for microarray data classification, Journal of Biomedical Informatics, 43:1, (81-87), Online publication date: 1-Feb-2010.
  1860. Giancarlo R, Bosco G and Pinello L Distance functions, clustering algorithms and microarray data analysis Proceedings of the 4th international conference on Learning and intelligent optimization, (125-138)
  1861. Kleinberg R and Slivkins A Sharp dichotomies for regret minimization in metric spaces Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (827-846)
  1862. Sung T and Bojanczyk A Optimal power control and relay capacity for PLC-embedded cooperative systems Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (813-817)
  1863. Apostolico A Maximal words in sequence comparisons based on subword composition Algorithms and Applications, (34-44)
  1864. Gerck E The witness-voting system Towards Trustworthy Elections, (1-36)
  1865. Murali T and Aluru S Computational systems biology Algorithms and theory of computation handbook, (32-32)
  1866. Lima F, Wänstedt S, Cavalcanti F and Freitas W (2010). Scheduling for improving system capacity in multiservice 3GPP LTE, Journal of Electrical and Computer Engineering, 2010, (1-10), Online publication date: 1-Jan-2010.
  1867. Martalò M and Ferrari G (2010). Low-complexity one-dimensional edge detection in wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Jan-2010.
  1868. Hu P, Sung C and Shum K (2010). Joint channel-network coding for the Gaussian two-way two-relay network, EURASIP Journal on Wireless Communications and Networking, 2010, (1-14), Online publication date: 1-Jan-2010.
  1869. Cocco G, Pfletschinger S, Navarro M and Ibars C (2010). Opportunistic adaptive transmission for network coding using nonbinary LDPC codes, EURASIP Journal on Wireless Communications and Networking, 2010, (1-15), Online publication date: 1-Jan-2010.
  1870. He G, Cottatellucci L and Debbah M (2010). The waterfilling game-theoretical framework for distributed wireless network information flow, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Jan-2010.
  1871. He G, Debbah M and Altman E (2010). A Bayesian game-theoretic approach for distributed resource allocation in fading multiple access channels, EURASIP Journal on Wireless Communications and Networking, 2010, (1-12), Online publication date: 1-Jan-2010.
  1872. Sung K, Haas H and McLaughlin S (2010). A semianalytical PDF of downlink SINR for femtocell networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-12), Online publication date: 1-Jan-2010.
  1873. Mahapatra D and Sun Y (2010). Rigid registration of renal perfusion images using a neurobiology-based visual saliency model, Journal on Image and Video Processing, 2010, (1-22), Online publication date: 1-Jan-2010.
  1874. Xie M, Zhang W and Wong K (2010). A geometric approach to improve spectrum efficiency for cognitive relay networks, IEEE Transactions on Wireless Communications, 9:1, (268-281), Online publication date: 1-Jan-2010.
  1875. Vajapeyam M and Mitra U (2010). Performance analysis of distributed space-time coded protocols for wireless multi-hop communications, IEEE Transactions on Wireless Communications, 9:1, (122-133), Online publication date: 1-Jan-2010.
  1876. Meng T and Buck J (2010). Rate distortion bounds on passive sonar performance, IEEE Transactions on Signal Processing, 58:1, (326-336), Online publication date: 1-Jan-2010.
  1877. Clark D, Ristić B, Vo B and Vo B (2010). Bayesian multi-object filtering with amplitude feature likelihood for unknown object SNR, IEEE Transactions on Signal Processing, 58:1, (26-37), Online publication date: 1-Jan-2010.
  1878. Motamedi Z and Soleymani M (2010). Asymptotic spectral efficiency of MIMO ad hoc networks, IEEE Transactions on Signal Processing, 58:1, (462-466), Online publication date: 1-Jan-2010.
  1879. Harrow A and Shor P (2010). Time reversal and exchange symmetries of unitary gate capacities, IEEE Transactions on Information Theory, 56:1, (462-475), Online publication date: 1-Jan-2010.
  1880. Fiore P (2010). Scale-recursive lattice-based multiple-access symbol constellations, IEEE Transactions on Information Theory, 56:1, (211-223), Online publication date: 1-Jan-2010.
  1881. Harsha P, Jain R, McAllester D and Radhakrishnan J (2010). The communication complexity of correlation, IEEE Transactions on Information Theory, 56:1, (438-449), Online publication date: 1-Jan-2010.
  1882. Dhulipala A, Fragouli C and Orlitsky A (2010). Silence-based communication, IEEE Transactions on Information Theory, 56:1, (350-366), Online publication date: 1-Jan-2010.
  1883. Chiani M, Win M and Shin H (2010). MIMO networks, IEEE Transactions on Information Theory, 56:1, (336-349), Online publication date: 1-Jan-2010.
  1884. Salah M, Mitiche A and Ayed I (2010). Effective level set image segmentation with a kernel induced data term, IEEE Transactions on Image Processing, 19:1, (220-232), Online publication date: 1-Jan-2010.
  1885. Li X, Jin S, Gao X and Wong K (2010). Near-optimal power allocation for MIMO channels with mean or covariance feedback, IEEE Transactions on Communications, 58:1, (289-300), Online publication date: 1-Jan-2010.
  1886. Zhu S, Wang D, Yu K, Li T and Gong Y (2010). Feature Selection for Gene Expression Using Model-Based Entropy, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:1, (25-36), Online publication date: 1-Jan-2010.
  1887. Alon N, Chor B, Pardi F and Rapoport A (2010). Approximate Maximum Parsimony and Ancestral Maximum Likelihood, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:1, (183-187), Online publication date: 1-Jan-2010.
  1888. Li Q, Li K and Teh K Achieving the optimal diversity-multiplexing tradeoff of two-user full-duplex asymmetric MIMO cooperative multiple-access channels Proceedings of the 7th international conference on Information, communications and signal processing, (1184-1188)
  1889. Farràs O, Gracia I, Martín S and Padró C Linear threshold multisecret sharing schemes Proceedings of the 4th international conference on Information theoretic security, (110-126)
  1890. Yearwood J, Webb D, Ma L, Vamplew P, Ofoghi B and Kelarev A Applying clustering and ensemble clustering approaches to phishing profiling Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (25-34)
  1891. Krithivasan D and Pradhan S (2009). Lattices for distributed source coding, IEEE Transactions on Information Theory, 55:12, (5628-5651), Online publication date: 1-Dec-2009.
  1892. Sankar L, Mandayam N and Poor H (2009). On the sum-capacity of degraded Gaussian multiple-access relay channels, IEEE Transactions on Information Theory, 55:12, (5394-5411), Online publication date: 1-Dec-2009.
  1893. Borade S, Nakiboǧlu B and Zheng L (2009). Unequal error protection, IEEE Transactions on Information Theory, 55:12, (5511-5539), Online publication date: 1-Dec-2009.
  1894. Wainwright M (2009). Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting, IEEE Transactions on Information Theory, 55:12, (5728-5741), Online publication date: 1-Dec-2009.
  1895. He D, Lastras-Montaño L, Yang E, Jagmohan A and Chen J (2009). On the redundancy of Slepian--Wolf coding, IEEE Transactions on Information Theory, 55:12, (5607-5627), Online publication date: 1-Dec-2009.
  1896. Tomamichel M, Colbeck R and Renner R (2009). A fully quantum asymptotic equipartition property, IEEE Transactions on Information Theory, 55:12, (5840-5847), Online publication date: 1-Dec-2009.
  1897. Gharan S, Bayesteh A and Khandani A (2009). On the diversity, IEEE Transactions on Information Theory, 55:12, (5423-5444), Online publication date: 1-Dec-2009.
  1898. Ho S and Yeung R (2009). On the discontinuity of the Shannon information measures, IEEE Transactions on Information Theory, 55:12, (5362-5374), Online publication date: 1-Dec-2009.
  1899. Wang J, Majumdar A and Ramchandran K (2009). Robust video transmission with distributed source coded auxiliary channel, IEEE Transactions on Image Processing, 18:12, (2695-2705), Online publication date: 1-Dec-2009.
  1900. Zhu G, Huang J, Kwong S and Yang J (2009). A study on the randomness measure of image hashing, IEEE Transactions on Information Forensics and Security, 4:4, (928-932), Online publication date: 1-Dec-2009.
  1901. Ignatenko T and Willems F (2009). Biometric systems, IEEE Transactions on Information Forensics and Security, 4:4, (956-973), Online publication date: 1-Dec-2009.
  1902. Letzepis N, Nguyen K, Guillén i Fàbregas A and Cowley W (2009). Outage analysis of the hybrid free-space optical and radio-frequency channel, IEEE Journal on Selected Areas in Communications, 27:9, (1709-1719), Online publication date: 1-Dec-2009.
  1903. Guanlei X, Xiaotong W and Xiaogang X (2009). Fast communication, Signal Processing, 89:12, (2692-2697), Online publication date: 1-Dec-2009.
  1904. Tan G, Viard-Gaudin C and Kot A (2009). Automatic writer identification framework for online handwritten documents using character prototypes, Pattern Recognition, 42:12, (3313-3323), Online publication date: 1-Dec-2009.
  1905. Liu H, Liu L and Zhang H (2009). Boosting feature selection using information metric for classification, Neurocomputing, 73:1-3, (295-303), Online publication date: 1-Dec-2009.
  1906. Corona F, Liitiäinen E, Lendasse A, Sassu L, Melis S and Baratti R (2009). A SOM-based approach to estimating product properties from spectroscopic measurements, Neurocomputing, 73:1-3, (71-79), Online publication date: 1-Dec-2009.
  1907. Amjady N and Daraeepour A (2009). Design of input vector for day-ahead price forecasting of electricity markets, Expert Systems with Applications: An International Journal, 36:10, (12281-12294), Online publication date: 1-Dec-2009.
  1908. Al-Ani A (2009). A dependency-based search strategy for feature selection, Expert Systems with Applications: An International Journal, 36:10, (12392-12398), Online publication date: 1-Dec-2009.
  1909. Wang Z and Tan S (2009). Automatic linear causal relationship identification for financial factor modeling, Expert Systems with Applications: An International Journal, 36:10, (12441-12445), Online publication date: 1-Dec-2009.
  1910. Gottumukkala V and Minn H Optimal Pilot Power Allocation for OFDM Systemswith Transmitter and Receiver IQ Imbalances Proceedings of the 28th IEEE conference on Global telecommunications, (6633-6637)
  1911. Yuan X and Ping L Achievable rates of coded linear systems with iterative MMSE detection Proceedings of the 28th IEEE conference on Global telecommunications, (6161-6166)
  1912. Liu W and Chen B Communicating correlated Gaussian sources over Gaussian Z interference channels Proceedings of the 28th IEEE conference on Global telecommunications, (5747-5752)
  1913. Manchón C, Kirkelund G, Fleury B, Mogensen P, Deneire L, Sørensen T and Rom C Interference cancellation based on divergence minimization for MIMO-OFDM receivers Proceedings of the 28th IEEE conference on Global telecommunications, (5431-5436)
  1914. Haghpanahi M, Kalantari M and Shayman M Implementing information paths in a dense wireless sensor network Proceedings of the 28th IEEE conference on Global telecommunications, (5412-5418)
  1915. Kleiner M and Rimoldi B Asymptotically optimal joint source-channel coding with minimal delay Proceedings of the 28th IEEE conference on Global telecommunications, (5252-5256)
  1916. Li C, Zou J, Xiong H and Zhang Y Joint coding/routing optimization for correlated sources in wireless visual sensor networks Proceedings of the 28th IEEE conference on Global telecommunications, (4654-4661)
  1917. Shi W and Roy S Achieving full diversity by selection in arbitrary multi-hop amplify-and-forward relay networks Proceedings of the 28th IEEE conference on Global telecommunications, (3502-3507)
  1918. Deng J, Han Y and Liang B Fairness index based on variational distance Proceedings of the 28th IEEE conference on Global telecommunications, (3338-3343)
  1919. Ronasi K, Mohsenian-Rad A, Wong V, Gopalakrishnan S and Schober R Reliability-based rate allocation in wireless inter-session network coding systems Proceedings of the 28th IEEE conference on Global telecommunications, (3217-3222)
  1920. Wang P and Akyildiz I Spatial correlation and mobility aware traffic modeling for wireless sensor networks Proceedings of the 28th IEEE conference on Global telecommunications, (3128-3133)
  1921. Kaya A, Chiang M and Trappe W P2P-ISP cooperation Proceedings of the 28th IEEE conference on Global telecommunications, (3091-3098)
  1922. Quek T, Gowda K and Shin H Secure joint source-channel coding for quasi-static fading channels Proceedings of the 28th IEEE conference on Global telecommunications, (3026-3031)
  1923. Kim B, Kim H and Bahk S NSF Proceedings of the 28th IEEE conference on Global telecommunications, (2996-3001)
  1924. D'Alconzo A, Coluccia A, Ricciato F and Romirer-Maierhofer P A distribution-based approach to anomaly detection and application to 3G mobile traffic Proceedings of the 28th IEEE conference on Global telecommunications, (2888-2895)
  1925. Zhang R and Cioffi J Exploiting opportunistic multiuser detection in decentralized multiuser MIMO systems Proceedings of the 28th IEEE conference on Global telecommunications, (2363-2367)
  1926. Liu A, Liu Y, Xiang H and Luo W On the rate duality of MIMO interference channel and its application to sum rate maximization Proceedings of the 28th IEEE conference on Global telecommunications, (2334-2339)
  1927. Fertonani D and Duman T Multi-rate continuous phase modulations for Gaussian broadcast channels Proceedings of the 28th IEEE conference on Global telecommunications, (1733-1737)
  1928. Zanella A and Chiani M Analytical comparison of power allocation methods in MIMO systems with singular value decomposition Proceedings of the 28th IEEE conference on Global telecommunications, (1419-1425)
  1929. Masiero R, Quer G, Munaretto D, Rossi M, Widmer J and Zorzi M Data acquisition through joint compressive sensing and principal component analysis Proceedings of the 28th IEEE conference on Global telecommunications, (1271-1276)
  1930. ACM
    Ahmed F, Hameed H, Shafiq M and Farooq M Using spatio-temporal information in API calls with machine learning algorithms for malware detection Proceedings of the 2nd ACM workshop on Security and artificial intelligence, (55-62)
  1931. Liao S and Chung A Face recognition with salient local gradient orientation binary patterns Proceedings of the 16th IEEE international conference on Image processing, (3281-3284)
  1932. Agostini M, Antonini M and Kieffer M MAP estimation of multiple description encoded video transmitted over noisy channels Proceedings of the 16th IEEE international conference on Image processing, (3033-3036)
  1933. Park J, Jang U, Oh T, Lee S and Bovik A Optimal power allocation for minimizing visual distortion over MIMO communication systems Proceedings of the 16th IEEE international conference on Image processing, (1813-1816)
  1934. Estellers V, Gurban M and Thiran J Selecting relevant visual features for speechreading Proceedings of the 16th IEEE international conference on Image processing, (1417-1420)
  1935. González-Jiménez D, Argones-Rúa E, Pérez-González F and Alba-Castro J Modeling magnitudes of Gabor coefficients Proceedings of the 16th IEEE international conference on Image processing, (1237-1240)
  1936. Zöllei L and Wells W On the optimality of mutual information as an image registration objective function Proceedings of the 16th IEEE international conference on Image processing, (189-192)
  1937. Mayera J, Bermudez J, Leggb A, Uchôa-Filho B, Mukherjee D, Said A, Samadani R and Simske S Design of high capacity 3D print codes aiming for robustness to the PS channel and external distortions Proceedings of the 16th IEEE international conference on Image processing, (105-108)
  1938. ACM
    Choudhuri C and Mitra U Capacity bounds and power allocation for underwater acoustic relay channels with ISI Proceedings of the 4th International Workshop on Underwater Networks, (1-8)
  1939. ACM
    Hsiao J and Chen M Intention-focused active reranking for image object retrieval Proceedings of the 18th ACM conference on Information and knowledge management, (157-166)
  1940. ACM
    White R and Dumais S Characterizing and predicting search engine switching behavior Proceedings of the 18th ACM conference on Information and knowledge management, (87-96)
  1941. De Abreu G Supertight algebraic bounds on the Gaussian Q-function Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (948-951)
  1942. Nasr O and Daneshrad B Design and FPGA implementation an accurate real time 3x4 MIMO channel emulator Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (764-768)
  1943. Do Carmo F, De Assis J, Estrela V and Coelho A Blind signal separation and identification of mixtures of images Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (337-342)
  1944. Chatterjee D, Wong T and Oyman O Achievable rates in cognitive radio networks Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (35-39)
  1945. Taylor R, Singhal M, Daly D, Gilmore J, Cannon W, Domico K, White A, Auberry D, Auberry K, Hooker B, Hurst G, McDermott J, McDonald W, Pelletier D, Schmoyer D and Wiley H (2009). An analysis pipeline for the inference of protein-protein interaction networks, International Journal of Data Mining and Bioinformatics, 3:4, (409-430), Online publication date: 1-Nov-2009.
  1946. ACM
    Kamat P, Xu W, Trappe W and Zhang Y (2009). Temporal privacy in wireless sensor networks, ACM Transactions on Sensor Networks, 5:4, (1-24), Online publication date: 1-Nov-2009.
  1947. Pei Y, Liang Y, Teh K and Li K (2009). How much time is needed for wideband spectrum sensing?, IEEE Transactions on Wireless Communications, 8:11, (5466-5471), Online publication date: 1-Nov-2009.
  1948. Benavent A, Ruiz F and Sáez J (2009). Learning Gaussian mixture models with entropy-based criteria, IEEE Transactions on Neural Networks, 20:11, (1756-1771), Online publication date: 1-Nov-2009.
  1949. Yard J and Devetak I (2009). Optimal quantum source coding with quantum side information at the encoder and decoder, IEEE Transactions on Information Theory, 55:11, (5339-5351), Online publication date: 1-Nov-2009.
  1950. Liu N and Goldsmith A (2009). Capacity regions and bounds for a class of Z-interference channels, IEEE Transactions on Information Theory, 55:11, (4986-4994), Online publication date: 1-Nov-2009.
  1951. Steinberg Y (2009). Coding and common reconstruction, IEEE Transactions on Information Theory, 55:11, (4995-5010), Online publication date: 1-Nov-2009.
  1952. Raja A, Prabhakaran V and Viswanath P (2009). The two-user compound interference channel, IEEE Transactions on Information Theory, 55:11, (5100-5120), Online publication date: 1-Nov-2009.
  1953. Dai W, Liu Y, Rider B and Lau V (2009). On the information rate of MIMO systems with finite rate channel state feedback using beamforming and power on/off strategy, IEEE Transactions on Information Theory, 55:11, (5032-5047), Online publication date: 1-Nov-2009.
  1954. Weingarten H, Liu T, Shamai S, Steinberg Y and Viswanath P (2009). The capacity region of the degraded multiple-input multiple-output compound broadcast channel, IEEE Transactions on Information Theory, 55:11, (5011-5023), Online publication date: 1-Nov-2009.
  1955. Méasson C, Montanari A, Richardson T and Urbanke R (2009). The generalized area theorem and some of its consequences, IEEE Transactions on Information Theory, 55:11, (4793-4821), Online publication date: 1-Nov-2009.
  1956. Ng C, Gündüz D, Goldsmith A and Erkip E (2009). Distortion minimization in Gaussian layered broadcast coding with successive refinement, IEEE Transactions on Information Theory, 55:11, (5074-5086), Online publication date: 1-Nov-2009.
  1957. Zhang R, Cui S and Liang Y (2009). On ergodic sum capacity of fading cognitive multiple-access and broadcast channels, IEEE Transactions on Information Theory, 55:11, (5161-5178), Online publication date: 1-Nov-2009.
  1958. Tagliasacchi M, Valenzise G and Tubaro S (2009). Hash-based identification of sparse image tampering, IEEE Transactions on Image Processing, 18:11, (2491-2504), Online publication date: 1-Nov-2009.
  1959. Wu J, Wang Z and Vojcic B (2009). Partial iterative decoding for binary turbo codes via cross-entropy based bit selection, IEEE Transactions on Communications, 57:11, (3298-3306), Online publication date: 1-Nov-2009.
  1960. Devillers B and Vandendorpe L (2009). Bit rate comparison of adaptive OFDM and cyclic prefixed single-with DFE, IEEE Communications Letters, 13:11, (838-840), Online publication date: 1-Nov-2009.
  1961. Kashef R and Kamel M (2009). Enhanced bisecting k-means clustering using intermediate cooperation, Pattern Recognition, 42:11, (2557-2569), Online publication date: 1-Nov-2009.
  1962. ACM
    Liu D and Hua K Transfer non-metric measures into metric for similarity search Proceedings of the 17th ACM international conference on Multimedia, (693-696)
  1963. He G, Betz S and Debbah M Game-theoretic deployment design of small-cell OFDM networks Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-6)
  1964. Perlaza S, Belmega E, Lasaulce S and Debbah M On the base station selection and base station sharing in self-configuring networks Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-10)
  1965. Zoppoli P, Morganella S and Ceccarelli M An information theoretic approach to reverse engineering of regulatory gene networks from time-course data Proceedings of the 6th international conference on Computational intelligence methods for bioinformatics and biostatistics, (97-111)
  1966. Moses M and Chirikjian G Simple components for a reconfigurable modular robotic system Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (1478-1483)
  1967. Faria D and Dias J 3D hand trajectory segmentation by curvatures and hand orientation for classification through a probabilistic approach Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (1284-1289)
  1968. Rohrmüller F, Lidoris G, Wollherr D and Buss M System interdependence analysis for autonomous mobile robots Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (696-701)
  1969. Wang X and Meng M In situ analysis of capsule endoscopy images and preliminary results Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (5737-5742)
  1970. Alempijevic A, Kodagoda S and Dissanayake G Cross-modal localization through mutual information Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (5597-5602)
  1971. Dębowski Ł Computable Bayesian compression for uniformly discretizable statistical models Proceedings of the 20th international conference on Algorithmic learning theory, (53-67)
  1972. Clarkson M, Myers A and Schneider F (2009). Quantifying information flow with beliefs, Journal of Computer Security, 17:5, (655-701), Online publication date: 1-Oct-2009.
  1973. ACM
    Guha S, McGregor A and Venkatasubramanian S (2009). Sublinear estimation of entropy and information distances, ACM Transactions on Algorithms, 5:4, (1-16), Online publication date: 1-Oct-2009.
  1974. ACM
    Masri W and Podgurski A (2009). Measuring the strength of information flows in programs, ACM Transactions on Software Engineering and Methodology, 19:2, (1-33), Online publication date: 1-Oct-2009.
  1975. Gao S, Qian L and Vaman D (2009). Distributed energy efficient spectrum access in cognitive radio wireless ad hoc networks, IEEE Transactions on Wireless Communications, 8:10, (5202-5213), Online publication date: 1-Oct-2009.
  1976. Zhou X, Ma J, Li G, Kwon Y and Soong A (2009). Probability-based optimization of inter-sensing duration and power control in cognitive radio, IEEE Transactions on Wireless Communications, 8:10, (4922-4927), Online publication date: 1-Oct-2009.
  1977. Mo R and Chew Y (2009). Precoder design for non-regenerative MIMO relay systems, IEEE Transactions on Wireless Communications, 8:10, (5041-5049), Online publication date: 1-Oct-2009.
  1978. Zhao S and Raychaudhuri D (2009). Scalability and performance evaluation of hierarchical hybrid wireless networks, IEEE/ACM Transactions on Networking, 17:5, (1536-1549), Online publication date: 1-Oct-2009.
  1979. Li Y, Li Z, Chiang M and Calderbank A (2009). Content-aware distortion-fair video streaming in congested networks, IEEE Transactions on Multimedia, 11:6, (1182-1193), Online publication date: 1-Oct-2009.
  1980. Dai R and Akyildiz I (2009). A spatial correlation model for visual information in wireless multimedia sensor networks, IEEE Transactions on Multimedia, 11:6, (1148-1159), Online publication date: 1-Oct-2009.
  1981. Sanderovich A, Shamai S and Steinberg Y (2009). Distributed MIMO receiver, IEEE Transactions on Information Theory, 55:10, (4419-4438), Online publication date: 1-Oct-2009.
  1982. Shafiee S and Ulukus S (2009). Mutual information games in multiuser channels with correlated jamming, IEEE Transactions on Information Theory, 55:10, (4598-4607), Online publication date: 1-Oct-2009.
  1983. Tandon R and Ulukus S (2009). Outer bounds for multiple-access channels with feedback using dependence balance, IEEE Transactions on Information Theory, 55:10, (4494-4507), Online publication date: 1-Oct-2009.
  1984. Tian C and Chen J (2009). Remote vector Gaussian source coding with decoder side information under mutual information and distortion constraints, IEEE Transactions on Information Theory, 55:10, (4676-4680), Online publication date: 1-Oct-2009.
  1985. Nair C and El Gamal A (2009). The capacity region of a class of three-receiver broadcast channels with degraded message sets, IEEE Transactions on Information Theory, 55:10, (4479-4493), Online publication date: 1-Oct-2009.
  1986. Xu J, Cao Y and Chen B (2009). Capacity bounds for broadcast channels with confidential messages, IEEE Transactions on Information Theory, 55:10, (4529-4542), Online publication date: 1-Oct-2009.
  1987. Tchamkerten A, Chandar V and Wornell G (2009). Communication under strong asynchronism, IEEE Transactions on Information Theory, 55:10, (4508-4528), Online publication date: 1-Oct-2009.
  1988. Zhou N and Abouzeid A (2009). Information theoretic analysis of proactive routing overhead in mobile ad hoc networks, IEEE Transactions on Information Theory, 55:10, (4608-4625), Online publication date: 1-Oct-2009.
  1989. Ugarriza L, Saber E, Vantaram S, Amuso V, Shaw M and Bhaskar R (2009). Automatic image segmentation by dynamic region growth and multiresolution merging, IEEE Transactions on Image Processing, 18:10, (2275-2288), Online publication date: 1-Oct-2009.
  1990. Wang T, Chang L and Chen P (2009). A collaborative sensor-fault detection scheme for robust distributed estimation in sensor networks, IEEE Transactions on Communications, 57:10, (3045-3058), Online publication date: 1-Oct-2009.
  1991. Zhang R (2009). On achievable rates of two-path successive relaying, IEEE Transactions on Communications, 57:10, (2914-2917), Online publication date: 1-Oct-2009.
  1992. Gómez-Verdejo V, Verleysen M and Fleury J (2009). Information-theoretic feature selection for functional data classification, Neurocomputing, 72:16-18, (3580-3589), Online publication date: 1-Oct-2009.
  1993. Peppas K, Lazarakis F, Axiotis D, Al-Gizawi T and Alexandridis A (2009). System level performance evaluation of MIMO and SISO OFDM-based WLANs, Wireless Networks, 15:7, (859-873), Online publication date: 1-Oct-2009.
  1994. Bonchi F, Castillo C, Donato D and Gionis A (2009). Taxonomy-driven lumping for sequence mining, Data Mining and Knowledge Discovery, 19:2, (227-244), Online publication date: 1-Oct-2009.
  1995. Yan G, Eidenbenz S and Galli E SMS-Watchdog Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, (202-223)
  1996. Lu L and Wen-an Z QoE-based busy time management structure for data services Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4216-4219)
  1997. Hu H and Zhu Q Dynamic spectrum access in underlay cognitive radio system with SINR constraints Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (1552-1555)
  1998. Liu C, Schmeink A and Mathar R Efficient power allocation for OFDM with imperfect channel state information Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (1370-1373)
  1999. Li H and Sun Y Resource allocation for power-line OFDM system based on genetic algorithm Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (958-961)
  2000. Chen L and Feng D An improved histogram method for calculating extrinsic information transfer functions Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (829-831)
  2001. Mehboob Z and Yin H Information preserving empirical mode decomposition for filtering field potentials Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (226-233)
  2002. Politis D (2009). Financial time series, WIREs Computational Statistics, 1:2, (157-166), Online publication date: 23-Sep-2009.
  2003. De Oude P, Groen F and Pavlin G Efficient design and inference in distributed bayesian networks Proceedings of the 8th international tbilisi conference on Logic, language, and computation, (125-144)
  2004. Zhang H, Le Ruyet D, Roviras D and Sun H Resource allocation of noncooperative multi-cell for cognitive radio networks Proceedings of the 6th international conference on Symposium on Wireless Communication Systems, (101-105)
  2005. ACM
    Furon T and Pérez-Freire L EM decoding of tardos traitor tracing codes Proceedings of the 11th ACM workshop on Multimedia and security, (99-106)
  2006. ACM
    Ker A The square root law requires a linear key Proceedings of the 11th ACM workshop on Multimedia and security, (85-92)
  2007. Belogolovy A, Belyaev E, Sergeev A and Turlikov A Video Compression for Wireless Transmission Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces, (313-322)
  2008. ACM
    Bhagat R, Hovy E and Patwardhan S Acquiring paraphrases from text corpora Proceedings of the fifth international conference on Knowledge capture, (161-168)
  2009. ACM
    Jain R, Radhakrishnan J and Sen P (2009). A property of quantum relative entropy with an application to privacy in quantum communication, Journal of the ACM, 56:6, (1-32), Online publication date: 1-Sep-2009.
  2010. Krikidis I, Laneman J, Thompson J and McLaughlin S (2009). Protocol design and throughput analysis for multi-user cognitive cooperative systems, IEEE Transactions on Wireless Communications, 8:9, (4740-4751), Online publication date: 1-Sep-2009.
  2011. del Coso A and Simoens S (2009). Distributed compression for MIMO coordinated networks with a backhaul constraint, IEEE Transactions on Wireless Communications, 8:9, (4698-4709), Online publication date: 1-Sep-2009.
  2012. Gursoy M (2009). The impact of hard-decision detection on the energy efficiency of phase and frequency modulation, IEEE Transactions on Wireless Communications, 8:9, (4644-4655), Online publication date: 1-Sep-2009.
  2013. Zhong C, Wong K and Jin S (2009). Capacity bounds for MIMO Nakagami-m fading channels, IEEE Transactions on Signal Processing, 57:9, (3613-3623), Online publication date: 1-Sep-2009.
  2014. Calhoun V and Adali T (2009). Feature-based fusion of medical imaging data, IEEE Transactions on Information Technology in Biomedicine, 13:5, (711-720), Online publication date: 1-Sep-2009.
  2015. Piantanida P, Matz G and Duhamel P (2009). Outage behavior of discrete memoryless channels under channel estimation errors, IEEE Transactions on Information Theory, 55:9, (4221-4239), Online publication date: 1-Sep-2009.
  2016. Cao G, Bouman C and Webb K (2009). Noniterative map reconstruction using sparse matrix representations, IEEE Transactions on Image Processing, 18:9, (2085-2099), Online publication date: 1-Sep-2009.
  2017. Chen Z and Ji C (2009). An information-theoretic view of network-aware malware attacks, IEEE Transactions on Information Forensics and Security, 4:3, (530-541), Online publication date: 1-Sep-2009.
  2018. Oka A and Lampe L (2009). Data extraction from wireless sensor networks using distributed fountain codes, IEEE Transactions on Communications, 57:9, (2607-2618), Online publication date: 1-Sep-2009.
  2019. Huang K, Lau V and Chen Y (2009). Spectrum sharing between cellular and mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, 27:7, (1256-1267), Online publication date: 1-Sep-2009.
  2020. Haenggi M, Andrews J, Baccelli F, Dousse O and Franceschetti M (2009). Stochastic geometry and random graphs for the analysis and design of wireless networks, IEEE Journal on Selected Areas in Communications, 27:7, (1029-1046), Online publication date: 1-Sep-2009.
  2021. Bhatnagar J and Kumar A (2009). On estimating performance indices for biometric identification, Pattern Recognition, 42:9, (1803-1815), Online publication date: 1-Sep-2009.
  2022. Veyrat-Charvillon N and Standaert F Mutual Information Analysis Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (429-443)
  2023. ACM
    Liu X, Sheth A, Kaminsky M, Papagiannaki K, Seshan S and Steenkiste P (2009). DIRC, ACM SIGCOMM Computer Communication Review, 39:4, (171-182), Online publication date: 16-Aug-2009.
  2024. ACM
    Liu X, Sheth A, Kaminsky M, Papagiannaki K, Seshan S and Steenkiste P DIRC Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (171-182)
  2025. Fang X Are you becoming a diabetic? a data mining approach Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (18-22)
  2026. Zhao C, Peng Q, Zhao C and Sun S Chinese text automatic summarization based on affinity propagation cluster Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 1, (425-429)
  2027. Yang X, Procopiuc C and Srivastava D (2009). Summarizing relational databases, Proceedings of the VLDB Endowment, 2:1, (634-645), Online publication date: 1-Aug-2009.
  2028. Wang C, Fan Y, Thompson J and Poor H (2009). A comprehensive study of repetition-coded protocols in multi-user multi-relay networks, IEEE Transactions on Wireless Communications, 8:8, (4329-4339), Online publication date: 1-Aug-2009.
  2029. Gursoy M, Qiao D and Velipasalar S (2009). Analysis of energy efficiency in fading channels under QoS constraints, IEEE Transactions on Wireless Communications, 8:8, (4252-4263), Online publication date: 1-Aug-2009.
  2030. Borran M, Sabharwal A and Aazhang B (2009). Design criterion and construction methods for partially coherent multiple antenna constellations, IEEE Transactions on Wireless Communications, 8:8, (4122-4133), Online publication date: 1-Aug-2009.
  2031. Bhatnagar M, Hjørungnes A and Song L (2009). Differential coding for non-orthogonal space-time block codes with non-unitary constellations over arbitrarily correlated Rayleigh channels, IEEE Transactions on Wireless Communications, 8:8, (3985-3995), Online publication date: 1-Aug-2009.
  2032. Zhu H, Schizas I and Giannakis G (2009). Power-efficient dimensionality reduction for distributed channel-aware kalman tracking using WSNs, IEEE Transactions on Signal Processing, 57:8, (3193-3207), Online publication date: 1-Aug-2009.
  2033. Koch T, Lapidoth A and Sotiriadis P (2009). Channels that heat up, IEEE Transactions on Information Theory, 55:8, (3594-3612), Online publication date: 1-Aug-2009.
  2034. Payaró M and Palomar D (2009). Hessian and concavity of mutual information, differential entropy, and entropy power in linear vector Gaussian channels, IEEE Transactions on Information Theory, 55:8, (3613-3628), Online publication date: 1-Aug-2009.
  2035. Sanderovich A, Somekh O, Poor H and Shamai S (2009). Uplink macro diversity of limited backhaul cellular network, IEEE Transactions on Information Theory, 55:8, (3457-3478), Online publication date: 1-Aug-2009.
  2036. Li T and Collins O (2009). Design and analysis of successive decoding with finite levels for the Markov channel, IEEE Transactions on Information Theory, 55:8, (3526-3543), Online publication date: 1-Aug-2009.
  2037. Shrader B and Permuter H (2009). Feedback capacity of the compound channel, IEEE Transactions on Information Theory, 55:8, (3629-3644), Online publication date: 1-Aug-2009.
  2038. Coleman T, Martinian E and Ordentlich E (2009). Joint source-channel coding for transmitting correlated sources over broadcast networks, IEEE Transactions on Information Theory, 55:8, (3864-3868), Online publication date: 1-Aug-2009.
  2039. Charalambous C, Denic S and Constantinou C (2009). Capacity of the class of MIMO channels with incomplete CDI, IEEE Transactions on Information Theory, 55:8, (3725-3734), Online publication date: 1-Aug-2009.
  2040. Pelckmans K, De Brabanter J, Suykens J and De Moor B (2009). Least conservative support and tolerance tubes, IEEE Transactions on Information Theory, 55:8, (3799-3806), Online publication date: 1-Aug-2009.
  2041. Do H and Chung S (2009). Linear beamforming and superposition coding with common information for the Gaussian MIMO broadcast channel, IEEE Transactions on Communications, 57:8, (2484-2494), Online publication date: 1-Aug-2009.
  2042. Feldbauer C and Kleijn W (2009). Scalable coding with side information for packet loss recovery, IEEE Transactions on Communications, 57:8, (2309-2319), Online publication date: 1-Aug-2009.
  2043. Sandstrom L, Schneider K, Joiner L and Wilson A (2009). Spatial correlation of alien crosstalk in MIMO DSL systems, IEEE Transactions on Communications, 57:8, (2269-2271), Online publication date: 1-Aug-2009.
  2044. Li Q, Li K and Teh K (2009). An achievable rate region of cooperative multiple-access channels with hybrid CF and DF cooperation, IEEE Communications Letters, 13:8, (591-593), Online publication date: 1-Aug-2009.
  2045. Ping L, Tong J, Yuan X and Guo Q (2009). Superposition coded modulation and iterative linear MMSE detection, IEEE Journal on Selected Areas in Communications, 27:6, (995-1004), Online publication date: 1-Aug-2009.
  2046. Braun C, Chatzikokolakis K and Palamidessi C (2009). Quantitative Notions of Leakage for One-try Attacks, Electronic Notes in Theoretical Computer Science (ENTCS), 249, (75-91), Online publication date: 1-Aug-2009.
  2047. Palladini A, Testoni N, De Marchi L and Speciale N (2009). A reduced complexity estimation algorithm for ultrasound images de-blurring, Computer Methods and Programs in Biomedicine, 95:2, (S4-S11), Online publication date: 1-Aug-2009.
  2048. Vereshchagin N Algorithmic Minimal Sufficient Statistic Revisited Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice, (478-487)
  2049. ACM
    Goudelis G, Tefas A and Pitas I Using mutual information to indicate facial poses in video sequences Proceedings of the ACM International Conference on Image and Video Retrieval, (1-4)
  2050. ACM
    Shafiq M, Tabish S and Farooq M On the appropriateness of evolutionary rule learning algorithms for malware detection Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2609-2616)
  2051. ACM
    Rahmann S, Marschall T, Behler F and Kramer O Modeling evolutionary fitness for DNA motif discovery Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (225-232)
  2052. Hodtani G and Aref M (2009). On the Devroye-Mitran-Tarokh rate region for the cognitive radio channel, IEEE Transactions on Wireless Communications, 8:7, (3458-3461), Online publication date: 1-Jul-2009.
  2053. Yune T, Lim J and Im G (2009). Iterative multiuser detection with spectral efficient relaying protocols for single-carrier transmission, IEEE Transactions on Wireless Communications, 8:7, (3789-3797), Online publication date: 1-Jul-2009.
  2054. Chatzinotas S, Imran M and Hoshyar R (2009). On the multicell processing capacity of the cellular MIMO uplink channel in correlated Rayleigh fading environment, IEEE Transactions on Wireless Communications, 8:7, (3704-3715), Online publication date: 1-Jul-2009.
  2055. Martini A, Massa A and Franceschetti M (2009). Physical limits to the capacity of wide-band Gaussian MIMO channels, IEEE Transactions on Wireless Communications, 8:7, (3396-3400), Online publication date: 1-Jul-2009.
  2056. Luo Z and Huang D (2009). Integrated MAP detection for V-BLAST systems without channel estimation, IEEE Transactions on Wireless Communications, 8:7, (3590-3596), Online publication date: 1-Jul-2009.
  2057. Hui D and Lau V (2009). Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT, IEEE Transactions on Wireless Communications, 8:7, (3484-3491), Online publication date: 1-Jul-2009.
  2058. Vaze R and Heath R (2009). To code in space and time or not in multihop relay channels, IEEE Transactions on Signal Processing, 57:7, (2736-2747), Online publication date: 1-Jul-2009.
  2059. Luo Z and Zhang S (2009). Duality gap estimation and polynomial time approximation for optimal spectrum management, IEEE Transactions on Signal Processing, 57:7, (2675-2689), Online publication date: 1-Jul-2009.
  2060. Gohary R, Huang Y, Luo Z and Pang J (2009). A generalized iterative water-filling algorithm for distributed power control in the presence of a jammer, IEEE Transactions on Signal Processing, 57:7, (2660-2674), Online publication date: 1-Jul-2009.
  2061. Tzortzis G and Likas A (2009). The global kernel k-means algorithm for clustering in feature space, IEEE Transactions on Neural Networks, 20:7, (1181-1194), Online publication date: 1-Jul-2009.
  2062. Yang D, Horodecki K, Horodecki M, Horodecki P, Oppenheim J and Song W (2009). Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof, IEEE Transactions on Information Theory, 55:7, (3375-3387), Online publication date: 1-Jul-2009.
  2063. Fraysse A, Pesquet-Popescu B and Pesquet J (2009). On the uniform quantization of a class of sparse sources, IEEE Transactions on Information Theory, 55:7, (3243-3263), Online publication date: 1-Jul-2009.
  2064. Berlin P, Nakiboǧlu B, Rimoldi B and Telatar E (2009). A simple converse of Burnashev's reliability function, IEEE Transactions on Information Theory, 55:7, (3074-3080), Online publication date: 1-Jul-2009.
  2065. Marco D and Effros M (2009). On lossless coding with coded side information, IEEE Transactions on Information Theory, 55:7, (3284-3296), Online publication date: 1-Jul-2009.
  2066. Bardera A, Rigau J, Boada I, Feixas M and Sbert M (2009). Image segmentation using information bottleneck method, IEEE Transactions on Image Processing, 18:7, (1601-1612), Online publication date: 1-Jul-2009.
  2067. Wong Y, Cohen M and Abshire P (2009). A 750-MHz 6-b adaptive floating-gate quantizer in 0.35-µm CMOS, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:7, (1301-1312), Online publication date: 1-Jul-2009.
  2068. Fertonani D and Colavolpe G (2009). On reliable communications over channels impaired by bursty impulse noise, IEEE Transactions on Communications, 57:7, (2024-2030), Online publication date: 1-Jul-2009.
  2069. Sanaei A, Ramezani M and Ardakani M (2009). Identical-capacity channel decomposition for design of universal LDPC codes, IEEE Transactions on Communications, 57:7, (1972-1981), Online publication date: 1-Jul-2009.
  2070. Badia L, Levorato M and Zorzi M (2009). A channel representation method for the study of hybrid retransmission-based error control, IEEE Transactions on Communications, 57:7, (1959-1971), Online publication date: 1-Jul-2009.
  2071. Hanafizadeh P, Hanafizadeh M and Khodabakhshi M (2009). Extracting Core ICT Indicators Using Entropy Method, The Information Society, 25:4, (236-247), Online publication date: 1-Jul-2009.
  2072. Liu H, Sun J, Liu L and Zhang H (2009). Feature selection with dynamic mutual information, Pattern Recognition, 42:7, (1330-1339), Online publication date: 1-Jul-2009.
  2073. Almustafa K, Primak S, Willink T and Baddour K (2009). On Achievable Data Rates and Optimal Power Allocation in Fading Channels with Imperfect Channel State Information, Wireless Personal Communications: An International Journal, 50:1, (69-81), Online publication date: 1-Jul-2009.
  2074. Pattaraintakorn P Entropy Measures of Flow Graphs with Applications to Decision Trees Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology, (618-625)
  2075. ACM
    Este A, Gringoli F and Salgarelli L (2009). On the stability of the information carried by traffic flow features at the packet level, ACM SIGCOMM Computer Communication Review, 39:3, (13-18), Online publication date: 30-Jun-2009.
  2076. ACM
    Ge T, Zdonik S and Madden S Top-k queries on uncertain data Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (375-388)
  2077. Qiu X, Miao Y and Wu L Face recognition with info-margin maximization Proceedings of the 2009 IEEE international conference on Multimedia and Expo, (1062-1065)
  2078. ACM
    Tabish S, Shafiq M and Farooq M Malware detection using statistical analysis of byte-level file content Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, (23-31)
  2079. ACM
    Shaparenko B, Çetin Ö and Iyer R Data-driven text features for sponsored search click prediction Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising, (46-54)
  2080. ACM
    Fuxman A, Kannan A, Goldberg A, Agrawal R, Tsaparas P and Shafer J Improving classification accuracy using automatically extracted training data Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1145-1154)
  2081. ACM
    Zheng L, Wang S, Liu Y and Lee C Information theoretic regularization for semi-supervised boosting Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1017-1026)
  2082. Vamsi Krishna T and Das A (2009). A survey on MAC protocols in OSA networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:9, (1377-1394), Online publication date: 25-Jun-2009.
  2083. Malo J and Laparra V Visual cortex performs a sort of non-linear ICA Proceedings of the 2009 international conference on Advances in Nonlinear Speech Processing, (17-25)
  2084. Elnaggar M and Kempf A On a generic entropy measure in physics and information Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (495-499)
  2085. Huang K, Lau V and Chen Y Spectrum sharing between cellular and mobile ad hoc networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (121-130)
  2086. El Haddad R, Smith B and Vishwanath S On models for multi-user Gaussian channels with fading Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (10-15)
  2087. Wang W, Ong L and Motani M Transmission schedule optimization for half-duplex multiple-relay networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (1-9)
  2088. Amir A, Aumann Y, Levy A and Roshko Y Quasi-distinct Parsing and Optimal Compression Methods Proceedings of the 20th Annual Symposium on Combinatorial Pattern Matching - Volume 5577, (12-25)
  2089. Karande S, Wang Z, Sadjadpour H and Garcia-Luna-Aceves J Multicast throughput order of network coding in wireless ad-hoc networks Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (235-243)
  2090. ACM
    Anderson E, Phillips C, Gonzales H, Bauer K, Sicker D and Grunwald D SniffMob Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements, (1-6)
  2091. Chmiel A, Kowalska K and Holyst J Statistical Properties of Portals' Users Activity Proceedings of the 2009 International Workshop on Social Informatics, (41-45)
  2092. ACM
    Yu C, Ruttik K and Tirkkonen O Design of adaptive modulation and coding system using ideal performance codes Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (222-226)
  2093. ACM
    Galeas P, Kretschmer R and Freisleben B Document relevance assessment via term distribution analysis using fourier series expansion Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries, (277-284)
  2094. Golshani L, Pasha E and Yari G (2009). Some properties of Rényi entropy and Rényi entropy rate, Information Sciences: an International Journal, 179:14, (2426-2433), Online publication date: 15-Jun-2009.
  2095. Yuan W, Liu W, Cheng W and Wang S Variable-width channel allocation in wireless LAN Proceedings of the 2009 IEEE international conference on Communications, (4869-4874)
  2096. Sethi A, Chaporkar P and Karandikar A Power optimal signaling for fading multi-access channel in presence of coding gap Proceedings of the 2009 IEEE international conference on Communications, (4326-4330)
  2097. Matamoros J and Antón-Haro C To sort or not to sort Proceedings of the 2009 IEEE international conference on Communications, (3940-3944)
  2098. Goel S and Negi R Analysis of delay statistics for the queued-code Proceedings of the 2009 IEEE international conference on Communications, (3803-3808)
  2099. Zhou N, Zhu X, Huang Y and Lin H Adaptive resource allocation for multi-destination relay systems based on OFDM modulation Proceedings of the 2009 IEEE international conference on Communications, (3760-3764)
  2100. Yu C, Tirkkonen O, Doppler K and Ribeiro C Power optimization of device-to-device communication underlaying cellular communication Proceedings of the 2009 IEEE international conference on Communications, (3696-3700)
  2101. Yim R, Molisch A and Zhang J Optimization of split-and-combine relaying Proceedings of the 2009 IEEE international conference on Communications, (3627-3631)
  2102. Je H, Kim D and Lee K Joint precoding for MIMO-relay systems with partial channel state information Proceedings of the 2009 IEEE international conference on Communications, (3460-3464)
  2103. Stupia I, Giannetti F, Lottici V, Vandendorpe L and Louveaux J BICMB-OFDM link resource adaptation Proceedings of the 2009 IEEE international conference on Communications, (3400-3404)
  2104. Tuninetti D, Zhao S, Ansari R and Schonfeld D The effect of fading correlation on average source MMSE distortion Proceedings of the 2009 IEEE international conference on Communications, (3367-3372)
  2105. Ren S and Letaief K Minimum sum expected distortion in cooperative networks Proceedings of the 2009 IEEE international conference on Communications, (3296-3300)
  2106. Yao W, Chen S, Tan S and Hanzo L Particle swarm optimisation aided minimum bit error rate multiuser transmission Proceedings of the 2009 IEEE international conference on Communications, (3114-3118)
  2107. Manchón C, Fleury B, Kirkelund G, Mogensen P, Deneire L, Sørensen T and Rom C Channel estimation based on divergence minimization for OFDM sytems with co-channel interference Proceedings of the 2009 IEEE international conference on Communications, (3081-3086)
  2108. Christensen S, Agarwal R, de Carvalho E and Cioffi J Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design Proceedings of the 2009 IEEE international conference on Communications, (2945-2950)
  2109. Zeng M, Zhang R and Cui S Optimal transmission for dying channels Proceedings of the 2009 IEEE international conference on Communications, (2053-2057)
  2110. Courtade T and Wesel R A cross-layer perspective on rateless coding for wireless channels Proceedings of the 2009 IEEE international conference on Communications, (1870-1875)
  2111. Jin S, McKay M, Wong K and Li X Low SNR capacity of double-scattering MIMO channels with transmitter channel knowledge Proceedings of the 2009 IEEE international conference on Communications, (1779-1783)
  2112. Fertonani D and Duman T Upper bounding the deletion channel capacity by auxiliary memoryless channels Proceedings of the 2009 IEEE international conference on Communications, (1758-1762)
  2113. Zhang R, Kang X and Liang Y Protecting primary users in cognitive radio networks Proceedings of the 2009 IEEE international conference on Communications, (1706-1710)
  2114. Tandon R and Ulukus S On the capacity region of the Gaussian multiple access channel with noisy feedback Proceedings of the 2009 IEEE international conference on Communications, (1606-1610)
  2115. Smith K, Al-Shaer E and Elbadawi K Information theoretic approach for characterizing spam botnets based on traffic properties Proceedings of the 2009 IEEE international conference on Communications, (646-650)
  2116. Dai R and Akyildiz I Joint effect of multiple correlated cameras in wireless multimedia sensor networks Proceedings of the 2009 IEEE international conference on Communications, (143-147)
  2117. ACM
    Vinh N, Epps J and Bailey J Information theoretic measures for clusterings comparison Proceedings of the 26th Annual International Conference on Machine Learning, (1073-1080)
  2118. ACM
    Roy S, Lane T and Werner-Washburne M Learning structurally consistent undirected probabilistic graphical models Proceedings of the 26th Annual International Conference on Machine Learning, (905-912)
  2119. ACM
    Bouchard G and Zoeter O Split variational inference Proceedings of the 26th Annual International Conference on Machine Learning, (57-64)
  2120. ACM
    Ma X, Wan W and Jiao L Spectral clustering ensemble for image segmentation Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (415-420)
  2121. Li Y, Tuncel E and Chen J Optimal tracking over an additive white Gaussian noise channel Proceedings of the 2009 conference on American Control Conference, (4026-4031)
  2122. Chattopadhyay I and Ray A Optimal path-planning under finite memory obstacle dynamics based on probabilistic finite state automata models Proceedings of the 2009 conference on American Control Conference, (2403-2408)
  2123. Ko C and Shi L Scheduling for finite time consensus Proceedings of the 2009 conference on American Control Conference, (1982-1986)
  2124. Deng K, Sun Y, Mehta P and Meyn S An information-theoretic framework to aggregate a Markov chain Proceedings of the 2009 conference on American Control Conference, (731-736)
  2125. Wu N, Shin J and Huang K Sensor maneuver design for microwave source localization Proceedings of the 2009 conference on American Control Conference, (233-239)
  2126. Piera F and Parada P (2009). On convergence properties of Shannon entropy, Problems of Information Transmission, 45:2, (75-94), Online publication date: 1-Jun-2009.
  2127. Sulyman A, Takahara G, Hassanein H and Kousa M (2009). Multi-hop capacity of MIMO-multiplexing relaying systems, IEEE Transactions on Wireless Communications, 8:6, (3095-3103), Online publication date: 1-Jun-2009.
  2128. Kiani S, Gesbert D, Gjendemsjø A and Øien G (2009). Distributed power allocation for interfering wireless links based on channel information partitioning, IEEE Transactions on Wireless Communications, 8:6, (3004-3015), Online publication date: 1-Jun-2009.
  2129. Oka A and Lampe L (2009). Incremental distributed identification of Markov random field models in wireless sensor networks, IEEE Transactions on Signal Processing, 57:6, (2396-2405), Online publication date: 1-Jun-2009.
  2130. Cai C and Ferrari S (2009). Information-driven sensor path planning by approximate cell decomposition, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:3, (672-689), Online publication date: 1-Jun-2009.
  2131. Ferrari S and Cai C (2009). Information-driven search strategies in the board game of CLUE®, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:3, (607-625), Online publication date: 1-Jun-2009.
  2132. Hu Y, Chiu D and Lui J (2009). Entropy based adaptive flow aggregation, IEEE/ACM Transactions on Networking, 17:3, (698-711), Online publication date: 1-Jun-2009.
  2133. Soltani S, Misra K and Radha H (2009). Delay constraint error control protocol for real-time video communication, IEEE Transactions on Multimedia, 11:4, (742-751), Online publication date: 1-Jun-2009.
  2134. Sung Y, Poor H and Yu H (2009). How much information can one get from a wireless ad hoc sensor network over a correlated random field?, IEEE Transactions on Information Theory, 55:6, (2827-2847), Online publication date: 1-Jun-2009.
  2135. Datta N (2009). Min- and max-relative entropies and a new entanglement monotone, IEEE Transactions on Information Theory, 55:6, (2816-2826), Online publication date: 1-Jun-2009.
  2136. Liu T and Shamai S (2009). A note on the secrecy capacity of the multiple-antenna wiretap channel, IEEE Transactions on Information Theory, 55:6, (2547-2553), Online publication date: 1-Jun-2009.
  2137. Tong J, Ping L and Ma X (2009). Superposition coded modulation with peak-power limitation, IEEE Transactions on Information Theory, 55:6, (2562-2576), Online publication date: 1-Jun-2009.
  2138. Martinez A, Fàbregas A, Caire G and Willems F (2009). Bit-interleaved coded modulation revisited, IEEE Transactions on Information Theory, 55:6, (2756-2765), Online publication date: 1-Jun-2009.
  2139. Jing Y and Jafarkhani H (2009). Network beamforming using relays with perfect channel information, IEEE Transactions on Information Theory, 55:6, (2499-2517), Online publication date: 1-Jun-2009.
  2140. Philosof T and Zamir R (2009). On the loss of single-letter characterization, IEEE Transactions on Information Theory, 55:6, (2442-2454), Online publication date: 1-Jun-2009.
  2141. Williams D (2009). Bayesian data fusion of multiview synthetic aperture sonar iagery for seabed classification, IEEE Transactions on Image Processing, 18:6, (1239-1254), Online publication date: 1-Jun-2009.
  2142. Fei C, Kwong R and Kundur D (2009). A hypothesis testing approach to semifragile watermark-based authentication, IEEE Transactions on Information Forensics and Security, 4:2, (179-192), Online publication date: 1-Jun-2009.
  2143. Srinivasa S and McLaughlin S (2009). Capacity bounds for two-dimensional asymmetric M-ary (0, k) and (d,∞) runlength-limited channels, IEEE Transactions on Communications, 57:6, (1584-1587), Online publication date: 1-Jun-2009.
  2144. Wernersson N, Karlsson J and Skoglund M (2009). Distributed quantization over noisy channels, IEEE Transactions on Communications, 57:6, (1693-1700), Online publication date: 1-Jun-2009.
  2145. Rad M, Rusch L and Chouinard J (2009). Performance degradation of source matching in optical CDMA due to source coherence effects, IEEE Transactions on Communications, 57:6, (1776-1783), Online publication date: 1-Jun-2009.
  2146. Rey F, Lamarca M and Vazquez G (2009). Adaptive interleaver based on rate-compatible punctured convolutional codes, IEEE Transactions on Communications, 57:6, (1593-1598), Online publication date: 1-Jun-2009.
  2147. Behroozi H and Soleymani M (2009). On the optimal power-distortion tradeoff in asymmetric Gaussian sensor network, IEEE Transactions on Communications, 57:6, (1612-1617), Online publication date: 1-Jun-2009.
  2148. Zhang R, Liang Y, Chai C and Cui S (2009). Optimal beamforming for two-way multi-antenna relay channel with analogue network coding, IEEE Journal on Selected Areas in Communications, 27:5, (699-712), Online publication date: 1-Jun-2009.
  2149. Shen H, Coughlan J and Ivanchenko V (2009). Figure-ground segmentation using factor graphs, Image and Vision Computing, 27:7, (854-863), Online publication date: 1-Jun-2009.
  2150. Girardin V and Sesboüé A (2009). Comparative Construction of Plug-in Estimators of the Entropy Rate of Two-state Markov Chains, Methodology and Computing in Applied Probability, 11:2, (181-200), Online publication date: 1-Jun-2009.
  2151. Du W and Tan S An iterative reinforcement approach for fine-grained opinion mining Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (486-493)
  2152. ACM
    Ta-Shma A Short seed extractors against quantum storage Proceedings of the forty-first annual ACM symposium on Theory of computing, (401-408)
  2153. Chapman A and Sukkarieh S A protocol for decentralized multi-vehicle mapping with limited communication connectivity Proceedings of the 2009 IEEE international conference on Robotics and Automation, (841-846)
  2154. Ramah Houerbi K, Salamatian K and Kamoun F Scan Surveillance in Internet Networks Proceedings of the 8th International IFIP-TC 6 Networking Conference, (614-625)
  2155. Krause A and Guestrin C (2009). Optimal value of information in graphical models, Journal of Artificial Intelligence Research, 35:1, (557-591), Online publication date: 1-May-2009.
  2156. Grechuk B, Molyboha A and Zabarankin M (2009). Maximum Entropy Principle with General Deviation Measures, Mathematics of Operations Research, 34:2, (445-467), Online publication date: 1-May-2009.
  2157. ACM
    Ni K, Ramanathan N, Chehade M, Balzano L, Nair S, Zahedi S, Kohler E, Pottie G, Hansen M and Srivastava M (2009). Sensor network data fault types, ACM Transactions on Sensor Networks, 5:3, (1-29), Online publication date: 1-May-2009.
  2158. ACM
    Maierbacher G and Barros J (2009). Low-complexity coding and source-optimized clustering for large-scale sensor networks, ACM Transactions on Sensor Networks, 5:3, (1-32), Online publication date: 1-May-2009.
  2159. Kirsch N, Kountouriotis J, Liang C and Dandekar K (2009). Experimental evaluation of game theoretic power allocation in MIMO ad-hoc networks, IEEE Transactions on Wireless Communications, 8:5, (2292-2295), Online publication date: 1-May-2009.
  2160. Tenenbaum A and Adve R (2009). Linear processing and sum throughput in the multiuser MIMO downlink?, IEEE Transactions on Wireless Communications, 8:5, (2652-2661), Online publication date: 1-May-2009.
  2161. Zeinalpour-Yazdi Z, Nasiri-Kenari M, Aazhang B, Wehinger J and Mecklenbräuker C (2009). Bounds on the delay-constrained capacity of UWB communication with a relay node, IEEE Transactions on Wireless Communications, 8:5, (2265-2273), Online publication date: 1-May-2009.
  2162. Dai W, Rider B and Liu Y (2009). Joint beamforming for multiaccess MIMO systems with finite rate feedback, IEEE Transactions on Wireless Communications, 8:5, (2618-2628), Online publication date: 1-May-2009.
  2163. ElBatt T (2009). On the trade-offs of cooperative data compression in wireless sensor networks with spatial correlations, IEEE Transactions on Wireless Communications, 8:5, (2546-2557), Online publication date: 1-May-2009.
  2164. del Coso A and Ibars C (2009). Achievable rates for the AWGN channel with multiple parallel relays, IEEE Transactions on Wireless Communications, 8:5, (2524-2534), Online publication date: 1-May-2009.
  2165. de Moraes R, Sadjadpour H and Garcia-Luna-Aceves J (2009). Many-to-many communication for mobile ad hoc networks, IEEE Transactions on Wireless Communications, 8:5, (2388-2399), Online publication date: 1-May-2009.
  2166. Marano S, Matta V and Willett P (2009). Distributed detection with censoring sensors under physical layer secrecy, IEEE Transactions on Signal Processing, 57:5, (1976-1986), Online publication date: 1-May-2009.
  2167. Silva J and Narayanan S (2009). Discriminative wavelet packet filter bank selection for pattern recognition, IEEE Transactions on Signal Processing, 57:5, (1796-1810), Online publication date: 1-May-2009.
  2168. Fernandes A, Raginsky M and Coleman T (2009). A low-complexity universal scheme for rate-constrained distributed regression using a wireless sensor network, IEEE Transactions on Signal Processing, 57:5, (1731-1744), Online publication date: 1-May-2009.
  2169. Scutari G, Palomar D and Barbarossa S (2009). The MIMO iterative waterfilling algorithm, IEEE Transactions on Signal Processing, 57:5, (1917-1935), Online publication date: 1-May-2009.
  2170. Pedreira C, Macrini L, Land M and Costa E (2009). New decision support tool for treatment intensity choice in childhood acute lymphoblastic leukemia, IEEE Transactions on Information Technology in Biomedicine, 13:3, (284-290), Online publication date: 1-May-2009.
  2171. Armañanzas R, Calvo B, Inza I, López-Hoyos M, Martínez-Taboada V, Ucar E, Bernales I, Fullaondo A, Larrañaga P and Zubiaga A (2009). Microarray analysis of autoimmune diseases by machine learning procedures, IEEE Transactions on Information Technology in Biomedicine, 13:3, (341-350), Online publication date: 1-May-2009.
  2172. Bross S (2009). On the discrete memoryless partially cooperative relay broadcast channel and the broadcast channel with cooperating decoders, IEEE Transactions on Information Theory, 55:5, (2161-2182), Online publication date: 1-May-2009.
  2173. Tuncel E (2009). Capacity/storage tradeoff in high-dimensional identification systems, IEEE Transactions on Information Theory, 55:5, (2097-2106), Online publication date: 1-May-2009.
  2174. Chen M and Collins O (2009). Multilevel coding for nonlinear ISI channels, IEEE Transactions on Information Theory, 55:5, (2292-2303), Online publication date: 1-May-2009.
  2175. Decker T (2009). Symmetric measurements attaining the accessible information, IEEE Transactions on Information Theory, 55:5, (2375-2383), Online publication date: 1-May-2009.
  2176. Como G and Fagnani F (2009). The capacity of finite Abelian group codes over symmetric memoryless channels, IEEE Transactions on Information Theory, 55:5, (2037-2054), Online publication date: 1-May-2009.
  2177. Como G, Yüksel S and Tatikonda S (2009). The error exponent of variable-length codes over Markov channels with feedback, IEEE Transactions on Information Theory, 55:5, (2139-2160), Online publication date: 1-May-2009.
  2178. Raginsky M (2009). Joint universal lossy coding and identification of stationary mixing sources with general alphabets, IEEE Transactions on Information Theory, 55:5, (1945-1960), Online publication date: 1-May-2009.
  2179. Cai K and Yin B (2009). Software execution processes as an evolving complex network, Information Sciences: an International Journal, 179:12, (1903-1928), Online publication date: 1-May-2009.
  2180. Sung T and Bojanczyk A Cross-layer delay-constrained packet scheduling over multiuser wireless channels Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (407-412)
  2181. ACM
    Martinez-Romo J and Araujo L Web spam identification through language model analysis Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, (21-28)
  2182. ACM
    Lee J, Min J and Chung C An effective semantic search technique using ontology Proceedings of the 18th international conference on World wide web, (1057-1058)
  2183. Wang C, Jiang C, Tang S, Li X and Tang X Achievable multicast throughput for homogeneous wireless ad hoc networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2133-2138)
  2184. Rajesh R and Sharma V Amplify and forward for correlated data gathering over hierarchical sensor networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2050-2055)
  2185. Crichigno J, Wu M and Shu W Throughput optimization in wireless networks with multi-packet reception and directional antennas Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (1950-1655)
  2186. Lin S, Sheen W and Huang C Downlink performance and optimization of relay-assisted cellular networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (1274-1279)
  2187. Yilmaz E and Kiani S Transmit cooperation versus distributed coordination in interference links Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (1000-1004)
  2188. Kyung G and Wang C On the designs and challenges of practical binary dirty paper coding Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (895-900)
  2189. Li F and Jafarkhani H Resource allocation algorithms with reduced complexity in MIMO multi-hop fading channels Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (814-819)
  2190. Lo E and Letaief K Network coding versus superposition coding for two-way wireless communication Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (307-311)
  2191. Tajbksh S and Movaghar A Joint distributed source and network coding for multiple wireless unicast sessions Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (302-306)
  2192. Guo Q and Yu L An outage-optimal distributed coded cooperation scheme based on opportunistic relaying Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (268-272)
  2193. Zhao Z and Liu H (2009). Searching for interacting features in subset selection, Intelligent Data Analysis, 13:2, (207-228), Online publication date: 1-Apr-2009.
  2194. Thatte G, Rozgic V, Li M, Ghosh S, Mitra U, Narayanan S, Annavaram M and Spruijt-Metz D Optimal time-resource allocation for activity-detection via multimodal sensing Proceedings of the Fourth International Conference on Body Area Networks, (1-8)
  2195. Liang Y, Poor H and Shamai (Shitz) S (2009). Information Theoretic Security, Foundations and Trends in Communications and Information Theory, 5:4–5, (355-580), Online publication date: 1-Apr-2009.
  2196. ACM
    Dourisboure Y, Geraci F and Pellegrini M (2009). Extraction and classification of dense implicit communities in the Web graph, ACM Transactions on the Web, 3:2, (1-36), Online publication date: 1-Apr-2009.
  2197. Zhang R (2009). On peak versus average interference power constraints for protecting primary users in cognitive radio networks, IEEE Transactions on Wireless Communications, 8:4, (2112-2120), Online publication date: 1-Apr-2009.
  2198. Hwang K, Ko Y and Alouini M (2009). Performance analysis of incremental opportunistic relaying over identically and non-identically distributed cooperative paths, IEEE Transactions on Wireless Communications, 8:4, (1953-1961), Online publication date: 1-Apr-2009.
  2199. Franceschetti M and Chakraborty K (2009). Space-time duality in multiple antenna channels, IEEE Transactions on Wireless Communications, 8:4, (1733-1743), Online publication date: 1-Apr-2009.
  2200. Jin Y and Moura J (2009). Time-reversal detection using antenna arrays, IEEE Transactions on Signal Processing, 57:4, (1396-1414), Online publication date: 1-Apr-2009.
  2201. Xing H and Hu B (2009). Two-phase construction of multilayer perceptrons using information theory, IEEE Transactions on Neural Networks, 20:4, (715-721), Online publication date: 1-Apr-2009.
  2202. Rasti M, Sharafat A and Seyfe B (2009). Pareto-efficient and goal-driven power control in wireless networks, IEEE/ACM Transactions on Networking, 17:2, (556-569), Online publication date: 1-Apr-2009.
  2203. Cárdenas A, Radosavac S and Baras J (2009). Evaluation of detection algorithms for MAC layer misbehavior, IEEE/ACM Transactions on Networking, 17:2, (605-617), Online publication date: 1-Apr-2009.
  2204. Plasberg J and Kleijn W (2009). Feature selection under a complexity constraint, IEEE Transactions on Multimedia, 11:3, (565-571), Online publication date: 1-Apr-2009.
  2205. Tang X, Liu R, Spasojevic P and Poor H (2009). On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels, IEEE Transactions on Information Theory, 55:4, (1575-1591), Online publication date: 1-Apr-2009.
  2206. Cheng J (2009). On the expected codeword length per symbol of optimal prefix codes for extended sources, IEEE Transactions on Information Theory, 55:4, (1692-1695), Online publication date: 1-Apr-2009.
  2207. Yang S, Chen Y and Qiu P (2009). Linear-codes-based lossless joint source-channel coding for multiple-access channels, IEEE Transactions on Information Theory, 55:4, (1468-1486), Online publication date: 1-Apr-2009.
  2208. Kim T, Skoglund M and Caire G (2009). Quantifying the loss of compress-forward relaying without Wyner-Ziv coding, IEEE Transactions on Information Theory, 55:4, (1529-1533), Online publication date: 1-Apr-2009.
  2209. Harmsen J and Pearlman W (2009). Capacity of steganographic channels, IEEE Transactions on Information Theory, 55:4, (1775-1792), Online publication date: 1-Apr-2009.
  2210. Horodecki K, Horodecki M, Horodecki P and Oppenheim J (2009). General paradigm for distilling classical key from quantum states, IEEE Transactions on Information Theory, 55:4, (1898-1929), Online publication date: 1-Apr-2009.
  2211. Dong X and Ding Z (2009). Downlink wireless channel estimation for linear MIMO transmission recoding, IEEE Transactions on Communications, 57:4, (1151-1161), Online publication date: 1-Apr-2009.
  2212. Asadullah M and Stüber G (2009). Joint iterative channel estimation and soft-chip combining for a MIMO MC-CDMA anti-jam system, IEEE Transactions on Communications, 57:4, (1068-1078), Online publication date: 1-Apr-2009.
  2213. del Coso A and Ibars C (2009). Linear relaying for the Gaussian multiple-access and broadcast channels, IEEE Transactions on Wireless Communications, 8:4, (2024-2035), Online publication date: 1-Apr-2009.
  2214. Wang B, Ji Z, Liu K and Clancy T (2009). Primary-prioritized Markov approach for dynamic spectrum allocation, IEEE Transactions on Wireless Communications, 8:4, (1854-1865), Online publication date: 1-Apr-2009.
  2215. Sung C, Wang Q and Shum K (2009). Capacity region of the linear four-node half-duplex wireless relay network, IEEE Communications Letters, 13:4, (224-226), Online publication date: 1-Apr-2009.
  2216. Choi S (2009). Lossy distributed source coding using graphs, IEEE Communications Letters, 13:4, (262-264), Online publication date: 1-Apr-2009.
  2217. Wang P, Chow T and Chiu C (2009). Computational accounting in determining Chart of Accounts using nominal data analysis and concept of entropy, Expert Systems with Applications: An International Journal, 36:3, (6966-6977), Online publication date: 1-Apr-2009.
  2218. Wu J, Chen J, Xiong H and Xie M (2009). External validation measures for K-means clustering, Expert Systems with Applications: An International Journal, 36:3, (6050-6061), Online publication date: 1-Apr-2009.
  2219. Corso J and Hager G (2009). Image description with features that summarize, Computer Vision and Image Understanding, 113:4, (446-458), Online publication date: 1-Apr-2009.
  2220. Topsøe F (2009). Game theoretical optimization inspired by information theory, Journal of Global Optimization, 43:4, (553-564), Online publication date: 1-Apr-2009.
  2221. Cotae P and Mbengue F On the power efficient resource allocation for the overloaded multipath CDMA systems Proceedings of the 32nd international conference on Sarnoff symposium, (360-364)
  2222. Fresia M, Bursalioglu O, Caire G and Poor H Multicasting of digital images over erasure broadcast channels using rateless codes Proceedings of the 32nd international conference on Sarnoff symposium, (344-349)
  2223. Bilen Ç, Erkip E and Wang Y Layered video multicast using diversity embedded space time codes Proceedings of the 32nd international conference on Sarnoff symposium, (339-343)
  2224. Kassim S, Eltayeb N and Chambers J Resource allocation and block coding within a three-stage collaborative broadband relay network Proceedings of the 32nd international conference on Sarnoff symposium, (278-282)
  2225. Yu P, Baras J and Sadler B Power allocation tradeoffs in multicarrier authentication systems Proceedings of the 32nd international conference on Sarnoff symposium, (83-87)
  2226. ACM
    Nehme R, Rundensteiner E and Bertino E Self-tuning query mesh for adaptive multi-route query processing Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (803-814)
  2227. ACM
    Woodruff D The average-case complexity of counting distinct elements Proceedings of the 12th International Conference on Database Theory, (284-295)
  2228. ACM
    Chen H and Malacaria P Quantifying maximal loss of anonymity in protocols Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (206-217)
  2229. ACM
    Gold K An information pipeline model of human-robot interaction Proceedings of the 4th ACM/IEEE international conference on Human robot interaction, (85-92)
  2230. ACM
    Kumar C, Pingali P and Varma V A light-weight summarizer based on language model with relative entropy Proceedings of the 2009 ACM symposium on Applied Computing, (1752-1753)
  2231. ACM
    Liu S, Merhav Y, Yee W, Goharian N and Frieder O A sentence level probabilistic model for evolutionary theme pattern mining from news corpora Proceedings of the 2009 ACM symposium on Applied Computing, (1742-1747)
  2232. Viswanathan K and Ordentlich E (2009). Lower limits of discrete universal denoising, IEEE Transactions on Information Theory, 55:3, (1374-1386), Online publication date: 1-Mar-2009.
  2233. Luo Z and Devetak I (2009). Channel simulation with quantum side information, IEEE Transactions on Information Theory, 55:3, (1331-1342), Online publication date: 1-Mar-2009.
  2234. Gohary R and Davidson T (2009). Noncoherent MIMO communication, IEEE Transactions on Information Theory, 55:3, (1176-1205), Online publication date: 1-Mar-2009.
  2235. Hayashi S and Luo Z (2009). Spectrum management for interference-limited multiuser communication systems, IEEE Transactions on Information Theory, 55:3, (1153-1175), Online publication date: 1-Mar-2009.
  2236. Abbas A (2009). A Kullback-Leibler View of Linear and Log-Linear Pools, Decision Analysis, 6:1, (25-37), Online publication date: 1-Mar-2009.
  2237. Ekrem E and Ulukus S (2009). Secrecy capacity of a class of broadcast channels with an eavesdropper, EURASIP Journal on Wireless Communications and Networking, 2009, (1-29), Online publication date: 1-Mar-2009.
  2238. Wong T, Bloch M and Shea J (2009). Secret sharing over fast-fading MIMO wiretap channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-17), Online publication date: 1-Mar-2009.
  2239. Aggarwal V, Sankar L, Calderbank A and Poor H (2009). Secrecy capacity of a class of orthogonal relay eavesdropper channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-14), Online publication date: 1-Mar-2009.
  2240. Kobayashi M, Debbah M and Shamai S (2009). Secured communication over frequency-selective fading channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-19), Online publication date: 1-Mar-2009.
  2241. Liang Y, Kramer G, Poor H and Shamai S (2009). Compound wiretap channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-12), Online publication date: 1-Mar-2009.
  2242. Yang T, Yuan J and Shi Z (2009). Rate optimization for IDMA systems with iterative joint multi-user decoding, IEEE Transactions on Wireless Communications, 8:3, (1148-1153), Online publication date: 1-Mar-2009.
  2243. Choi J and Chan V (2009). Resource management for advanced transmission antenna satellites, IEEE Transactions on Wireless Communications, 8:3, (1308-1321), Online publication date: 1-Mar-2009.
  2244. Gueguen L and Sayrac B (2009). Sensing in cognitive radio channels, IEEE Transactions on Wireless Communications, 8:3, (1194-1198), Online publication date: 1-Mar-2009.
  2245. Nagaraj S (2009). An extension to the ordered subcarrier selection algorithm (OSSA), IEEE Transactions on Wireless Communications, 8:3, (1159-1163), Online publication date: 1-Mar-2009.
  2246. Liu R and Poor H (2009). Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages, IEEE Transactions on Information Theory, 55:3, (1235-1249), Online publication date: 1-Mar-2009.
  2247. Shayevitz O and Feder M (2009). Achieving the empirical capacity using feedback, IEEE Transactions on Information Theory, 55:3, (1269-1295), Online publication date: 1-Mar-2009.
  2248. Li H and Poor H (2009). Asymptotic analysis of outage region in CDMA MIMO systems, IEEE Transactions on Information Theory, 55:3, (1206-1217), Online publication date: 1-Mar-2009.
  2249. Yao S and Skoglund M (2009). Hybrid digital-analog relaying for cooperative transmission over slow fading channels, IEEE Transactions on Information Theory, 55:3, (944-951), Online publication date: 1-Mar-2009.
  2250. Wainwright M and Martinian E (2009). Low-density graph codes that are optimal for binning and coding with side information, IEEE Transactions on Information Theory, 55:3, (1061-1079), Online publication date: 1-Mar-2009.
  2251. Chen X and Schmid N (2009). Empirical capacity of a recognition channel for single-and multipose object recognition under the constraint of PCA encoding, IEEE Transactions on Image Processing, 18:3, (636-651), Online publication date: 1-Mar-2009.
  2252. Yang Y, Stankovic V, Xiong Z and Zhao W (2009). Two-terminal video coding, IEEE Transactions on Image Processing, 18:3, (534-551), Online publication date: 1-Mar-2009.
  2253. Lin S, Shahmohammadi M and El Gamal H (2009). Fingerprinting with minimum distance decoding, IEEE Transactions on Information Forensics and Security, 4:1, (59-69), Online publication date: 1-Mar-2009.
  2254. Pérez-Freire L and Pérez-González F (2009). Spread-spectrum watermarking security, IEEE Transactions on Information Forensics and Security, 4:1, (2-24), Online publication date: 1-Mar-2009.
  2255. Zaidi A and Vandendorpe L (2009). Coding schemes for relay-assisted information embedding, IEEE Transactions on Information Forensics and Security, 4:1, (70-85), Online publication date: 1-Mar-2009.
  2256. Bøhagen F, Orten P and Øien G (2009). On spherical vs. plane wave modeling of line-of-sight MIMO channels, IEEE Transactions on Communications, 57:3, (841-849), Online publication date: 1-Mar-2009.
  2257. García-Laencina P, Sancho-Gómez J, Figueiras-Vidal A and Verleysen M (2009). K nearest neighbours with mutual information for simultaneous classification and missing data imputation, Neurocomputing, 72:7-9, (1483-1493), Online publication date: 1-Mar-2009.
  2258. Yen L, Fouss F, Decaestecker C, Francq P and Saerens M (2009). Graph nodes clustering with the sigmoid commute-time kernel, Data & Knowledge Engineering, 68:3, (338-361), Online publication date: 1-Mar-2009.
  2259. Kumar C, Pingali P and Varma V Estimating Risk of Picking a Sentence for Document Summarization Proceedings of the 10th International Conference on Computational Linguistics and Intelligent Text Processing, (571-581)
  2260. Omidyeganeh M, Ghaemmaghami S and Khalilain H Video activity analysis based on 3D wavelet statistical properties Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (2054-2058)
  2261. Karny M, Guy T, Bodini A and Ruggeri F (2009). Cooperation via sharing of probabilistic information, International Journal of Computational Intelligence Studies, 1:2, (139-162), Online publication date: 1-Feb-2009.
  2262. Gohary R and Davidson T (2009). On power allocation for parallel Gaussian broadcast channels with common information, EURASIP Journal on Wireless Communications and Networking, 2009, (1-15), Online publication date: 1-Feb-2009.
  2263. ACM
    Feixas M, Sbert M and González F (2009). A unified information-theoretic framework for viewpoint selection and mesh saliency, ACM Transactions on Applied Perception, 6:1, (1-23), Online publication date: 1-Feb-2009.
  2264. Wunder G and Zhou C (2009). Queueing analysis for the OFDMA downlink, IEEE Transactions on Wireless Communications, 8:2, (871-881), Online publication date: 1-Feb-2009.
  2265. Barbieri A, Piemontese A and Colavolpe G (2009). On the ARMA approximation for fading channels described by the Clarke model with applications to Kalman-based receivers, IEEE Transactions on Wireless Communications, 8:2, (535-540), Online publication date: 1-Feb-2009.
  2266. Roy O and Vetterli M (2009). Rate-constrained collaborative noise reduction for wireless hearing aids, IEEE Transactions on Signal Processing, 57:2, (645-657), Online publication date: 1-Feb-2009.
  2267. Le Nir V, Moonen M, Verlinden J and Guenach M (2009). Optimal power allocation for downstream xDSL with per-modem total power constraints, IEEE Transactions on Signal Processing, 57:2, (690-697), Online publication date: 1-Feb-2009.
  2268. Talantzis F, Pnevmatikakis A and Constantinides A (2009). Audio-visual active speaker tracking in cluttered indoors environments, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:1, (7-15), Online publication date: 1-Feb-2009.
  2269. Estévez P, Tesmer M, Perez C and Zurada J (2009). Normalized mutual information feature selection, IEEE Transactions on Neural Networks, 20:2, (189-201), Online publication date: 1-Feb-2009.
  2270. Ranjan S, Swaminathan R, Uysal M, Nucci A and Knightly E (2009). DDoS-shield, IEEE/ACM Transactions on Networking, 17:1, (26-39), Online publication date: 1-Feb-2009.
  2271. Song H, Qiu L and Zhang Y (2009). NetQuest, IEEE/ACM Transactions on Networking, 17:1, (106-119), Online publication date: 1-Feb-2009.
  2272. Anandkumar A, Tong L and Swami A (2009). Detection of Gauss-Markov random fields with nearest-neighbor dependency, IEEE Transactions on Information Theory, 55:2, (816-827), Online publication date: 1-Feb-2009.
  2273. Permuter H, Weissman T and Goldsmith A (2009). Finite state channels with time-invariant deterministic feedback, IEEE Transactions on Information Theory, 55:2, (644-662), Online publication date: 1-Feb-2009.
  2274. Lai L, El Gamal H and Poor H (2009). Authentication over noisy channels, IEEE Transactions on Information Theory, 55:2, (906-916), Online publication date: 1-Feb-2009.
  2275. Ding Y, Zhang J and Wong K (2009). Ergodic channel capacities for the amplify-and-forward half-duplex cooperative systems, IEEE Transactions on Information Theory, 55:2, (713-730), Online publication date: 1-Feb-2009.
  2276. Ho T and Viswanathan H (2009). Dynamic algorithms for multicast with intra-session network coding, IEEE Transactions on Information Theory, 55:2, (797-815), Online publication date: 1-Feb-2009.
  2277. Motahari A and Khandani A (2009). Capacity bounds for the Gaussian interference channel, IEEE Transactions on Information Theory, 55:2, (620-643), Online publication date: 1-Feb-2009.
  2278. Sadeghi P, Vontobel P and Shams R (2009). Optimization of information rate upper and lower bounds for channels with memory, IEEE Transactions on Information Theory, 55:2, (663-688), Online publication date: 1-Feb-2009.
  2279. Huang J, Subramanian V, Agrawal R and Berry R (2009). Joint scheduling and resource allocation in uplink OFDM systems for broadband wireless access networks, IEEE Journal on Selected Areas in Communications, 27:2, (226-234), Online publication date: 1-Feb-2009.
  2280. Cheng L, Gupta P and He L Accounting for non-linear dependence using function driven component analysis Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (474-479)
  2281. Abbasi A, Khonsari A and Talebi M Source location anonymity for sensor networks Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (588-592)
  2282. Daskalakis C, Karp R, Mossel E, Riesenfeld S and Verbin E Sorting and selection in posets Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (392-401)
  2283. Marano S, Matta V and Tong L (2009). Distributed detection in the presence of Byzantine attacks, IEEE Transactions on Signal Processing, 57:1, (16-29), Online publication date: 1-Jan-2009.
  2284. Shugan S and Mitra D (2009). Metrics---When and Why Nonaveraging Statistics Work, Management Science, 55:1, (4-15), Online publication date: 1-Jan-2009.
  2285. Garcia-Salicetti S, Houmani N and Dorizzi B (2009). A novel criterion for writer enrolment based on a time-normalized signature sample entropy measure, EURASIP Journal on Advances in Signal Processing, 2009, (1-12), Online publication date: 1-Jan-2009.
  2286. Lin M, Tsai J and Ye Y (2009). Budget allocation in a competitive communication spectrum economy, EURASIP Journal on Advances in Signal Processing, 2009, (1-15), Online publication date: 1-Jan-2009.
  2287. Li L and Zhang C (2009). Optimal channel width adaptation, logical topology design, and routing in wireless mesh networks, EURASIP Journal on Wireless Communications and Networking, 2009, (1-12), Online publication date: 1-Jan-2009.
  2288. Almudevar A (2009). Selection of statistical thresholds in graphical models, EURASIP Journal on Bioinformatics and Systems Biology, 2009, (2-2), Online publication date: 1-Jan-2009.
  2289. Zaidi A and Vandendorpe L (2009). Lower bounds on the capacity of the relay channel with states at the source, EURASIP Journal on Wireless Communications and Networking, 2009, (1-22), Online publication date: 1-Jan-2009.
  2290. Guanlei X, Xiaotong W and Xiaogang X (2009). New inequalities and uncertainty relations on linear canonical transform revisit, EURASIP Journal on Advances in Signal Processing, 2009, (1-7), Online publication date: 1-Jan-2009.
  2291. Zhang J and Gursoy M (2009). Achievable rates and resource allocation strategies for imperfectly known fading relay channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-16), Online publication date: 1-Jan-2009.
  2292. Lasang P and Kumwilaisak W (2009). Rate distortion analysis and bit allocation scheme for wavelet lifting-based multiview image coding, EURASIP Journal on Advances in Signal Processing, 2009, (7-7), Online publication date: 1-Jan-2009.
  2293. Chen J and Slock D (2009). On optimum end-to-end distortion in MIMO systems, EURASIP Journal on Wireless Communications and Networking, 2009, (1-9), Online publication date: 1-Jan-2009.
  2294. Wrycza P, Shankar M, Bengtsson M and Ottersten B (2009). Spectrum allocation for decentralized transmission strategies, EURASIP Journal on Advances in Signal Processing, 2009, (1-11), Online publication date: 1-Jan-2009.
  2295. Stadler S and Leijon A (2009). Prediction of speech recognition in cochlear implant users by adapting auditory models to psychophysical data, EURASIP Journal on Advances in Signal Processing, 2009, (1-9), Online publication date: 1-Jan-2009.
  2296. Saz O, Simón J, Rodríguez W, Lleida E and Vaquero C (2009). Analysis of acoustic features in speakers with cognitive disorders and speech impairments, EURASIP Journal on Advances in Signal Processing, 2009, (1-11), Online publication date: 1-Jan-2009.
  2297. Valenzise G, Prandi G, Tagliasacchi M and Sarti A (2009). Identification of sparse audio tampering using distributed source coding and compressive sensing techniques, Journal on Image and Video Processing, 2009, (1-12), Online publication date: 1-Jan-2009.
  2298. Guerriero M, Marano S, Matta V and Willett P (2009). Stochastic resonance in sequential detectors, IEEE Transactions on Signal Processing, 57:1, (2-15), Online publication date: 1-Jan-2009.
  2299. Rost P and Fettweis G (2009). Analysis of a mixed strategy for multiple relay networks, IEEE Transactions on Information Theory, 55:1, (174-189), Online publication date: 1-Jan-2009.
  2300. Boucheron S, Garivier A and Gassiat E (2009). Coding on countably infinite alphabets, IEEE Transactions on Information Theory, 55:1, (358-373), Online publication date: 1-Jan-2009.
  2301. Wang H and Viswanath P (2009). Vector Gaussian multiple description with two levels of receivers, IEEE Transactions on Information Theory, 55:1, (401-410), Online publication date: 1-Jan-2009.
  2302. Bross S and Wigger M (2009). On the relay channel with receiver-transmitter feedback, IEEE Transactions on Information Theory, 55:1, (275-291), Online publication date: 1-Jan-2009.
  2303. Stauffer E, Tujkovic D and Paulraj A (2009). Code rate-diversity-multiplexing tradeoff, IEEE Transactions on Information Theory, 55:1, (245-254), Online publication date: 1-Jan-2009.
  2304. Lapidoth A and Moser S (2009). On the capacity of the discrete-time poisson channel, IEEE Transactions on Information Theory, 55:1, (303-322), Online publication date: 1-Jan-2009.
  2305. Niesen U and Tchamkerten A (2009). Tracking stopping times through noisy observations, IEEE Transactions on Information Theory, 55:1, (422-432), Online publication date: 1-Jan-2009.
  2306. Fertonani D and Colavolpe G (2009). A robust metric for soft-output detection in the presence of class-a noise, IEEE Transactions on Communications, 57:1, (36-40), Online publication date: 1-Jan-2009.
  2307. Pighi R, Franceschini M, Ferrari G and Raheli R (2009). Fundamental performance limits of communications systems impaired by impulse noise, IEEE Transactions on Communications, 57:1, (171-182), Online publication date: 1-Jan-2009.
  2308. Muharemovic T, Sabharwal A and Aazhang B (2009). Policy-based multiple access for decentralized low power systems, IEEE Transactions on Wireless Communications, 8:1, (256-267), Online publication date: 1-Jan-2009.
  2309. Zarringhalam F, Seyfe B, Shikh-Bahaei M, Charbit G and Aghvami H (2009). Jointly optimized rate and outer loop power control with single-and multi-user detection, IEEE Transactions on Wireless Communications, 8:1, (186-195), Online publication date: 1-Jan-2009.
  2310. Jitvanichphaibool K, Saquib M and Popescu O (2009). Optimum pilot-to-data power ratio for partial RAKE receiver in nakagami-m fading channels, IEEE Transactions on Wireless Communications, 8:1, (136-147), Online publication date: 1-Jan-2009.
  2311. Lim H, Yune T and Im G (2009). QoS-constrained opportunistic scheduling for SC-FDMA with iterative multiuser detection, IEEE Communications Letters, 13:1, (4-6), Online publication date: 1-Jan-2009.
  2312. Li H, Yuan X, Lin X and Ping L (2009). On water-filling precoding for coded single-carrier systems, IEEE Communications Letters, 13:1, (34-36), Online publication date: 1-Jan-2009.
  2313. Cai R, Hao Z, Yang X and Wen W (2009). An efficient gene selection algorithm based on mutual information, Neurocomputing, 72:4-6, (991-999), Online publication date: 1-Jan-2009.
  2314. Abdel-Aal R and El-Alfy E (2009). Constructing optimal educational tests using GMDH-based item ranking and selection, Neurocomputing, 72:4-6, (1184-1197), Online publication date: 1-Jan-2009.
  2315. Guthy C, Utschick W, Bauch G and Nossek J (2009). Sum Throughput Enhancements in Quality of Service Constrained Multiuser MIMO OFDM Systems, Wireless Personal Communications: An International Journal, 48:1, (157-173), Online publication date: 1-Jan-2009.
  2316. Wang C, Fan Y and Thompson J (2009). Recovering Multiplexing Loss through Concurrent Decode-and-Forward (DF) Relaying, Wireless Personal Communications: An International Journal, 48:1, (193-213), Online publication date: 1-Jan-2009.
  2317. Kulis B, Basu S, Dhillon I and Mooney R (2009). Semi-supervised graph clustering, Machine Language, 74:1, (1-22), Online publication date: 1-Jan-2009.
  2318. Iwata K An Information-Theoretic Class of Stochastic Decision Processes Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (340-344)
  2319. Zhang C, Xing D and Zhou K Keyword-Labeled Classification with Auxiliary Unlabeled Documents Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (463-466)
  2320. Thollard F and Jeudy B Efficient Pruning of Probabilistic Automata Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, (65-75)
  2321. Pérez-Sancho C, Rizo D and Iñesta J Stochastic Text Models for Music Categorization Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, (55-64)
  2322. Pera M and Ng Y (2008). Utilizing phrase-similarity measures for detecting and clustering informative RSS news articles, Integrated Computer-Aided Engineering, 15:4, (331-350), Online publication date: 1-Dec-2008.
  2323. Xu K, Zhang Z and Bhattacharyya S (2008). Internet traffic behavior profiling for network security monitoring, IEEE/ACM Transactions on Networking, 16:6, (1241-1252), Online publication date: 1-Dec-2008.
  2324. Sung M, Xu J, Li J and Li L (2008). Large-scale IP traceback in high-speed internet, IEEE/ACM Transactions on Networking, 16:6, (1253-1266), Online publication date: 1-Dec-2008.
  2325. Datta N, Suhov Y and Dorlas T (2008). Entanglement assisted classical capacity of a class of quantum channels with long-term memory, Quantum Information Processing, 7:6, (251-262), Online publication date: 1-Dec-2008.
  2326. Atakan B and Akan O On molecular multiple-access, broadcast, and relay channels in nanonetworks Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Sytems, (1-8)
  2327. Ye Z, Cao H, Iyengar S and Mohamadian H Quantitative approach on image fusion evaluation Proceedings of the 8th conference on Applied computer scince, (76-80)
  2328. ACM
    Hong T, Samal A and Soh L Computing information gain for spatial data support Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, (1-4)
  2329. Chatzikokolakis K, Palamidessi C and Panangaden P (2008). On the Bayes risk in information-hiding protocols, Journal of Computer Security, 16:5, (531-571), Online publication date: 1-Nov-2008.
  2330. ACM
    Amato G, Savino P and Magionami V Use of weighted visual terms and machine learning techniques for image content recognition relying on mpeg-7 visual descriptors Proceedings of the 2nd ACM workshop on Multimedia semantics, (60-63)
  2331. ACM
    Huurnink B, Hofmann K and de Rijke M Assessing concept selection for video retrieval Proceedings of the 1st ACM international conference on Multimedia information retrieval, (459-466)
  2332. ACM
    Liu Y, Mei T, Wu X and Hua X Optimizing video search reranking via minimum incremental information loss Proceedings of the 1st ACM international conference on Multimedia information retrieval, (253-259)
  2333. ACM
    Frank M, Basin D and Buhmann J A class of probabilistic models for role engineering Proceedings of the 15th ACM conference on Computer and communications security, (299-310)
  2334. David N Aspects regarding the length of typical trails in a web site Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems, (203-206)
  2335. ACM
    Lopes T, Hiratani G, Barth F, Rodrigues O and Pinto J Mineração de opiniões aplicada à análise de investimentos Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web, (117-120)
  2336. ACM
    Hua X and Qi G Online multi-label active annotation Proceedings of the 16th ACM international conference on Multimedia, (141-150)
  2337. ACM
    Karimzadehgan M, Zhai C and Belford G Multi-aspect expertise matching for review assignment Proceedings of the 17th ACM conference on Information and knowledge management, (1113-1122)
  2338. ACM
    Zhang X, Pan F and Wang W REDUS Proceedings of the 17th ACM conference on Information and knowledge management, (961-970)
  2339. ACM
    Dash D, Rao J, Megiddo N, Ailamaki A and Lohman G Dynamic faceted search for discovery-driven analysis Proceedings of the 17th ACM conference on Information and knowledge management, (3-12)
  2340. Subramanya A and Bilmes J Soft-supervised learning for text classification Proceedings of the Conference on Empirical Methods in Natural Language Processing, (1090-1099)
  2341. Levy R A noisy-channel model of rational human sentence comprehension under uncertain input Proceedings of the Conference on Empirical Methods in Natural Language Processing, (234-243)
  2342. ACM
    Resnick P and Sami R The information cost of manipulation-resistance in recommender systems Proceedings of the 2008 ACM conference on Recommender systems, (147-154)
  2343. Radosavac S and Baras J Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-10)
  2344. Bagon S, Boiman O and Irani M What Is a Good Image Segment? A Unified Approach to Segment Extraction Computer Vision – ECCV 2008, (30-44)
  2345. Martin K (2008). Topology in information theory in topology, Theoretical Computer Science, 405:1-2, (75-87), Online publication date: 1-Oct-2008.
  2346. ACM
    Qi G, Hua X, Rui Y, Tang J, Mei T, Wang M and Zhang H (2008). Correlative multilabel video annotation with temporal kernels, ACM Transactions on Multimedia Computing, Communications, and Applications, 5:1, (1-27), Online publication date: 1-Oct-2008.
  2347. Zhang H and Hou J (2008). On the asymptotic minimum transporting energy and its implication on the wireless network capacity, IEEE/ACM Transactions on Networking, 16:5, (1175-1187), Online publication date: 1-Oct-2008.
  2348. Silver S and Cowans P (2008). Small world network model of personal consumption, Expert Systems with Applications: An International Journal, 35:3, (632-644), Online publication date: 1-Oct-2008.
  2349. Chatzikokolakis K and Martin K (2008). A Monotonicity Principle for Information Theory, Electronic Notes in Theoretical Computer Science (ENTCS), 218, (111-129), Online publication date: 1-Oct-2008.
  2350. Denton T, Shokoufandeh A, Novatnack J and Nishino K (2008). Canonical subsets of image features, Computer Vision and Image Understanding, 112:1, (55-66), Online publication date: 1-Oct-2008.
  2351. ACM
    Alpcan T, Kesici S, Bicher D, Mihçak M, Bauckhage C and Çamtepe S A lightweight biometric signature scheme for user authentication over networks Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-6)
  2352. ACM
    Voloshynovskiy S, Koval O and Pun T Multimodal authentication based on random projections and source coding Proceedings of the 10th ACM workshop on Multimedia and security, (195-204)
  2353. ACM
    Koval O, Voloshynovskiy S and Pun T Privacy-preserving multimodal person and object identification Proceedings of the 10th ACM workshop on Multimedia and security, (177-184)
  2354. ACM
    Malik H Steganalysis of QIM steganography using irregularity measure Proceedings of the 10th ACM workshop on Multimedia and security, (149-158)
  2355. Allauzen C, Mohri M and Rastogi A General Algorithms for Testing the Ambiguity of Finite Automata Proceedings of the 12th international conference on Developments in Language Theory, (108-120)
  2356. Papadimitriou S, Sun J, Faloutsos C and Yu P Hierarchical, parameter-free community discovery Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, (170-187)
  2357. Kujala J and Elomaa T Ranking the uniformity of interval pairs Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (640-655)
  2358. Suzuki T, Sugiyama M, Sese J and Kanamori T Approximating mutual information by maximum likelihood density ratio estimation Proceedings of the 2008 International Conference on New Challenges for Feature Selection in Data Mining and Knowledge Discovery - Volume 4, (5-20)
  2359. ACM
    Zhang W, Stojanovic M and Mitra U Analysis of a simple multihop underwater acoustic network Proceedings of the 3rd International Workshop on Underwater Networks, (3-10)
  2360. ACM
    Soltani S, Misra K and Radha H On link-layer reliability and stability for wireless communication Proceedings of the 14th ACM international conference on Mobile computing and networking, (327-338)
  2361. ACM
    Mathur S, Trappe W, Mandayam N, Ye C and Reznik A Radio-telepathy Proceedings of the 14th ACM international conference on Mobile computing and networking, (128-139)
  2362. Plantié M, Roche M, Dray G and Poncelet P Is a Voting Approach Accurate for Opinion Mining? Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery, (413-422)
  2363. ACM
    Haas H, Gomes J and Petraglia A Analog hardware implementation of a vector quantizer for focal-plane image compression Proceedings of the 21st annual symposium on Integrated circuits and system design, (233-238)
  2364. Fujisaki H (2008). Generating Stochastic Processes Based on the Finitary Interval Algorithm, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:9, (2482-2488), Online publication date: 1-Sep-2008.
  2365. Copty S, Fine S, Ur S, Yom-Tov E and Ziv A (2008). A probabilistic alternative to regression suites, Theoretical Computer Science, 404:3, (219-234), Online publication date: 1-Sep-2008.
  2366. ACM
    Fonseca N, Crovella M and Salamatian K (2008). Long range mutual information, ACM SIGMETRICS Performance Evaluation Review, 36:2, (32-37), Online publication date: 31-Aug-2008.
  2367. Ke Y, Cheng J and Ng W (2008). An information-theoretic approach to quantitative association rule mining, Knowledge and Information Systems, 16:2, (213-244), Online publication date: 1-Aug-2008.
  2368. Liu C (2008). A Simulation-Based Experience in Learning Structures of Bayesian Networks to Represent How Students Learn Composite Concepts, International Journal of Artificial Intelligence in Education, 18:3, (237-285), Online publication date: 1-Aug-2008.
  2369. Zhang X, Pan F, Wang W and Nobel A (2008). Mining non-redundant high order correlations in binary data, Proceedings of the VLDB Endowment, 1:1, (1178-1188), Online publication date: 1-Aug-2008.
  2370. ACM
    Pattem S, Krishnamachari B and Govindan R (2008). The impact of spatial correlation on routing with compression in wireless sensor networks, ACM Transactions on Sensor Networks, 4:4, (1-33), Online publication date: 1-Aug-2008.
  2371. ACM
    Ke Y, Cheng J and Ng W (2008). Correlated pattern mining in quantitative databases, ACM Transactions on Database Systems, 33:3, (1-45), Online publication date: 1-Aug-2008.
  2372. Kuzuoka S (2008). An Application of Linear Codes to the Problem of Source Coding with Partial Side Information, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:8, (2151-2158), Online publication date: 1-Aug-2008.
  2373. ACM
    McLoughlin I and Premananda S Predictive receive-directed antenna selection for quasistatic Rayleigh fading channel Proceedings of the 2008 International Conference on Advanced Infocomm Technology, (1-7)
  2374. ACM
    Acharyya S, Negi S, Subramaniam L and Roy S Unsupervised learning of multilingual short message service (SMS) dialect from noisy examples Proceedings of the second workshop on Analytics for noisy unstructured text data, (67-74)
  2375. Portnoy J, Steinitz R and Haridim M Inclusion of measure to the concept of latent information, information in transit and translators Proceedings of the 12th WSEAS international conference on Communications, (462-465)
  2376. ACM
    Yilmaz E, Aslam J and Robertson S A new rank correlation coefficient for information retrieval Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, (587-594)
  2377. Wang Y, Zhang N and Chen T Latent tree models and approximate inference in Bayesian networks Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (1112-1118)
  2378. Choi A and Darwiche A Many-pairs mutual information for adding structure to belief propagation approximations Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (1031-1036)
  2379. Choi A and Darwiche A Focusing generalizations of belief propagation on targeted queries Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (1024-1030)
  2380. Fung G, Krishnan S, Rao R and Chen H Learning sparse kernels from 3D surfaces for heart wall motion abnormality detection Proceedings of the 20th national conference on Innovative applications of artificial intelligence - Volume 3, (1663-1670)
  2381. ACM
    Chuang C and Chen Y On the effectiveness of distributions estimated by probabilistic model building Proceedings of the 10th annual conference on Genetic and evolutionary computation, (391-398)
  2382. ACM
    Shafiq M, Khayam S and Farooq M Improving accuracy of immune-inspired malware detectors by using intelligent features Proceedings of the 10th annual conference on Genetic and evolutionary computation, (119-126)
  2383. ACM
    Dimitrov S and Sami R Non-myopic strategies in prediction markets Proceedings of the 9th ACM conference on Electronic commerce, (200-209)
  2384. ACM
    Seldin Y and Tishby N Multi-classification by categorical features via clustering Proceedings of the 25th international conference on Machine learning, (920-927)
  2385. ACM
    Martins A, Figueiredo M, Aguiar P, Smith N and Xing E Nonextensive entropic kernels Proceedings of the 25th international conference on Machine learning, (640-647)
  2386. ACM
    Dai W, Yang Q, Xue G and Yu Y Self-taught clustering Proceedings of the 25th international conference on Machine learning, (200-207)
  2387. ACM
    Crammer K, Talukdar P and Pereira F A rate-distortion one-class model and its applications to clustering Proceedings of the 25th international conference on Machine learning, (184-191)
  2388. Ferrari G, Pagliari R and Martalo M (2008). Decentralised binary detection with non-constant SNR profile at the sensors, International Journal of Sensor Networks, 4:1/2, (23-36), Online publication date: 1-Jul-2008.
  2389. Lutz J and Mayordomo E Dimensions of Points in Self-similar Fractals Proceedings of the 14th annual international conference on Computing and Combinatorics, (215-224)
  2390. Rigau J, Feixas M and Sbert M Informational dialogue with van Gogh's paintings Proceedings of the Fourth Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (115-122)
  2391. Arredondo T, Freund W and Muñoz C Entropy Based Diversity Measures in Evolutionary Mobile Robot Navigation Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence, (129-138)
  2392. Pantel P and Pennacchiotti M Automatically Harvesting and Ontologizing Semantic Relations Proceedings of the 2008 conference on Ontology Learning and Population: Bridging the Gap between Text and Knowledge, (171-195)
  2393. Gu X and Lutz J Effective Dimensions and Relative Frequencies Proceedings of the 4th conference on Computability in Europe: Logic and Theory of Algorithms, (231-240)
  2394. ACM
    Lu Y, Montanari A, Prabhakar B, Dharmapurikar S and Kabbani A (2008). Counter braids, ACM SIGMETRICS Performance Evaluation Review, 36:1, (121-132), Online publication date: 12-Jun-2008.
  2395. Fischer S, Khazaei S and Meier W Chosen IV statistical analysis for key recovery attacks on stream ciphers Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, (236-245)
  2396. Kunihiro N New definition of density on knapsack cryptosystems Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, (156-173)
  2397. Pavlovic D Network as a computer Proceedings of the 3rd international conference on Computer science: theory and applications, (384-397)
  2398. ACM
    Malacaria P and Chen H Lagrange multipliers and maximum information leakage in different observational models Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (135-146)
  2399. ACM
    McCamant S and Ernst M Quantitative information flow as network flow capacity Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (193-205)
  2400. ACM
    Lu Y, Montanari A, Prabhakar B, Dharmapurikar S and Kabbani A Counter braids Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (121-132)
  2401. Collins M, Globerson A, Koo T, Carreras X and Bartlett P (2008). Exponentiated Gradient Algorithms for Conditional Random Fields and Max-Margin Markov Networks, The Journal of Machine Learning Research, 9, (1775-1822), Online publication date: 1-Jun-2008.
  2402. Krupka E and Tishby N (2008). Generalization from Observed to Unobserved Features by Clustering, The Journal of Machine Learning Research, 9, (339-370), Online publication date: 1-Jun-2008.
  2403. Krause A, Singh A and Guestrin C (2008). Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies, The Journal of Machine Learning Research, 9, (235-284), Online publication date: 1-Jun-2008.
  2404. Shwartz S, Schechner Y and Zibulevsky M (2008). Blind separation of convolutive image mixtures, Neurocomputing, 71:10-12, (2164-2179), Online publication date: 1-Jun-2008.
  2405. Maybank S (2008). Approximation to the Fisher-Rao metric for the focus of expansion, Neurocomputing, 71:10-12, (2037-2045), Online publication date: 1-Jun-2008.
  2406. Panin G and Knoll A (2008). Mutual Information-Based 3D Object Tracking, International Journal of Computer Vision, 78:1, (107-118), Online publication date: 1-Jun-2008.
  2407. Rubinstein R (2008). Semi-Iterative Minimum Cross-Entropy Algorithms for Rare-Events, Counting, Combinatorial and Integer Programming, Methodology and Computing in Applied Probability, 10:2, (121-178), Online publication date: 1-Jun-2008.
  2408. ACM
    McCamant S and Ernst M (2008). Quantitative information flow as network flow capacity, ACM SIGPLAN Notices, 43:6, (193-205), Online publication date: 30-May-2008.
  2409. ACM
    Jain R, Klauck H and Nayak A Direct product theorems for classical communication complexity via subdistribution bounds Proceedings of the fortieth annual ACM symposium on Theory of computing, (599-608)
  2410. Wang Y, Zhang N and Chen T (2008). Latent tree models and approximate inference in Bayesian networks, Journal of Artificial Intelligence Research, 32:1, (879-900), Online publication date: 1-May-2008.
  2411. Kwak N (2008). Feature extraction for classification problems and its application to face recognition, Pattern Recognition, 41:5, (1701-1717), Online publication date: 1-May-2008.
  2412. Vu M, Devroye N and Tarokh V (2008). An Overview of Scaling Laws in Ad Hoc and Cognitive Radio Networks, Wireless Personal Communications: An International Journal, 45:3, (343-354), Online publication date: 1-May-2008.
  2413. Jain R, Nayak A and Su Y A separation between divergence and Holevo information for ensembles Proceedings of the 5th international conference on Theory and applications of models of computation, (526-541)
  2414. ACM
    Ling X, Xue G, Dai W, Jiang Y, Yang Q and Yu Y Can chinese web pages be classified with english data source? Proceedings of the 17th international conference on World Wide Web, (969-978)
  2415. Jacquet P, Seroussi G and Szpankowski W (2008). On the entropy of a hidden Markov process, Theoretical Computer Science, 395:2-3, (203-219), Online publication date: 20-Apr-2008.
  2416. Chen R and Chang C (2008). Energy Cost Optimization by Adequate Transmission Rate Dividing in Wireless Communication System, Informatica, 19:2, (191-200), Online publication date: 1-Apr-2008.
  2417. ACM
    Bacardit J, Stout M and Krasnogor N (2008). A tale of human-competitiveness in bioinformatics, ACM SIGEVOlution, 3:1, (2-10), Online publication date: 1-Apr-2008.
  2418. Zhao W, Serpedin E and Dougherty E (2008). Inferring Connectivity of Genetic Regulatory Networks Using Information-Theoretic Criteria, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:2, (262-274), Online publication date: 1-Apr-2008.
  2419. Dehesa J, Olmos B and Yáñez R (2008). Parameter-based Fisher's information of orthogonal polynomials, Journal of Computational and Applied Mathematics, 214:1, (136-147), Online publication date: 1-Apr-2008.
  2420. Bryce D, Kambhampati S and Smith D (2008). Sequential Monte Carlo in reachability heuristics for probabilistic planning, Artificial Intelligence, 172:6-7, (685-715), Online publication date: 1-Apr-2008.
  2421. Braun C, Chatzikokolakis K and Palamidessi C Compositional methods for information-hiding Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (443-457)
  2422. Shafiq M, Farooq M and Khayam S A comparative study of fuzzy inference systems, neural networks and adaptive neuro fuzzy inference systems for portscan detection Proceedings of the 2008 conference on Applications of evolutionary computing, (52-61)
  2423. ACM
    Cakmak A and Ozsoyoglu G Taxonomy-superimposed graph mining Proceedings of the 11th international conference on Extending database technology: Advances in database technology, (217-228)
  2424. Ong S and Vadhan S An equivalence between zero knowledge and commitments Proceedings of the 5th conference on Theory of cryptography, (482-500)
  2425. Beimel A, Livne N and Padró C Matroids can be far from ideal secret sharing Proceedings of the 5th conference on Theory of cryptography, (194-212)
  2426. ACM
    Feng W and Kaptanoglu S (2008). Designing Efficient Input Interconnect Blocks for LUT Clusters Using Counting and Entropy, ACM Transactions on Reconfigurable Technology and Systems, 1:1, (1-28), Online publication date: 1-Mar-2008.
  2427. Lun D, MéDard M, Koetter R and Effros M (2008). Full length article, Physical Communication, 1:1, (3-20), Online publication date: 1-Mar-2008.
  2428. Varzakas P (2008). Information-theoretic comparison of channel capacity for FDMA and DS-CDMA in a Rayleigh fading environment, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:2, (52-57), Online publication date: 1-Feb-2008.
  2429. Zeng X, Liu J, Hu L and Taylor D (2008). On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:2, (664-672), Online publication date: 1-Feb-2008.
  2430. Gedeon T, Parker A, Campion C and Aldworth Z (2008). Annealing and the normalized N-cut, Pattern Recognition, 41:2, (592-606), Online publication date: 1-Feb-2008.
  2431. Di Tomaso E and Baldwin J (2008). An approach to hybrid probabilistic models, International Journal of Approximate Reasoning, 47:2, (202-218), Online publication date: 1-Feb-2008.
  2432. Chatzikokolakis K, Palamidessi C and Panangaden P (2008). Anonymity protocols as noisy channels, Information and Computation, 206:2-4, (378-401), Online publication date: 1-Feb-2008.
  2433. Cormode G, Muthukrishnan S and Yi K Algorithms for distributed functional monitoring Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (1076-1085)
  2434. Indyk P and McGregor A Declaring independence via the sketching of sketches Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (737-745)
  2435. Zhang Q, Zhou Y, Huang X and Wu L Graph mutual reinforcement based bootstrapping Proceedings of the 4th Asia information retrieval conference on Information retrieval technology, (203-212)
  2436. Fu X and Chen M Exploring the stability of IDF term weighting Proceedings of the 4th Asia information retrieval conference on Information retrieval technology, (10-21)
  2437. Vila-Forcén J, Voloshynovskiy S, Koval O, Pérez-González F and Pun T Quantization-based methods Transactions on data hiding and multimedia security III, (70-90)
  2438. Venturini I Oracle channels Transactions on data hiding and multimedia security III, (50-69)
  2439. Korzhik V, Imai H, Shikata J, Morales-Luna G and Gerling E On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems Transactions on data hiding and multimedia security III, (23-32)
  2440. Wainwright M and Jordan M (2008). Graphical Models, Exponential Families, and Variational Inference, Foundations and Trends® in Machine Learning, 1:1-2, (1-305), Online publication date: 1-Jan-2008.
  2441. Devroye N, Vu M and Tarokh V (2008). Achievable rates and scaling laws for cognitive radio channels, EURASIP Journal on Wireless Communications and Networking, 2008, (1-12), Online publication date: 1-Jan-2008.
  2442. Schizas I, Giannakis G and Jindal N (2008). Distortion-rate bounds for distributed estimation using wireless sensor networks, EURASIP Journal on Advances in Signal Processing, 2008, (1-12), Online publication date: 1-Jan-2008.
  2443. Skjevling H, Gesbert D and Hjørungnes A (2008). Low-complexity distributed multibase transmission and scheduling, EURASIP Journal on Advances in Signal Processing, 2008, (1-9), Online publication date: 1-Jan-2008.
  2444. Venugopal D and Hu G (2008). Efficient signature based malware detection on mobile devices, Mobile Information Systems, 4:1, (33-49), Online publication date: 1-Jan-2008.
  2445. Amerimehr M, Khalaj B and Crespo P (2008). A distributed cross-layer optimization method for multicast in interference-limited multihop wireless networks, EURASIP Journal on Wireless Communications and Networking, 2008, (1-13), Online publication date: 1-Jan-2008.
  2446. Aggarwal V and Sabharwal A (2008). Slotted gaussian multiple access channel, EURASIP Journal on Wireless Communications and Networking, 2008, (1-11), Online publication date: 1-Jan-2008.
  2447. Simon C and Leus G (2008). Feedback quantization for linear precoded spatial multiplexing, EURASIP Journal on Advances in Signal Processing, 2008, (1-13), Online publication date: 1-Jan-2008.
  2448. Li Z, Zhai F and Katsaggelos A (2008). Joint video summarization and transmission adaptation for energy-efficient wireless video streaming, EURASIP Journal on Advances in Signal Processing, 2008, (1-8), Online publication date: 1-Jan-2008.
  2449. Papandreou N and Antonakopoulos T (2008). Bit and power allocation in constrained multicarrier systems, EURASIP Journal on Advances in Signal Processing, 2008, (11), Online publication date: 1-Jan-2008.
  2450. Xu Y and Le-Ngoc T (2008). Optimal power allocation with channel inversion regularization-based precoding for MIMO broadcast channels, EURASIP Journal on Advances in Signal Processing, 2008, (1-8), Online publication date: 1-Jan-2008.
  2451. Pérez-Cruz F and Murillo-Fuentes J (2008). Digital communication receivers using gaussian processes for machine learning, EURASIP Journal on Advances in Signal Processing, 2008, (1-12), Online publication date: 1-Jan-2008.
  2452. Kotagiri S and Laneman J (2008). Multiaccess channels with state known to some encoders and independent messages, EURASIP Journal on Wireless Communications and Networking, 2008, (1-14), Online publication date: 1-Jan-2008.
  2453. Gjendemsjø A, Øien G, Holm H, Alouini M, Gesbert D, Hole K and Orten P (2008). Rate and power allocation for discrete-rate link adaptation, EURASIP Journal on Wireless Communications and Networking, 2008, (1-11), Online publication date: 1-Jan-2008.
  2454. Khattak S, Rave W and Fettweis G (2008). Distributed iterative multiuser detection through base station cooperation, EURASIP Journal on Wireless Communications and Networking, 2008, (1-15), Online publication date: 1-Jan-2008.
  2455. Forestier G, Wemmert C and Gançarski P (2008). Multisource images analysis using collaborative clustering, EURASIP Journal on Advances in Signal Processing, 2008, (1-11), Online publication date: 1-Jan-2008.
  2456. Madiman M (2008). Cores of cooperative games in information theory, EURASIP Journal on Wireless Communications and Networking, 2008, (1-12), Online publication date: 1-Jan-2008.
  2457. Wang W, Yan S and Yang S (2008). Optimally joint subcarrier matching and power allocation in OFDM multihop system, EURASIP Journal on Advances in Signal Processing, 2008, (1-8), Online publication date: 1-Jan-2008.
  2458. Filho D, Féty L and Terré M (2008). A hybrid single-carrier/multicarrier transmission scheme with power allocation, EURASIP Journal on Wireless Communications and Networking, 2008, (1-8), Online publication date: 1-Jan-2008.
  2459. Ghabeli L and Aref M (2008). A new achievable rate and the capacity of some classes of multilevel relay network, EURASIP Journal on Wireless Communications and Networking, 2008, (1-10), Online publication date: 1-Jan-2008.
  2460. Iwata K and Hayashi A (2008). A Redundancy-Based Measure of Dissimilarity among Probability Distributions for Hierarchical Clustering Criteria, IEEE Transactions on Pattern Analysis and Machine Intelligence, 30:1, (76-88), Online publication date: 1-Jan-2008.
  2461. Athitsos V, Alon J, Sclaroff S and Kollios G (2008). BoostMap, IEEE Transactions on Pattern Analysis and Machine Intelligence, 30:1, (89-104), Online publication date: 1-Jan-2008.
  2462. Ayad H and Kamel M (2008). Cumulative Voting Consensus Method for Partitions with Variable Number of Clusters, IEEE Transactions on Pattern Analysis and Machine Intelligence, 30:1, (160-173), Online publication date: 1-Jan-2008.
  2463. Rother D, Sapiro G and Pande V (2008). Statistical Characterization of Protein Ensembles, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:1, (42-55), Online publication date: 1-Jan-2008.
  2464. Boscolo R, Liao J and Roychowdhury V (2008). An Information Theoretic Exploratory Method for Learning Patterns of Conditional Gene Coexpression from Microarray Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:1, (15-24), Online publication date: 1-Jan-2008.
  2465. Dehuri S, Patnaik S, Ghosh A and Mall R (2008). Application of elitist multi-objective genetic algorithm for classification rule generation, Applied Soft Computing, 8:1, (477-487), Online publication date: 1-Jan-2008.
  2466. Chen Y, Reeves D, Pennock D, Hanson R, Fortnow L and Gonen R Bluffing and strategic reticence in prediction markets Proceedings of the 3rd international conference on Internet and network economics, (70-81)
  2467. Srinathan K, Patra A, Choudhary A and Rangan C Probabilistic perfectly reliable and secure message transmission - possibility, feasibility and optimality Proceedings of the cryptology 8th international conference on Progress in cryptology, (101-122)
  2468. Nestler S Non-Gaussian asset allocation in the federal thrift savings plan Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (1004-1012)
  2469. Zhang X, Dai W, Xue G and Yu Y Adaptive email spam filtering based on information theory Proceedings of the 8th international conference on Web information systems engineering, (159-170)
  2470. ACM
    Mei Q, Xin D, Cheng H, Han J and Zhai C (2007). Semantic annotation of frequent patterns, ACM Transactions on Knowledge Discovery from Data, 1:3, (11-es), Online publication date: 1-Dec-2007.
  2471. Roy A, Misra A and Das S (2007). Location Update versus Paging Trade-Off in Cellular Networks, IEEE Transactions on Mobile Computing, 6:12, (1426-1440), Online publication date: 1-Dec-2007.
  2472. Míguez J (2007). Analysis of parallelizable resampling algorithms for particle filtering, Signal Processing, 87:12, (3155-3174), Online publication date: 1-Dec-2007.
  2473. Tang Z, Glover I, Evans A and He J (2007). An energy-efficient adaptive DSC scheme for wireless sensor networks, Signal Processing, 87:12, (2896-2910), Online publication date: 1-Dec-2007.
  2474. Taycher L, Fisher J and Darrell T (2007). Combining object and feature dynamics in probabilistic tracking, Computer Vision and Image Understanding, 108:3, (243-260), Online publication date: 1-Dec-2007.
  2475. Chen B, Hu J, Pu L and Sun Z (2007). Stochastic Gradient Algorithm Under (h,?)-Entropy Criterion, Circuits, Systems, and Signal Processing, 26:6, (941-960), Online publication date: 1-Dec-2007.
  2476. Wang J and Yagi Y Discriminative mean shift tracking with auxiliary particles Proceedings of the 8th Asian conference on Computer vision - Volume Part I, (576-585)
  2477. Wang J and Yagi Y Discriminative Mean Shift Tracking with Auxiliary Particles Computer Vision – ACCV 2007, (576-585)
  2478. Novovičová J, Somol P, Haindl M and Pudil P Conditional mutual information based feature selection for classification task Proceedings of the Congress on pattern recognition 12th Iberoamerican conference on Progress in pattern recognition, image analysis and applications, (417-426)
  2479. Kim K and Cho S Diverse Evolutionary Neural Networks Based on Information Theory Neural Information Processing, (1007-1016)
  2480. Uchida M, Maehara Y and Shioya H Design of an Unsupervised Weight Parameter Estimation Method in Ensemble Learning Neural Information Processing, (771-780)
  2481. ACM
    Overell S and Rüger S Geographic co-occurrence as a tool for gir. Proceedings of the 4th ACM workshop on Geographical information retrieval, (71-76)
  2482. Beauxis R, Chatzikokolakis K, Palamidessi C and Panangaden P Formal approaches to information-hiding (Tutorial) Proceedings of the 3rd conference on Trustworthy global computing, (347-362)
  2483. Arredondo V, Freund W, Muñoz C and Quirós F Learning performance in evolutionary behavior based mobile robot navigation Proceedings of the artificial intelligence 6th Mexican international conference on Advances in artificial intelligence, (811-820)
  2484. Bonev B, Escolano F and Cazorla M A novel information theory method for filter feature selection Proceedings of the artificial intelligence 6th Mexican international conference on Advances in artificial intelligence, (431-440)
  2485. Sonnek J, Chandra A and Weissman J (2007). Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures, IEEE Transactions on Parallel and Distributed Systems, 18:11, (1551-1564), Online publication date: 1-Nov-2007.
  2486. Kim S, Wang X and Madihian M (2007). Cross-Layer Design of Wireless Multihop Backhaul Networks With Multiantenna Beamforming, IEEE Transactions on Mobile Computing, 6:11, (1270-1269), Online publication date: 1-Nov-2007.
  2487. Ganesh A, Kermarrec A, Merrer E and Massoulié L (2007). Peer counting and sampling in overlay networks based on random walks, Distributed Computing, 20:4, (267-278), Online publication date: 1-Nov-2007.
  2488. ACM
    Gianvecchio S and Wang H Detecting covert timing channels Proceedings of the 14th ACM conference on Computer and communications security, (307-316)
  2489. ACM
    Hoh B, Gruteser M, Xiong H and Alrabady A Preserving privacy in gps traces via uncertainty-aware path cloaking Proceedings of the 14th ACM conference on Computer and communications security, (161-171)
  2490. ACM
    Shrivastava V, Agrawal D, Mishra A, Banerjee S and Nadeem T Understanding the limitations of transmit power control for indoor wlans Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (351-364)
  2491. Fournier L and Ziv A Using virtual coverage to hit hard-to-reach events Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (104-119)
  2492. Fournier L and Ziv A Using Virtual Coverage to Hit Hard-To-Reach Events Hardware and Software: Verification and Testing, (104-119)
  2493. Marbukh V and Klink S Decentralized control of large-scale networks as a game with local interactions Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-8)
  2494. Altman E, Avrachenkov K and Garnaev A Closed form solutions for water-filling problems in optimization and game frameworks Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-8)
  2495. Uchida M Information theoretic aspects of fairness criteria in network resource allocation problems Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-9)
  2496. ACM
    Baccarelli E, Biagi M, Pelizzoni C and Cordeschi N Multi-antenna cognitive radio for broadband access in 4G-WLANs Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (66-73)
  2497. Grest D and Krüger V Gradient-enhanced particle filter for vision-based motion capture Proceedings of the 2nd conference on Human motion: understanding, modeling, capture and animation, (28-41)
  2498. ACM
    Mutlu B, Krause A, Forlizzi J, Guestrin C and Hodgins J Robust, low-cost, non-intrusive sensing and recognition of seated postures Proceedings of the 20th annual ACM symposium on User interface software and technology, (149-158)
  2499. Theofilakos P and Kanatas A (2007). Capacity performance of adaptive receive antenna subarray formation for MIMO systems, EURASIP Journal on Wireless Communications and Networking, 2007, (1-12), Online publication date: 1-Oct-2007.
  2500. Balagani K and Phoha V (2007). On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:10, (1866-1868), Online publication date: 1-Oct-2007.
  2501. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K (2007). Opportunistic Encryption, IEEE Transactions on Dependable and Secure Computing, 4:4, (313-324), Online publication date: 1-Oct-2007.
  2502. Nanda A and Maiti S (2007). Rényi information measure for a used item, Information Sciences: an International Journal, 177:19, (4161-4175), Online publication date: 1-Oct-2007.
  2503. Gross M and Voegeli C (2007). Technical Section, Computers and Graphics, 31:5, (761-777), Online publication date: 1-Oct-2007.
  2504. Lin J and Stefanov A (2007). Cooperative Coding for OFDM Systems, Wireless Personal Communications: An International Journal, 43:1, (123-139), Online publication date: 1-Oct-2007.
  2505. Mazzarese D and Krzymień W (2007). Scheduling Algorithms and Throughput Maximization for the Downlink of Packet-Data Cellular Systems with Multiple Antennas at the Base Station, Wireless Personal Communications: An International Journal, 43:2, (215-260), Online publication date: 1-Oct-2007.
  2506. ACM
    Cheng W, Chuang Y, Chen B, Wu J, Fang S, Lin Y, Hsieh C, Pan C, Chu W and Tien M Semantic-event based analysis and segmentation of wedding ceremony videos Proceedings of the international workshop on Workshop on multimedia information retrieval, (95-104)
  2507. Ding S, Ning W and Shi Z Diversity analysis of information pattern and information clustering algorithm Proceedings of the 2nd international conference on Advances in computation and intelligence, (428-434)
  2508. ACM
    Czarlinska A and Kundur D Attack vs. failure detection in event-driven wireless visual sensor networks Proceedings of the 9th workshop on Multimedia & security, (215-220)
  2509. ACM
    Barni M, D'Angelo A and Merhav N Expanding the class of watermark de-synchronization attacks Proceedings of the 9th workshop on Multimedia & security, (195-204)
  2510. ACM
    Comesaña P and Pérez-González F On the capacity of stegosystems Proceedings of the 9th workshop on Multimedia & security, (15-24)
  2511. Lange T and Buhmann J Kernel-Based Grouping of Histogram Data Proceedings of the 18th European conference on Machine Learning, (632-639)
  2512. Balbín A and Andrade E Designing a methodology to estimate complexity of protein structures Proceedings of the 9th European conference on Advances in artificial life, (1069-1078)
  2513. ACM
    Zhou D, Goulding J, Truran M and Brailsford T LLAMA Proceedings of the eighteenth conference on Hypertext and hypermedia, (77-80)
  2514. Rajala M and Ritala R A method to estimate the graph structure for a large MRF model Proceedings of the 17th international conference on Artificial neural networks, (836-849)
  2515. Pham D Blind separation of cyclostationary sources using joint block approximate diagonalization Proceedings of the 7th international conference on Independent component analysis and signal separation, (244-251)
  2516. Vrins F, Pham D and Verleysen M Is the general form of Renyi's entropy a contrast for source separation? Proceedings of the 7th international conference on Independent component analysis and signal separation, (129-136)
  2517. Cruces S, Sarmiento A and Durán I The complex version of the minimum support criterion Proceedings of the 7th international conference on Independent component analysis and signal separation, (17-24)
  2518. ACM
    Keshavarz-Haddad A and Riedi R Bounds for the capacity of wireless multihop networks imposed by topology and demand Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (256-265)
  2519. ACM
    Xiao J, Wang X and Liu B (2007). The study of a nonstationary maximum entropy Markov model and its application on the pos-tagging task, ACM Transactions on Asian Language Information Processing, 6:2, (7-es), Online publication date: 1-Sep-2007.
  2520. Coeurjolly J, Drouilhet R and Robineau J (2007). Normalized information-based divergences, Problems of Information Transmission, 43:3, (167-189), Online publication date: 1-Sep-2007.
  2521. Khosravifard M, Fooladivanda D and Gulliver T (2007). Confliction of the Convexity and Metric Properties in f-Divergences, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:9, (1848-1853), Online publication date: 1-Sep-2007.
  2522. Kim T, Arandjelović O and Cipolla R (2007). Boosted manifold principal angles for image set-based recognition, Pattern Recognition, 40:9, (2475-2484), Online publication date: 1-Sep-2007.
  2523. Gu X, Lutz J and Moser P (2007). Dimensions of Copeland--Erdös sequences, Information and Computation, 205:9, (1317-1333), Online publication date: 1-Sep-2007.
  2524. Brandão F, Horodecki M, Plenio M and Virmani S (2007). Remarks on the Equivalence of Full Additivity and Monotonicity for the Entanglement Cost, Open Systems & Information Dynamics, 14:3, (333-339), Online publication date: 1-Sep-2007.
  2525. Dutta R and Mukhopadhyay S Designing scalable self-healing key distribution schemes with revocation capability Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications, (419-430)
  2526. Costa I, de Souto M and Schliep A Validating gene clusterings by selecting informative gene ontology terms with mutual information Proceedings of the 2nd Brazilian conference on Advances in bioinformatics and computational biology, (81-92)
  2527. Bhatnagar J and Kumar A On some performance indices for biometric identification system Proceedings of the 2007 international conference on Advances in Biometrics, (1043-1056)
  2528. Xu Q, Sbert M, Feixas M and Zhang J AM-GM difference based adaptive sampling for Monte Carlo global illumination Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II, (602-611)
  2529. Kim J, Hsu W, Yew P, Nair S and Geva R Entropy-based profile characterization and classification for automatic profile management Proceedings of the 12th Asia-Pacific conference on Advances in Computer Systems Architecture, (40-51)
  2530. Raskhodnikova S, Ron D, Rubinfeld R and Smith A Sublinear Algorithms for Approximating String Compressibility Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (609-623)
  2531. Kumar R and Panigrahy R On Finding Frequent Elements in a Data Stream Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (584-595)
  2532. ACM
    Haddad M, Hayar A and Debbah M Optimal power allocation for cognitive radio based on a virtual noise threshold First International Workshop on Cognitive Wireless Networks, (1-4)
  2533. Wiesner K and Crutchfield J Computation in sofic quantum dynamical systems Proceedings of the 6th international conference on Unconventional Computation, (214-225)
  2534. Elias Y, Fernandez J, Mor T and Weinstein Y Optimal algorithmic cooling of spins Proceedings of the 6th international conference on Unconventional Computation, (2-26)
  2535. ACM
    Tang W, Xiong H, Zhong S and Wu J Enhancing semi-supervised clustering Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (707-716)
  2536. ACM
    Sun J, Faloutsos C, Papadimitriou S and Yu P GraphScope Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (687-696)
  2537. ACM
    Heikinheimo H, Hinkkanen E, Mannila H, Mielikäinen T and Seppänen J Finding low-entropy sets and trees from binary data Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (350-359)
  2538. ACM
    Dai W, Xue G, Yang Q and Yu Y Co-clustering based classification for out-of-domain documents Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (210-219)
  2539. ACM
    Hwang K and Ko Y Switch-and-examine node selection for efficient relaying systems Proceedings of the 2007 international conference on Wireless communications and mobile computing, (469-474)
  2540. ACM
    Cheng J On the expected codeword length per symbol of optimal prefix codes for extended sources Proceedings of the 2007 international conference on Wireless communications and mobile computing, (325-328)
  2541. Clark D, Hunt S and Malacaria P (2007). A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, 15:3, (321-371), Online publication date: 1-Aug-2007.
  2542. Lemeire J, Dirkx E and Verbist F (2007). Causal analysis for performance modeling of computer programs, Scientific Programming, 15:3, (121-136), Online publication date: 1-Aug-2007.
  2543. ACM
    Sinha R and Winslett M (2007). Multi-resolution bitmap indexes for scientific data, ACM Transactions on Database Systems, 32:3, (16-es), Online publication date: 1-Aug-2007.
  2544. Feng W and Greene J (2007). Post-placement interconnect entropy, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:8, (945-948), Online publication date: 1-Aug-2007.
  2545. Nenadic Z (2007). Information Discriminant Analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:8, (1394-1407), Online publication date: 1-Aug-2007.
  2546. Corazza A and Satta G (2007). Probabilistic Context-Free Grammars Estimated from Infinite Distributions, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:8, (1379-1393), Online publication date: 1-Aug-2007.
  2547. Chen Y, Härdle W and Spokoiny V (2007). Portfolio value at risk based on independent component analysis, Journal of Computational and Applied Mathematics, 205:1, (594-607), Online publication date: 1-Aug-2007.
  2548. Payaro M, Pascual-Iserte A and Angel Lagunas M (2007). Mutual Information Optimization and Capacity Evaluation in MIMO Systems with Magnitude Knowledge and Phase Uncertainty, Circuits, Systems, and Signal Processing, 26:4, (527-549), Online publication date: 1-Aug-2007.
  2549. ACM
    Balog K, Bogers T, Azzopardi L, de Rijke M and van den Bosch A Broad expertise retrieval in sparse data environments Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (551-558)
  2550. ACM
    Turnbull D, Barrington L, Torres D and Lanckriet G Towards musical query-by-semantic-description using the CAL500 data set Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (439-446)
  2551. ACM
    Zhang K, Zi J and Wu L New event detection based on indexing-tree and named entity Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (215-222)
  2552. ACM
    Sun B, Mitra P, Giles C, Yen J and Zha H Topic segmentation with shared topic detection and alignment of multiple documents Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (199-206)
  2553. Agnihotri S, Nuggehalli P and Jamadagni H Correlation, coding, and cooperation in wireless sensor networks Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks, (83-98)
  2554. Saxena N, Roy A and Shin J CHASE Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing, (133-142)
  2555. Kaplan H and Verbin E Most burrows-wheeler based compressors are not optimal Proceedings of the 18th annual conference on Combinatorial Pattern Matching, (107-118)
  2556. ACM
    Magalhães J and Rüger S Information-theoretic semantic multimedia indexing Proceedings of the 6th ACM international conference on Image and video retrieval, (619-626)
  2557. ACM
    Cai Y, Sun X, Xu H and Jia P Cross entropy and adaptive variance scaling in continuous EDA Proceedings of the 9th annual conference on Genetic and evolutionary computation, (609-616)
  2558. ACM
    Yu T, Sastry K, Goldberg D and Pelikan M Population sizing for entropy-based model building in discrete estimation of distribution algorithms Proceedings of the 9th annual conference on Genetic and evolutionary computation, (601-608)
  2559. ACM
    Bacardit J, Stout M, Hirst J, Sastry K, Llorà X and Krasnogor N Automated alphabet reduction method with evolutionary algorithms for protein structure prediction Proceedings of the 9th annual conference on Genetic and evolutionary computation, (346-353)
  2560. Loeckx D, Slagmolen P, Maes F, Vandermeulen D and Suetens P Nonrigid image registration using conditional mutual information Proceedings of the 20th international conference on Information processing in medical imaging, (725-737)
  2561. Zöllei L, Jenkinson M, Timoner S and Wells W A marginalized MAP approach and EM optimization for pair-wise registration Proceedings of the 20th international conference on Information processing in medical imaging, (662-674)
  2562. Loog M Localized maximum entropy shape modelling Proceedings of the 20th international conference on Information processing in medical imaging, (619-629)
  2563. Cates J, Fletcher P, Styner M, Shenton M and Whitaker R Shape modeling and analysis with entropy-based particle systems Proceedings of the 20th international conference on Information processing in medical imaging, (333-345)
  2564. Casagrande A, Casey K, Falchi R, Piazza C, Ruperti B, Vizzotto G and Mishra B Translating time-course gene expression profiles into semi-algebraic hybrid automata via dimensionality reduction Proceedings of the 2nd international conference on Algebraic biology, (51-65)
  2565. del Coso A and Ibars C (2007). Distributed antenna channels with regenerative relaying, EURASIP Journal on Wireless Communications and Networking, 2007:3, (1-9), Online publication date: 1-Jul-2007.
  2566. Ikegaya R, Kasai K, Shibuya T and Sakaniwa K (2007). Performance of Standard Irregular LDPC Codes under Maximum Likelihood Decoding, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:7, (1432-1443), Online publication date: 1-Jul-2007.
  2567. Apostolico A (2007). Fast gapped variants for Lempel--Ziv--Welch compression, Information and Computation, 205:7, (1012-1026), Online publication date: 1-Jul-2007.
  2568. Reif J and Chakraborty S (2007). Efficient and exact quantum compression, Information and Computation, 205:7, (967-981), Online publication date: 1-Jul-2007.
  2569. Guo Y, Gu X, Chen Z, Chen Q and Wang C Adaptive video presentation for small display while maximize visual information Proceedings of the 9th international conference on Advances in visual information systems, (322-332)
  2570. Rigau J, Feixas M and Sbert M Conceptualizing Birkhoff's aesthetic measure using Shannon entropy and Kolmogorov complexity Proceedings of the Third Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (105-112)
  2571. Gómez-Verdejo V, Verleysen M and Fleury J Information-theoretic feature selection for the classification of hysteresis curves Proceedings of the 9th international work conference on Artificial neural networks, (522-529)
  2572. ACM
    Krause A and Guestrin C Nonmyopic active learning of Gaussian processes Proceedings of the 24th international conference on Machine learning, (449-456)
  2573. ACM
    Ji S and Carin L Bayesian compressive sensing and projection optimization Proceedings of the 24th international conference on Machine learning, (377-384)
  2574. ACM
    Globerson A, Koo T, Carreras X and Collins M Exponentiated gradient algorithms for log-linear structured prediction Proceedings of the 24th international conference on Machine learning, (305-312)
  2575. ACM
    Cazzanti L and Gupta M Local similarity discriminant analysis Proceedings of the 24th international conference on Machine learning, (137-144)
  2576. ACM
    Hillel A and Weinshall D Learning distance function by coding similarity Proceedings of the 24th international conference on Machine learning, (65-72)
  2577. ACM
    Agarwal A and Chakrabarti S Learning random walks to rank nodes in graphs Proceedings of the 24th international conference on Machine learning, (9-16)
  2578. Dang T, Frolov S, Bulusu N, Baptista A and Feng W Near optimal sensor selection in the Columbia river (CORIE) observation network for data assimilation using genetic algorithms Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems, (253-266)
  2579. Pérez-Freire L and Pérez-González F Exploiting security holes in lattice data hiding Proceedings of the 9th international conference on Information hiding, (159-173)
  2580. ACM
    Holenstein T Parallel repetition Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (411-419)
  2581. Felsberg M and Hedborg J Real-time visual recognition of objects and scenes using P-channel matching Proceedings of the 15th Scandinavian conference on Image analysis, (908-917)
  2582. ACM
    Wang Z and Lee R (2007). New cache designs for thwarting software cache-based side channel attacks, ACM SIGARCH Computer Architecture News, 35:2, (494-505), Online publication date: 9-Jun-2007.
  2583. ACM
    Wang Z and Lee R New cache designs for thwarting software cache-based side channel attacks Proceedings of the 34th annual international symposium on Computer architecture, (494-505)
  2584. Altman E, Avrachenkov K and Garnaev A A jamming game in wireless networks with transmission cost Proceedings of the 1st EuroFGI international conference on Network control and optimization, (1-12)
  2585. Dutta R, Chang E and Mukhopadhyay S Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains Proceedings of the 5th international conference on Applied Cryptography and Network Security, (385-400)
  2586. Magesacher T, Ödling P and Börjesson P (2007). Analysis of adaptive interference cancellation using common-mode information in wireline communications, EURASIP Journal on Advances in Signal Processing, 2007:2, (9-9), Online publication date: 1-Jun-2007.
  2587. Kim T, Kittler J and Cipolla R (2007). Discriminative Learning and Recognition of Image Set Classes Using Canonical Correlations, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:6, (1005-1018), Online publication date: 1-Jun-2007.
  2588. Sinanović S and Johnson D (2007). Toward a theory of information processing, Signal Processing, 87:6, (1326-1344), Online publication date: 1-Jun-2007.
  2589. Voloshynovskiy S, Koval O, Deguillaume F and Pun T (2007). Quality enhancement of printed-and-scanned images using distributed coding, Signal Processing, 87:6, (1301-1313), Online publication date: 1-Jun-2007.
  2590. Papaioannou T, Ferentinos K and Tsairidis C (2007). Some Information Theoretic Ideas Useful in Statistical Inference, Methodology and Computing in Applied Probability, 9:2, (307-323), Online publication date: 1-Jun-2007.
  2591. Scanlon P and Bergin S (2007). Using support vector machines and acoustic noise signal for degradation analysis of rotating machinery, Artificial Intelligence Review, 28:1, (1-15), Online publication date: 1-Jun-2007.
  2592. Chen P, Chen Y and Rao M Kullback Leibler divergence based curve matching method Proceedings of the 1st international conference on Scale space and variational methods in computer vision, (813-824)
  2593. Saxena N, Roy A and Shin J CARP Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007, (652-659)
  2594. Chung Y, Hsu D and Tang C On the diversity-performance relationship for majority voting in classifier ensembles Proceedings of the 7th international conference on Multiple classifier systems, (407-420)
  2595. Meynet J and Thiran J Information theoretic combination of classifiers with application to AdaBoost Proceedings of the 7th international conference on Multiple classifier systems, (171-179)
  2596. Zhang N Towards comprehensive privacy protection in data clustering Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1096-1104)
  2597. Baiamonte V, Papagiannaki K and Iannaccone G Detecting 802.11 wireless hosts from remote passive observations Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (356-367)
  2598. ACM
    Wingate D and Singh S On discovery and learning of models with predictive representations of state for agents with continuous actions and observations Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  2599. ACM
    Rabinovich Z, Rosenschein J and Kaminka G Dynamics based control with an application to area-sweeping problems Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  2600. ACM
    Kolahi S and Libkin L XML design for relational storage Proceedings of the 16th international conference on World Wide Web, (1083-1092)
  2601. ACM
    Xu Y, Wang K, Zhang B and Chen Z Privacy-enhancing personalized web search Proceedings of the 16th international conference on World Wide Web, (591-600)
  2602. ACM
    Adler B and de Alfaro L A content-driven reputation system for the wikipedia Proceedings of the 16th international conference on World Wide Web, (261-270)
  2603. Szabó Z, Póczos B and Lőrincz A (2007). Undercomplete Blind Subspace Deconvolution, The Journal of Machine Learning Research, 8, (1063-1095), Online publication date: 1-May-2007.
  2604. Chakrabartty S and Cauwenberghs G (2007). Gini Support Vector Machine: Quadratic Entropy Based Robust Multi-Class Probability Regression, The Journal of Machine Learning Research, 8, (813-839), Online publication date: 1-May-2007.
  2605. Teboulle M (2007). A Unified Continuous Optimization Framework for Center-Based Clustering Methods, The Journal of Machine Learning Research, 8, (65-102), Online publication date: 1-May-2007.
  2606. ACM
    Moncrieff S, Venkatesh S and West G (2007). Online audio background determination for complex audio environments, ACM Transactions on Multimedia Computing, Communications, and Applications, 3:2, (8-es), Online publication date: 1-May-2007.
  2607. Clancy T Achievable Capacity Under the Interference Temperature Model Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (794-802)
  2608. Bhandari V and Vaidya N Reliable Broadcast in Wireless Networks with Probabilistic Failures Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (715-723)
  2609. Bisnik N and Abouzeid A Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (517-525)
  2610. Lifeng Lai and El Gamal H On Cooperation in Energy Limited Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (508-516)
  2611. Young-Han Nam , Gopala P and El-Gamal H Resolving Collisions Via Incremental Redundancy Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (285-293)
  2612. Kogan H and Keslassy I Fundamental Complexity of Optical Systems Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2506-2510)
  2613. Zesheng Chen and Chuanyi Ji Measuring Network-Aware Worm Spreading Ability Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (116-124)
  2614. de Baynast A, Gurewitz O and Knightly E Cooperative Strategies and Optimal Scheduling for Tree Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1857-1865)
  2615. de Moraes R, Sadjadpour H and Garcia-Luna-Aceves J Many-to-Many Communication Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1829-1837)
  2616. Muqattash A and Krunz M Performance of Wireless CDMA Networks Under Optimal Link-Layer Adaptation Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1703-1711)
  2617. Sarshar N and Xiaolin Wu Rate-Distortion Optimized Network Communication Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1595-1603)
  2618. Jia Tang and Xi Zhang QoS-Driven Power Allocation Over Parallel Fading Channels With Imperfect Channel Estimations in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (62-70)
  2619. Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
  2620. Kodialam M and Lakshman T Achievable Rate Region for Wireless Systems with Time Varying Channels Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (53-61)
  2621. El-Atawy A, Samak T, Al-Shaer E and Hong Li Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (866-874)
  2622. ACM
    Rozell C and Johnson D Power scheduling for wireless sensor and actuator networks Proceedings of the 6th international conference on Information processing in sensor networks, (470-478)
  2623. O'Rourke S, Zaitlen N, Jojic N and Eskin E Reconstructing the phylogeny of mobile elements Proceedings of the 11th annual international conference on Research in computational molecular biology, (196-210)
  2624. ACM
    Navarro G and Mäkinen V (2007). Compressed full-text indexes, ACM Computing Surveys, 39:1, (2-es), Online publication date: 12-Apr-2007.
  2625. Gao Y, Gu S, Li J and Liao Z The multi-view information bottleneck clustering Proceedings of the 12th international conference on Database systems for advanced applications, (912-917)
  2626. Jain A, Chang E and Wang Y Bayesian reasoning for sensor group-queries and diagnosis Proceedings of the 12th international conference on Database systems for advanced applications, (522-538)
  2627. Kundu S, Pal S, Basu K and Das S Fast classification and estimation of internet traffic flows Proceedings of the 8th international conference on Passive and active network measurement, (155-164)
  2628. Mattar K, Sridharan A, Zang H, Matta I and Bestavros A TCP over CDMA2000 networks Proceedings of the 8th international conference on Passive and active network measurement, (94-104)
  2629. Aslam J and Pavlu V Query hardness estimation using Jensen-Shannon divergence among multiple scoring functions Proceedings of the 29th European conference on IR research, (198-209)
  2630. Kramer G (2008). Topics in Multi-User Information Theory, Foundations and Trends in Communications and Information Theory, 4:4-5, (265-444), Online publication date: 1-Apr-2007.
  2631. ACM
    RayChaudhuri A, Chinthala U and Bhattacharya A (2007). Obfuscating temporal context of sensor data by coalescing at source, ACM SIGMOBILE Mobile Computing and Communications Review, 11:2, (41-42), Online publication date: 1-Apr-2007.
  2632. Meyer P, Kontos K and Bontempi G Biological network inference using redundancy analysis Proceedings of the 1st international conference on Bioinformatics research and development, (16-27)
  2633. ACM
    Su X (2007). A combinatorial algorithmic approach to energy efficient information collection in wireless sensor networks, ACM Transactions on Sensor Networks, 3:1, (6-es), Online publication date: 1-Mar-2007.
  2634. Holevo A (2007). One-mode quantum Gaussian channels, Problems of Information Transmission, 43:1, (1-11), Online publication date: 1-Mar-2007.
  2635. Vincent Wenchen Zheng , Xinming Zhang , Daoke Liu and Dan Keun Sung A Joint Power Control, Link Scheduling and Rate Control Algorithm for Wireless Ad Hoc Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3636-3640)
  2636. Kemal Karakayali , Kang J, Murali Kodialam and Krishna Balachandran Cross-Layer Optimization for OFDMA-Based Wireless Mesh Backhaul Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (276-281)
  2637. Dutta R and Mukhopadhyay S Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2963-2968)
  2638. Ganesanj G, Ye Li and Vook F Stability Region of Multicarrier Channel Aware Aloha Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2221-2225)
  2639. de la Kethulle de Ryhove S and OEien G Rate-Optimal Power Adaptation in Average and Peak Power Constrained Fading Channels Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1773-1778)
  2640. Kai-Kit Wong Power Allocation and Multiuser Scheduling for Delay-Limited Communications Exploiting Only Channel Statistics Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1512-1516)
  2641. Shengli Zhang , Yu Zhu , Soung-Chang Liew and Khaled Ben Letaief Joint Design of Network Coding and Channel Decoding for Wireless Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (779-784)
  2642. Benvenuto N, Bisaglia P and Boccardi F Linear Precoding for Downlink MC-CDMA Systems Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (621-626)
  2643. Cilibrasi R and Vitanyi P (2007). The Google Similarity Distance, IEEE Transactions on Knowledge and Data Engineering, 19:3, (370-383), Online publication date: 1-Mar-2007.
  2644. Zhong X and Xu C (2007). Energy-Aware Modeling and Scheduling for Dynamic Voltage Scaling with Statistical Real-Time Guarantee, IEEE Transactions on Computers, 56:3, (358-372), Online publication date: 1-Mar-2007.
  2645. Cook D and Das S (2007). How smart are our environments? An updated look at the state of the art, Pervasive and Mobile Computing, 3:2, (53-73), Online publication date: 1-Mar-2007.
  2646. Anderson N (2007). Quantum Subspace Measurements, Open Systems & Information Dynamics, 14:1, (117-126), Online publication date: 1-Mar-2007.
  2647. ACM
    Feng W and Kaptanoglu S Designing efficient input interconnect blocks for LUT clusters using counting and entropy Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays, (23-32)
  2648. Haroutunian E, Haroutunian M and Harutyunyan A (2007). Reliability criteria in information theory and in statistical hypothesis testing, Foundations and Trends in Communications and Information Theory, 4:2, (97-263), Online publication date: 1-Feb-2007.
  2649. ACM
    Pandurangan G and Upfal E (2007). Entropy-based bounds for online algorithms, ACM Transactions on Algorithms, 3:1, (1-19), Online publication date: 1-Feb-2007.
  2650. ACM
    Vaswani K, Nori A and Chilimbi T Preferential path profiling Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (351-362)
  2651. ACM
    Malacaria P Assessing security threats of looping constructs Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (225-235)
  2652. ACM
    Vaswani K, Nori A and Chilimbi T (2007). Preferential path profiling, ACM SIGPLAN Notices, 42:1, (351-362), Online publication date: 17-Jan-2007.
  2653. ACM
    Malacaria P (2007). Assessing security threats of looping constructs, ACM SIGPLAN Notices, 42:1, (225-235), Online publication date: 17-Jan-2007.
  2654. Karp R and Kleinberg R Noisy binary search and its applications Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (881-890)
  2655. Smith A Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (395-404)
  2656. Brautbar M and Samorodnitsky A Approximating entropy from sublinear samples Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (366-375)
  2657. Aktulga H, Kontoyiannis I, Lyznik L, Szpankowski L, Grama A and Szpankowski W (2007). Identifying statistical dependence in genomic sequences via mutual information estimates, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (1-11), Online publication date: 1-Jan-2007.
  2658. Toumpakaris D and Kotsopoulos S (2007). Video broadcasting using queue proportional scheduling, Advances in Multimedia, 2007:1, (1-8), Online publication date: 1-Jan-2007.
  2659. Fragouli C and Soljanin E (2007). Network coding fundamentals, Foundations and Trends® in Networking, 2:1, (1-133), Online publication date: 1-Jan-2007.
  2660. Hemmerich C and Kim S (2007). A study of residue correlation within protein sequences and its application to sequence classification, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (9-9), Online publication date: 1-Jan-2007.
  2661. Meyer P, Kontos K, Lafitte F and Bontempi G (2007). Information-theoretic inference of large transcriptional regulatory networks, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (8-8), Online publication date: 1-Jan-2007.
  2662. Lan T, Erdogmus D, Adami A, Mathan S and Pavel M (2007). Channel selection and feature projection for cognitive load estimation using ambulatory EEG, Computational Intelligence and Neuroscience, 2007, (8-8), Online publication date: 1-Jan-2007.
  2663. Kuan Y, Teoh A and Ngo D (2007). Secure hashing of dynamic hand signatures using wavelet-Fourier compression with biophasor mixing and 2N discretization, EURASIP Journal on Advances in Signal Processing, 2007:1, (32-32), Online publication date: 1-Jan-2007.
  2664. Yang W, Rath G and Guillemot C (2007). Scalable video coding with interlayer signal decorrelation techniques, EURASIP Journal on Advances in Signal Processing, 2007:1, (216-216), Online publication date: 1-Jan-2007.
  2665. Magli E, Barni M, Abrardo A and Grangetto M (2007). Distributed source coding techniques for lossless compression of hyperspectral images, EURASIP Journal on Advances in Signal Processing, 2007:1, (24-24), Online publication date: 1-Jan-2007.
  2666. Evans S, Kourtidis A, Markham T, Miller J, Conklin D and Torres A (2007). MicroRNA target detection and analysis for genes related to breast cancer using MDLcompress, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (1-16), Online publication date: 1-Jan-2007.
  2667. Bahrami H and Le-Ngoc T (2007). Eigenstructures of MIMO fading channel correlation matrices and optimum linear precoding designs for maximum ergodic capacity, EURASIP Journal on Advances in Signal Processing, 2007:1, (129-129), Online publication date: 1-Jan-2007.
  2668. Rao A, Hero A, States D and Engel J (2007). Motif discovery in tissue-specific regulatory sequences using directed information, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (1-13), Online publication date: 1-Jan-2007.
  2669. Su Q, Xiang K, Wang H, Sun B and Yu S Using pointwise mutual information to identify implicit features in customer reviews Proceedings of the 21st international conference on Computer Processing of Oriental Languages: beyond the orient: the research challenges ahead, (22-30)
  2670. Rybokas M Signal processing in measurement systems Proceedings of the 5th WSEAS international conference on System science and simulation in engineering, (215-218)
  2671. Desharnais J, Laviolette F and Zhioua S Testing probabilistic equivalence through reinforcement learning Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science, (236-247)
  2672. Liu P, Zhou J and Soong F Non-uniform kernel allocation based parsimonious HMM Proceedings of the 5th international conference on Chinese Spoken Language Processing, (294-302)
  2673. Liu L, Zheng T and Wu W State-dependent phoneme-based model merging for dialectal chinese speech recognition Proceedings of the 5th international conference on Chinese Spoken Language Processing, (282-293)
  2674. Ekdahl M and Koski T (2006). Bounds for the Loss in Probability of Correct Classification Under Model Based Approximation, The Journal of Machine Learning Research, 7, (2449-2480), Online publication date: 1-Dec-2006.
  2675. Šingliar T and Hauskrecht M (2006). Noisy-OR Component Analysis and its Application to Link Analysis, The Journal of Machine Learning Research, 7, (2189-2213), Online publication date: 1-Dec-2006.
  2676. Abbeel P, Koller D and Ng A (2006). Learning Factor Graphs in Polynomial Time and Sample Complexity, The Journal of Machine Learning Research, 7, (1743-1788), Online publication date: 1-Dec-2006.
  2677. Scott C and Nowak R (2006). Learning Minimum Volume Sets, The Journal of Machine Learning Research, 7, (665-704), Online publication date: 1-Dec-2006.
  2678. Begleiter R and El-Yaniv R (2006). Superior Guarantees for Sequential Prediction and Lossless Compression via Alphabet Decomposition, The Journal of Machine Learning Research, 7, (379-411), Online publication date: 1-Dec-2006.
  2679. Jorswieck E and Boche H (2006). Majorization and matrix-monotone functions in wireless communications, Foundations and Trends in Communications and Information Theory, 3:6, (553-701), Online publication date: 1-Dec-2006.
  2680. ACM
    Arenas M (2006). Normalization theory for XML, ACM SIGMOD Record, 35:4, (57-64), Online publication date: 1-Dec-2006.
  2681. ACM
    Nakassis A and Marbukh V (2006). Towards power and QoS aware wireless networks, ACM SIGMETRICS Performance Evaluation Review, 34:3, (3-5), Online publication date: 1-Dec-2006.
  2682. Monaci G, Escoda Ò and Vandergheynst P (2006). Analysis of multimodal sequences using geometric video representations, Signal Processing, 86:12, (3534-3548), Online publication date: 1-Dec-2006.
  2683. Mamitsuka H (2006). Selecting features in microarray classification using ROC curves, Pattern Recognition, 39:12, (2393-2404), Online publication date: 1-Dec-2006.
  2684. Palomar D and Jiang Y (2006). MIMO transceiver design via majorization theory, Foundations and Trends in Communications and Information Theory, 3:4, (331-551), Online publication date: 30-Nov-2006.
  2685. ACM
    Linari A and Weikum G Efficient peer-to-peer semantic overlay networks based on statistical language models Proceedings of the international workshop on Information retrieval in peer-to-peer networks, (9-16)
  2686. Chatzikokolakis K, Palamidessi C and Panangaden P Anonymity protocols as noisy channels Proceedings of the 2nd international conference on Trustworthy global computing, (281-300)
  2687. Wojnarski M Unsupervised learning of image recognition with neural society for clustering Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing, (862-871)
  2688. ACM
    Li H, Balakrishnan V and Koh C Stable and compact inductance modeling of 3-D interconnect structures Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (1-6)
  2689. He H, Jin H, Chen J, McAullay D, Li J and Fallon T Analysis of breast feeding data using data mining methods Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61, (47-52)
  2690. Land I and Huber J (2006). Information combining, Foundations and Trends in Communications and Information Theory, 3:3, (227-330), Online publication date: 1-Nov-2006.
  2691. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGPLAN Notices, 41:11, (61-72), Online publication date: 1-Nov-2006.
  2692. Wolff J (2006). Medical diagnosis as pattern recognition in a framework of information compression by multiple alignment, unification and search, Decision Support Systems, 42:2, (608-625), Online publication date: 1-Nov-2006.
  2693. Lim H, Choi J and Bahk S (2006). Utility-based downlink power allocation in multicell wireless packet networks, Computer Communications, 29:18, (3913-3920), Online publication date: 1-Nov-2006.
  2694. Novi Inverardi P and Tagliani A (2006). Discrete distributions from moment generating function, Applied Mathematics and Computation, 182:1, (200-209), Online publication date: 1-Nov-2006.
  2695. Erdogmus D, Jenssen R, Rao Y and Principe J (2006). Gaussianization, Journal of VLSI Signal Processing Systems, 45:1-2, (67-83), Online publication date: 1-Nov-2006.
  2696. ACM
    Ateniese G, De Santis A, Ferrara A and Masucci B Provably-secure time-bound hierarchical key assignment schemes Proceedings of the 13th ACM conference on Computer and communications security, (288-297)
  2697. ACM
    Li M, Sampigethaya K, Huang L and Poovendran R Swing & swap Proceedings of the 5th ACM workshop on Privacy in electronic society, (19-28)
  2698. ACM
    Xie H, Andreu V and Ortega A Quantization-based probabilistic feature modeling for kernel design in content-based image retrieval Proceedings of the 8th ACM international workshop on Multimedia information retrieval, (23-32)
  2699. ACM
    Ma J, Levchenko K, Kreibich C, Savage S and Voelker G Unexpected means of protocol inference Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (313-326)
  2700. ACM
    Ribeiro B, Towsley D, Ye T and Bolot J Fisher information of sampled packets Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (15-26)
  2701. Marano S, Matta V and Tong L Distributed detection in the presence of Byzantine attack in large wireless sensor networks Proceedings of the 2006 IEEE conference on Military communications, (1154-1157)
  2702. Ruan X and Katti R Reducing the length of Shannon-Fano-Elias codes and Shannon-Fano codes Proceedings of the 2006 IEEE conference on Military communications, (810-816)
  2703. Misra S, Tong L and Ephremides A Error exponents for target-class detection in a sensor network Proceedings of the 2006 IEEE conference on Military communications, (607-613)
  2704. Zhang X, Poor H and Chiang M Power allocation in distributed detection with wireless sensor networks Proceedings of the 2006 IEEE conference on Military communications, (586-592)
  2705. ACM
    Hsu W, Kennedy L and Chang S Video search reranking via information bottleneck principle Proceedings of the 14th ACM international conference on Multimedia, (35-44)
  2706. ACM
    Harada S, Landay J, Malkin J, Li X and Bilmes J The vocal joystick: Proceedings of the 8th international ACM SIGACCESS conference on Computers and accessibility, (197-204)
  2707. ACM
    Bond M and McKinley K Bell Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (61-72)
  2708. Peñalver A, Escolano F and Sáez J Color image segmentation through unsupervised gaussian mixture models Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence, (149-158)
  2709. ACM
    Cavazos J, Dubach C, Agakov F, Bonilla E, O'Boyle M, Fursin G and Temam O Automatic performance model construction for the fast software exploration of new hardware designs Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems, (24-34)
  2710. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGARCH Computer Architecture News, 34:5, (61-72), Online publication date: 20-Oct-2006.
  2711. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGOPS Operating Systems Review, 40:5, (61-72), Online publication date: 20-Oct-2006.
  2712. ACM
    Kontoyiannis I, Lastras-Montaño L and Meyn S Exponential bounds and stopping rules for MCMC and general Markov chains Proceedings of the 1st international conference on Performance evaluation methodolgies and tools, (45-es)
  2713. Geraci F, Pellegrini M, Maggini M and Sebastiani F Cluster generation and cluster labelling for web snippets Proceedings of the 13th international conference on String Processing and Information Retrieval, (25-36)
  2714. Páerez A, Larrañaga P and Inza I Information theory and classification error in probabilistic classifiers Proceedings of the 9th international conference on Discovery Science, (347-351)
  2715. Kamimura R, Yoshida F and Kitajima R Collective information-theoretic competitive learning Proceedings of the 13 international conference on Neural Information Processing - Volume Part I, (626-633)
  2716. Kamimura R Self-organizing by information maximization Proceedings of the 13 international conference on Neural Information Processing - Volume Part I, (925-934)
  2717. Hu B, Kalfoglou Y, Alani H, Dupplaw D, Lewis P and Shadbolt N Semantic metrics Proceedings of the 15th international conference on Managing Knowledge in a World of Networks, (166-181)
  2718. Martins D, Cesar R and Barrera J (2006). W-operator window design by minimization of mean conditional entropy, Pattern Analysis & Applications, 9:2-3, (139-153), Online publication date: 1-Oct-2006.
  2719. Herbulot A, Jehan-Besson S, Duffner S, Barlaud M and Aubert G (2006). Segmentation of Vectorial Image Features Using Shape Gradients and Information Measures, Journal of Mathematical Imaging and Vision, 25:3, (365-386), Online publication date: 1-Oct-2006.
  2720. Safavi-Naini R and Wang H (2006). Secret sharing schemes with partial broadcast channels, Designs, Codes and Cryptography, 41:1, (5-22), Online publication date: 1-Oct-2006.
  2721. Biham E, Boyer M, Boykin P, Mor T and Roychowdhury V (2006). A Proof of the Security of Quantum Key Distribution, Journal of Cryptology, 19:4, (381-439), Online publication date: 1-Oct-2006.
  2722. Liao S and Chung A Multi-modal image registration using the generalized survival exponential entropy Proceedings of the 9th international conference on Medical Image Computing and Computer-Assisted Intervention - Volume Part II, (964-971)
  2723. ACM
    Liu J, Adler M, Towsley D and Zhang C On optimal communication cost for gathering correlated data through wireless sensor networks Proceedings of the 12th annual international conference on Mobile computing and networking, (310-321)
  2724. ACM
    Wong S, Yang H, Lu S and Bharghavan V Robust rate adaptation for 802.11 wireless networks Proceedings of the 12th annual international conference on Mobile computing and networking, (146-157)
  2725. ACM
    Li Z, Xu W, Miller R and Trappe W Securing wireless systems via lower layer enforcements Proceedings of the 5th ACM workshop on Wireless security, (33-42)
  2726. Liu Y, Wang Y, Zhang L and Youn C Information-Driven task routing for network management in wireless sensor networks Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services, (23-32)
  2727. Liu C Learning students' learning patterns with support vector machines Proceedings of the 16th international conference on Foundations of Intelligent Systems, (601-611)
  2728. ACM
    Furon T Hermite polynomials as provably good functions to watermark white gaussian hosts Proceedings of the 8th workshop on Multimedia and security, (224-229)
  2729. ACM
    Voloshynovskiy S, Koval O, Topak E, Vila-Forcén J and Pun T On reversibility of random binning based data-hiding techniques Proceedings of the 8th workshop on Multimedia and security, (89-96)
  2730. ACM
    Pérez-Freire L, Pérez-González F and Furon T On achievable security levels for lattice data hiding in the known message attack scenario Proceedings of the 8th workshop on Multimedia and security, (68-79)
  2731. ACM
    Koval O, Voloshynovskiy S, Holotyak T and Pun T Information-theoretic analysis of steganalysis in real images Proceedings of the 8th workshop on Multimedia and security, (11-16)
  2732. ACM
    Jeyaraj A, Jafar S and El Zarki M A Slepian-Wolf based cross layer scheme suitable to sensor networks Proceedings of the 2nd international conference on Mobile multimedia communications, (1-4)
  2733. Davis J, Ha J, Rossbach C, Ramadan H and Witchel E Cost-Sensitive decision tree learning for forensic classification Proceedings of the 17th European conference on Machine Learning, (622-629)
  2734. Demirkol A, Demir Z and Emre E Alternative approaches and algorithms for classification Proceedings of the Third international conference on Image Analysis and Recognition - Volume Part II, (35-46)
  2735. El Fkihi S, Daoudi M and Aboutajdine D Probability approximation using best-tree distribution for skin detection Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems, (767-775)
  2736. Antonini G, Sorci M, Bierlaire M and Thiran J Discrete choice models for static facial expression recognition Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems, (710-721)
  2737. Gaucel J, Guillaume M and Bourennane S Non orthogonal component analysis Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems, (1198-1209)
  2738. Kwak N Feature extraction with weighted samples based on independent component analysis Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II, (340-349)
  2739. Iwata K and Hayashi A Theory of a probabilistic-dependence measure of dissimilarity among multiple clusters Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II, (311-320)
  2740. Wiratunga N, Lothian R and Massie S Unsupervised feature selection for text data Proceedings of the 8th European conference on Advances in Case-Based Reasoning, (340-354)
  2741. Liu Y, Wang Y, Zhang L and Youn C Information-Driven sensor selection algorithm for kalman filtering in sensor networks Proceedings of the Third international conference on Ubiquitous Intelligence and Computing, (498-507)
  2742. Geiger D, Meek C and Wexler Y (2006). A variational inference procedure allowing internal structure for overlapping clusters and deterministic constraints, Journal of Artificial Intelligence Research, 27:1, (1-23), Online publication date: 1-Sep-2006.
  2743. Raman V and Swart G How to wring a table dry Proceedings of the 32nd international conference on Very large data bases, (858-869)
  2744. Sismanis Y, Brown P, Haas P and Reinwald B GORDIAN Proceedings of the 32nd international conference on Very large data bases, (691-702)
  2745. Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V and Gunopulos D Online outlier detection in sensor data using non-parametric models Proceedings of the 32nd international conference on Very large data bases, (187-198)
  2746. Hild K, Erdogmus D, Torkkola K and Principe J (2006). Feature Extraction Using Information-Theoretic Learning, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:9, (1385-1392), Online publication date: 1-Sep-2006.
  2747. Lanz O (2006). Approximate Bayesian Multibody Tracking, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:9, (1436-1449), Online publication date: 1-Sep-2006.
  2748. Lopez-Valdes M Lempel-ziv dimension for lempel-ziv compression Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (693-703)
  2749. Gronemeier A NOF-multiparty information complexity bounds for pointer jumping Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (459-470)
  2750. ACM
    Maniyar D and Nabney I Visual data mining using principled projection algorithms and information visualization techniques Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (643-648)
  2751. ACM
    Knobbe A and Ho E Maximally informative k-itemsets and their efficient discovery Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (237-244)
  2752. ACM
    Ke Y, Cheng J and Ng W Mining quantitative correlated patterns using an information-theoretic approach Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (227-236)
  2753. Hell M and Johansson T On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2 Proceedings of the 13th international conference on Selected areas in cryptography, (220-233)
  2754. Peñalver A, Escolano F and Sáez J Two entropy-based methods for learning unsupervised gaussian mixture models Proceedings of the 2006 joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition, (649-657)
  2755. Ding S, Shi Z and Jin F Supervised feature extraction algorithm based on continuous divergence criterion Proceedings of the 2006 international conference on Intelligent computing: Part II, (268-277)
  2756. Guo S, Lyu M and Lok T Gene selection based on mutual information for the classification of multi-class cancer Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III, (454-463)
  2757. Zhou W, Zhou C, Zhu H, Liu G and Chang X Feature selection for microarray data analysis using mutual information and rough set theory Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III, (424-432)
  2758. Li G, Liu D, Tu Y and Ye Y Finding the optimal cardinality value for information bottleneck method Proceedings of the Second international conference on Advanced Data Mining and Applications, (594-605)
  2759. Schenkel P, Li W and Liu W Feature selection for complex patterns Proceedings of the Second international conference on Advanced Data Mining and Applications, (550-557)
  2760. Huang J, Lv N and Li W A novel feature selection approach by hybrid genetic algorithm Proceedings of the 9th Pacific Rim international conference on Artificial intelligence, (721-729)
  2761. ACM
    Gambiroza V and Knightly E Congestion control in CSMA-based networks with inconsistent channel state Proceedings of the 2nd annual international workshop on Wireless internet, (8-es)
  2762. Kramer G, Marić I and Yates R (2006). Cooperative communications, Foundations and Trends® in Networking, 1:3, (271-425), Online publication date: 1-Aug-2006.
  2763. Cesa-Bianchi N, Lugosi G and Stoltz G (2006). Regret Minimization Under Partial Monitoring, Mathematics of Operations Research, 31:3, (562-580), Online publication date: 1-Aug-2006.
  2764. Chen C, Yu C, Su C, Horng M and Kuo Y Packet length adaptation for energy-proportional routing in clustered sensor networks Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (32-42)
  2765. ACM
    Massoulié L, Le Merrer E, Kermarrec A and Ganesh A Peer counting and sampling in overlay networks Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, (123-132)
  2766. Lin W and Hauptmann A Are these documents written from different perspectives? Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, (1057-1064)
  2767. Jiao F, Wang S, Lee C, Greiner R and Schuurmans D Semi-supervised conditional random fields for improved sequence segmentation and labeling Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, (209-216)
  2768. Pantel P and Pennacchiotti M Espresso Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, (113-120)
  2769. Zuk O, Margel S and Domany E On the number of samples needed to learn the correct structure of a Bayesian network Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence, (560-567)
  2770. Steck H Ranking by dependence—a fair criteria Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence, (477-484)
  2771. Guo Y and Schuurmans D Convex structure learning for Bayesian networks Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence, (208-216)
  2772. Stoian R and Perişoară L Information capacity for a class of MIMO systems Proceedings of the 10th WSEAS international conference on Communications, (354-357)
  2773. Bojkovic Z and Rogan A Multimedia data hiding process Proceedings of the 10th WSEAS international conference on Communications, (80-85)
  2774. Du H, Qi H and Wang X A Parallel Independent Component Analysis Algorithm Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1, (151-160)
  2775. Gan R and Chung A Robust optimization using disturbance for image registration Proceedings of the Third international conference on Biomedical Image Registration, (280-288)
  2776. Bardera A, Feixas M, Boada I and Sbert M High-Dimensional normalized mutual information for image registration using random lines Proceedings of the Third international conference on Biomedical Image Registration, (264-271)
  2777. Bardera A, Feixas M, Boada I, Rigau J and Sbert M Medical image registration based on BSP and quad-tree partitioning Proceedings of the Third international conference on Biomedical Image Registration, (1-8)
  2778. ACM
    Yunpeng C, Xiaomin S and Peifa J Probabilistic modeling for continuous EDA with Boltzmann selection and Kullback-Leibeler divergence Proceedings of the 8th annual conference on Genetic and evolutionary computation, (389-396)
  2779. ACM
    Einhaus M, Klein O, Walke B and Bültmann D Performance evaluation of joint downlink scheduling in multi-cellular OFDMA systems based on IEEE 802.16a Proceedings of the 2006 international conference on Wireless communications and mobile computing, (647-652)
  2780. ACM
    Biagi M, Baccarelli E, Cordeschi N, Pelizzoni C and Garzia F Interference suppression in MIMO systems for throughput enhancement and error reduction Proceedings of the 2006 international conference on Wireless communications and mobile computing, (611-616)
  2781. Iwata K, Ikeda K and Sakai H (2006). A Statistical Property of Multiagent Learning Based on Markov Decision Process, IEEE Transactions on Neural Networks, 17:4, (829-842), Online publication date: 1-Jul-2006.
  2782. Kamimura R (2006). Cooperative Information Maximization with Gaussian Activation Functions for Self-Organizing Maps, IEEE Transactions on Neural Networks, 17:4, (909-918), Online publication date: 1-Jul-2006.
  2783. Huang K and Aviyente S (2006). Information-theoretic wavelet packet subband selection for texture classification, Signal Processing, 86:7, (1410-1420), Online publication date: 1-Jul-2006.
  2784. Maybank S (2006). Application of the Fisher-Rao Metric to Structure Detection, Journal of Mathematical Imaging and Vision, 25:1, (49-62), Online publication date: 1-Jul-2006.
  2785. ACM
    Kolahi S and Libkin L On redundancy vs dependency preservation in normalization Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (114-123)
  2786. ACM
    Song H, Qiu L and Zhang Y NetQuest Proceedings of the joint international conference on Measurement and modeling of computer systems, (121-132)
  2787. ACM
    Bonald T, Penttinen A and Virtamo J On light and heavy traffic approximations of balanced fairness Proceedings of the joint international conference on Measurement and modeling of computer systems, (109-120)
  2788. ACM
    Song H, Qiu L and Zhang Y (2006). NetQuest, ACM SIGMETRICS Performance Evaluation Review, 34:1, (121-132), Online publication date: 26-Jun-2006.
  2789. ACM
    Bonald T, Penttinen A and Virtamo J (2006). On light and heavy traffic approximations of balanced fairness, ACM SIGMETRICS Performance Evaluation Review, 34:1, (109-120), Online publication date: 26-Jun-2006.
  2790. Das S and Cook D Designing and Modeling Smart Environments (Invited Paper) Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (490-494)
  2791. Li T, Ni Q, Malone D, Leith D, Xiao Y and Turletti T A New MAC Scheme for Very High-Speed WLANs Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (171-180)
  2792. ACM
    Memisevic R Kernel information embeddings Proceedings of the 23rd international conference on Machine learning, (633-640)
  2793. ACM
    Banerjee A On Bayesian bounds Proceedings of the 23rd international conference on Machine learning, (81-88)
  2794. Kannan R and Wei S Approximation algorithms for power-aware scheduling of wireless sensor networks with rate and duty-cycle constraints Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems, (463-479)
  2795. ACM
    Jordan C, Watters C and Gao Q Using controlled query generation to evaluate blind relevance feedback algorithms Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries, (286-295)
  2796. Desharnais J, Laviolette F, Moturu K and Zhioua S Trace equivalence characterization through reinforcement learning Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (371-382)
  2797. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K On optimizing the security-throughput trade-off in wireless networks with adversaries Proceedings of the 4th international conference on Applied Cryptography and Network Security, (448-458)
  2798. Hafner V and Kaplan F Interpersonal maps Proceedings of the 2006 international conference on Towards affordance-based robot control, (1-15)
  2799. Pekar V Acquisition of verb entailment from text Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics, (49-56)
  2800. Dubnov S (2006). Spectral Anticipations, Computer Music Journal, 30:2, (63-83), Online publication date: 1-Jun-2006.
  2801. ACM
    Kelly T and Byde A (2006). Generating k-best solutions to auction winner determination problems, ACM SIGecom Exchanges, 6:1, (23-34), Online publication date: 1-Jun-2006.
  2802. Zhou S and Chellappa R (2006). From Sample Similarity to Ensemble Similarity, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:6, (917-929), Online publication date: 1-Jun-2006.
  2803. Harrison L, Duggins A and Friston K (2006). Encoding uncertainty in the hippocampus, Neural Networks, 19:5, (535-546), Online publication date: 1-Jun-2006.
  2804. Crépeau C, Savvides G, Schaffner C and Wullschleger J Information-Theoretic conditions for two-party secure function evaluation Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (538-554)
  2805. Wang Z and Cao Y Short-Term load forecasting based on mutual information and artificial neural network Proceedings of the Third international conference on Advnaces in Neural Networks - Volume Part II, (1246-1251)
  2806. Ding S and Shi Z Divergence-Based supervised information feature compression algorithm Proceedings of the Third international conference on Advances in Neural Networks - Volume Part I, (1421-1426)
  2807. Jin X, Xu A, Zhao G, Ma J and Bie R Event models for tumor classification with SAGE gene expression data Proceedings of the 6th international conference on Computational Science - Volume Part II, (775-782)
  2808. ACM
    Masri W and Podgurski A An empirical study of the strength of information flows in programs Proceedings of the 2006 international workshop on Dynamic systems analysis, (73-80)
  2809. ACM
    Fu A, Zhang W, Deng X and Wenyin L Safeguard against unicode attacks Proceedings of the 15th international conference on World Wide Web, (917-918)
  2810. Pekar V Discovery of Entailment Relations from Event Co-Occurrences Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (516-520)
  2811. ACM
    Gavinsky D, Kempe J, Regev O and de Wolf R Bounded-error quantum state identification and exponential separations in communication complexity Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (594-603)
  2812. ACM
    Nguyen M and Vadhan S Zero knowledge with efficient provers Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (287-295)
  2813. Jung J On the performance of cooperative diversity in infrastructure-based networks with two relays Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (1138-1143)
  2814. Yuen K, Li B and Liang B Distributed data gathering in multi-sink sensor networks with correlated sources Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (868-879)
  2815. Badonnel R, State R and Festor O Fault monitoring in ad-hoc networks based on information theory Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (427-438)
  2816. ACM
    Rabinovich Z and Rosenschein J On the response of EMT-based control to interacting targets and models Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (465-470)
  2817. Lin D and Tang X Conditional infomax learning Proceedings of the 9th European conference on Computer Vision - Volume Part I, (68-82)
  2818. Gupta M, Gray R and Olshen R (2006). Nonparametric Supervised Learning by Linear Interpolation with Maximum Entropy, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:5, (766-781), Online publication date: 1-May-2006.
  2819. Harit G and Chaudhury S (2006). Clustering in video data, Pattern Recognition, 39:5, (789-811), Online publication date: 1-May-2006.
  2820. Jaeger M, Nielsen J and Silander T (2006). Learning probabilistic decision graphs, International Journal of Approximate Reasoning, 42:1-2, (84-100), Online publication date: 1-May-2006.
  2821. Xu W, Carletta J and Moore J Syntactic chunking across different corpora Proceedings of the Third international conference on Machine Learning for Multimodal Interaction, (166-177)
  2822. ACM
    Vedantam S, Mitra U and Sabharwal A Sensing the channel Proceedings of the 5th international conference on Information processing in sensor networks, (260-267)
  2823. ACM
    Duarte M, Wakin M, Baron D and Baraniuk R Universal distributed sensing via random projections Proceedings of the 5th international conference on Information processing in sensor networks, (177-185)
  2824. ACM
    Rachlin Y, Negi R and Khosla P On the interdependence of sensing and estimation complexity in sensor networks Proceedings of the 5th international conference on Information processing in sensor networks, (160-167)
  2825. Meyer P and Bontempi G On the use of variable complementarity for feature selection in cancer classification Proceedings of the 2006 international conference on Applications of Evolutionary Computing, (91-102)
  2826. Zheng Y and Kwoh C Informative MicroRNA expression patterns for cancer classification Proceedings of the 2006 international conference on Data Mining for Biomedical Applications, (143-154)
  2827. Katsarakis N, Souretis G, Talantzis F, Pnevmatikakis A and Polymenakos L 3D audiovisual person tracking using Kalman filtering and information theory Proceedings of the 1st international evaluation conference on Classification of events, activities and relationships, (45-54)
  2828. Zhang C and Hu H Feature selection in SVM based on the hybrid of enhanced genetic algorithm and mutual information Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence, (307-316)
  2829. Abe T, Shi H, Asai T and Yoshino H (2006). Relay techniques for MIMO wireless networks with multiple source and destination pairs, EURASIP Journal on Wireless Communications and Networking, 2006:2, (37-37), Online publication date: 2-Apr-2006.
  2830. Huang S, Chen Z, Yu Y and Ma W (2006). Multitype Features Coselection for Web Document Clustering, IEEE Transactions on Knowledge and Data Engineering, 18:4, (448-459), Online publication date: 1-Apr-2006.
  2831. Ji S, Krishnapuram B and Carin L (2006). Variational Bayes for Continuous Hidden Markov Models and Its Application to Active Learning, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:4, (522-532), Online publication date: 1-Apr-2006.
  2832. Masucci B (2006). Sharing Multiple Secrets, Designs, Codes and Cryptography, 39:1, (89-111), Online publication date: 1-Apr-2006.
  2833. Martins N Finite gain l stabilization is impossible by bit-rate constrained feedback Proceedings of the 9th international conference on Hybrid Systems: computation and control, (451-459)
  2834. ACM
    Gu G, Fogla P, Dagon D, Lee W and Skorić B Measuring intrusion detection capability Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (90-101)
  2835. Cortes C, Mohri M, Rastogi A and Riley M Efficient computation of the relative entropy of probabilistic automata Proceedings of the 7th Latin American conference on Theoretical Informatics, (323-336)
  2836. ACM
    Heu J, Yang J, Kim C and Lee S R-D optimized compression of 3-D mesh sequences based on principal component analysis Proceedings of the 44th annual Southeast regional conference, (68-73)
  2837. Vrins F, Erdogmus D, Jutten C and Verleysen M Zero-Entropy minimization for blind extraction of bounded sources (BEBS) Proceedings of the 6th international conference on Independent Component Analysis and Blind Signal Separation, (747-754)
  2838. Liu F and Wu C Improvement on multivariate statistical process monitoring using multi-scale ICA Proceedings of the 6th international conference on Independent Component Analysis and Blind Signal Separation, (376-383)
  2839. Bita I, Barret M and Pham D Compression of multicomponent satellite images using independent components analysis Proceedings of the 6th international conference on Independent Component Analysis and Blind Signal Separation, (335-342)
  2840. Nagarajan S, Attias H, Sekihara K and Hild K Partitioned factor analysis for interference suppression and source extraction Proceedings of the 6th international conference on Independent Component Analysis and Blind Signal Separation, (189-197)
  2841. Pham D Blind partial separation of instantaneous mixtures of sources Proceedings of the 6th international conference on Independent Component Analysis and Blind Signal Separation, (868-875)
  2842. ACM
    Feng W and Greene J Post-placement interconnect entropy Proceedings of the 2006 international workshop on System-level interconnect prediction, (41-48)
  2843. Beimel A and Livne N On matroids and non-ideal secret sharing Proceedings of the Third conference on Theory of Cryptography, (482-501)
  2844. Awate S and Whitaker R (2006). Unsupervised, Information-Theoretic, Adaptive Image Filtering for Image Restoration, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:3, (364-376), Online publication date: 1-Mar-2006.
  2845. Banaszek K (2006). Information Gain versus State Disturbance for a Single Qubit, Open Systems & Information Dynamics, 13:1, (1-16), Online publication date: 1-Mar-2006.
  2846. Rubinstein R (2006). How Many Needles are in a Haystack, or How to Solve #P-Complete Counting Problems Fast, Methodology and Computing in Applied Probability, 8:1, (5-51), Online publication date: 1-Mar-2006.
  2847. Li T (2006). A Unified View on Clustering Binary Data, Machine Language, 62:3, (199-215), Online publication date: 1-Mar-2006.
  2848. Kramer G and Savari S (2006). Edge-Cut Bounds on Network Coding Rates, Journal of Network and Systems Management, 14:1, (49-67), Online publication date: 1-Mar-2006.
  2849. Gonçalves T, Silva C, Quaresma P and Vieira R Analysing part-of-speech for portuguese text classification Proceedings of the 7th international conference on Computational Linguistics and Intelligent Text Processing, (551-562)
  2850. Huang D and Chow T (2006). Enhancing Density-Based Data Reduction Using Entropy, Neural Computation, 18:2, (470-495), Online publication date: 1-Feb-2006.
  2851. Van Hulle M (2006). Differential Log Likelihood for Evaluating and Learning Gaussian Mixtures, Neural Computation, 18:2, (430-445), Online publication date: 1-Feb-2006.
  2852. Learned-Miller E (2006). Data Driven Image Models through Continuous Joint Alignment, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:2, (236-250), Online publication date: 1-Feb-2006.
  2853. Vázquez P, Feixas M, Sbert M and Llobet A (2006). Technical Section, Computers and Graphics, 30:1, (98-110), Online publication date: 1-Feb-2006.
  2854. Sadakane K and Grossi R Squeezing succinct data structures into entropy bounds Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1230-1239)
  2855. Guha S, McGregor A and Venkatasubramanian S Streaming and sublinear approximation of entropy and information distances Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (733-742)
  2856. Adler M, Demaine E, Harvey N and Pǎtraşcu M Lower bounds for asymmetric communication channels and distributed source coding Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (251-260)
  2857. Adler M, Harvey N, Jain K, Kleinberg R and Lehman A On the capacity of information networks Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (241-250)
  2858. Pérez-Freire L, Comesaña P, Troncoso-Pastoriza J and Pérez-González F Watermarking security Transactions on Data Hiding and Multimedia Security I, (41-72)
  2859. Ahlswede R and Cai N Search with noisy and delayed responses General Theory of Information Transfer and Combinatorics, (695-703)
  2860. Ahlswede R On concepts of performance parameters for channels General Theory of Information Transfer and Combinatorics, (639-663)
  2861. Harremoës P Lower bounds for divergence in the central limit theorem General Theory of Information Transfer and Combinatorics, (578-594)
  2862. Malyutov M Authorship attribution of texts General Theory of Information Transfer and Combinatorics, (362-380)
  2863. Laczay B Coding for the multiple-access adder channel General Theory of Information Transfer and Combinatorics, (165-195)
  2864. Harutyunyan A Notes on conditions for successive refinement of information General Theory of Information Transfer and Combinatorics, (154-164)
  2865. Ahlswede R and Cai N Watermarking identification codes with related topics on common randomness General Theory of Information Transfer and Combinatorics, (107-153)
  2866. Kleinewächter C On identification General Theory of Information Transfer and Combinatorics, (62-83)
  2867. Ahlswede R Introduction General Theory of Information Transfer and Combinatorics, (1-44)
  2868. Cimato S, Cresti A and D'Arco P (2006). A unified model for unconditionally secure key distribution, Journal of Computer Security, 14:1, (45-64), Online publication date: 1-Jan-2006.
  2869. Du H and Qi H (2006). A reconfigurable FPGA system for parallel independent component analysis, EURASIP Journal on Embedded Systems, 2006:1, (1-1), Online publication date: 1-Jan-2006.
  2870. Brady M and Cioffi J (2006). The worst-case interference in DSL systems employing dynamic spectrum management, EURASIP Journal on Advances in Signal Processing, 2006, (88-88), Online publication date: 1-Jan-2006.
  2871. Goud P, Hang R, Truhachev D and Schlegel C (2006). A portable MIMO testbed and selected channel measurements, EURASIP Journal on Advances in Signal Processing, 2006, (141-141), Online publication date: 1-Jan-2006.
  2872. Jiang X, Marti C, Irniger C and Bunke H (2006). Distance measures for image segmentation evaluation, EURASIP Journal on Advances in Signal Processing, 2006, (209-209), Online publication date: 1-Jan-2006.
  2873. Chhetri A, Morrell D and Papandreou-Suppappola A (2006). Nonmyopic sensor scheduling and its efficient implementation for target tracking applications, EURASIP Journal on Advances in Signal Processing, 2006, (9-9), Online publication date: 1-Jan-2006.
  2874. Fletcher A, Rangan S, Goyal V and Ramchandran K (2006). Denoising by sparse approximation, EURASIP Journal on Advances in Signal Processing, 2006, (98-98), Online publication date: 1-Jan-2006.
  2875. Hartmann M, Matz G and Schafhuber D (2006). Wireless multicarrier communications via multipulse gabor riesz bases, EURASIP Journal on Advances in Signal Processing, 2006, (96-96), Online publication date: 1-Jan-2006.
  2876. ACM
    Nayak A and Salzman J (2006). Limits on the ability of quantum states to convey classical messages, Journal of the ACM, 53:1, (184-206), Online publication date: 1-Jan-2006.
  2877. Dawy Z, Goebel B, Hagenauer J, Andreoli C, Meitinger T and Mueller J (2006). Gene Mapping and Marker Clustering Using Shannon's Mutual Information, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 3:1, (47), Online publication date: 1-Jan-2006.
  2878. Hershkovitz E, Sapiro G, Tannenbaum A and Williams L (2006). Statistical Analysis of RNA Backbone, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 3:1, (33), Online publication date: 1-Jan-2006.
  2879. Luo X, Dong M and Huang Y (2006). On Distributed Fault-Tolerant Detection in Wireless Sensor Networks, IEEE Transactions on Computers, 55:1, (58-70), Online publication date: 1-Jan-2006.
  2880. Iwata K, Ikeda K and Sakai H (2006). The asymptotic equipartition property in reinforcement learning and its relation to return maximization, Neural Networks, 19:1, (62-75), Online publication date: 1-Jan-2006.
  2881. Das S and Cook D Designing smart environments Proceedings of the First international conference on Pattern Recognition and Machine Intelligence, (80-90)
  2882. Sáez G On threshold self-healing key distribution schemes Proceedings of the 10th international conference on Cryptography and Coding, (340-354)
  2883. Gu X, Lutz J and Moser P Dimensions of copeland-erdös sequences Proceedings of the 25th international conference on Foundations of Software Technology and Theoretical Computer Science, (250-260)
  2884. Furuya T, Matsuzaki T and Matsuura K Detection of unknown dos attacks by kolmogorov-complexity fluctuation Proceedings of the First SKLOIS conference on Information Security and Cryptology, (395-406)
  2885. Hope L and Korb K An information-theoretic causal power theory Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (805-811)
  2886. Zhang C and Hu H Ant colony optimization combining with mutual information for feature selection in support vector machines Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (918-921)
  2887. Renner R and Wolf S Simple and tight bounds for information reconciliation and privacy amplification Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (199-216)
  2888. Gretton A, Herbrich R, Smola A, Bousquet O and Schölkopf B (2005). Kernel Methods for Measuring Independence, The Journal of Machine Learning Research, 6, (2075-2129), Online publication date: 1-Dec-2005.
  2889. Banerjee A, Merugu S, Dhillon I and Ghosh J (2005). Clustering with Bregman Divergences, The Journal of Machine Learning Research, 6, (1705-1749), Online publication date: 1-Dec-2005.
  2890. Chechik G, Globerson A, Tishby N and Weiss Y (2005). Information Bottleneck for Gaussian Variables, The Journal of Machine Learning Research, 6, (165-188), Online publication date: 1-Dec-2005.
  2891. Elidan G and Friedman N (2005). Learning Hidden Variable Networks: The Information Bottleneck Approach, The Journal of Machine Learning Research, 6, (81-127), Online publication date: 1-Dec-2005.
  2892. Pantel P, Philpot A and Hovy E (2005). Data Alignment and Integration, Computer, 38:12, (43-50), Online publication date: 1-Dec-2005.
  2893. Natschläger T and Maass W (2005). Dynamics of information and emergent computation in generic neural microcircuit models, Neural Networks, 18:10, (1301-1308), Online publication date: 1-Dec-2005.
  2894. Beitzel S, Jensen E, Frieder O, Lewis D, Chowdhury A and Kolcz A Improving Automatic Query Classification via Semi-Supervised Learning Proceedings of the Fifth IEEE International Conference on Data Mining, (42-49)
  2895. Pan F, Wang W, Tung A and Yang J Finding Representative Set from Massive Data Proceedings of the Fifth IEEE International Conference on Data Mining, (338-345)
  2896. Papadimitriou S, Gionis A, Tsaparas P, Vaisanen R, Mannila H and Faloutsos C Parameter-Free Spatial Data Mining Using MDL Proceedings of the Fifth IEEE International Conference on Data Mining, (346-353)
  2897. Martins D, Cesar R and Barrera J Automatic window design for gray-scale image processing based on entropy minimization Proceedings of the 10th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis and Applications, (813-824)
  2898. Liang K, Sun L and Zhong Y Adaptive distributed video coding for video applications in ad-hoc networks Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part I, (455-465)
  2899. Novatnack J, Denton T, Shokoufandeh A and Bretzner L Stable bounded canonical sets and image matching Proceedings of the 5th international conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, (316-331)
  2900. ACM
    Ng T, Chang S, Hsu J, Xie L and Tsui M Physics-motivated features for distinguishing photographic images and computer graphics Proceedings of the 13th annual ACM international conference on Multimedia, (239-248)
  2901. ACM
    Wang X, Ma W, Zhang L and Li X Iteratively clustering web images based on link and attribute reinforcements Proceedings of the 13th annual ACM international conference on Multimedia, (122-131)
  2902. Hua G and Wu Y (2005). Variational Maximum A Posteriori by Annealed Mean Field Analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:11, (1747-1761), Online publication date: 1-Nov-2005.
  2903. Todorovic S and Nechyba M (2005). Dynamic Trees for Unsupervised Segmentation and Matching of Image Regions, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:11, (1762-1777), Online publication date: 1-Nov-2005.
  2904. Palpanas T, Koudas N and Mendelzon A (2005). Using Datacube Aggregates for Approximate Querying and Deviation Detection, IEEE Transactions on Knowledge and Data Engineering, 17:11, (1465-1477), Online publication date: 1-Nov-2005.
  2905. Venkitasubramaniam P, Adireddy S and Tong L (2005). Sensitivity and Coding of Opportunistic ALOHA in Sensor Networks with Mobile Access, Journal of VLSI Signal Processing Systems, 41:3, (329-344), Online publication date: 1-Nov-2005.
  2906. Andronache A, Cattin P and Székely G Adaptive subdivision for hierarchical non-rigid registration of multi-modal images using mutual information Proceedings of the 8th international conference on Medical image computing and computer-assisted intervention - Volume Part II, (976-983)
  2907. Lorenzen P, Davis B and Joshi S Unbiased atlas formation via large deformations metric mapping Proceedings of the 8th international conference on Medical image computing and computer-assisted intervention - Volume Part II, (411-418)
  2908. Tomaževič D, Likar B and Pernuš F Reconstruction-based 3D/2D image registration Proceedings of the 8th international conference on Medical image computing and computer-assisted intervention - Volume Part II, (231-238)
  2909. Luan H, Qi F and Shen D Multi-modal image registration by quantitative-qualitative measure of mutual information (Q-MI) Proceedings of the First international conference on Computer Vision for Biomedical Image Applications, (378-387)
  2910. Gan R and Chung A Distance-Intensity for image registration Proceedings of the First international conference on Computer Vision for Biomedical Image Applications, (281-290)
  2911. Herhold P, Zimmermann E and Fettweis G (2005). Cooperative multi-hop transmission in wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:3, (299-324), Online publication date: 19-Oct-2005.
  2912. Sánchez-Nielsen E and Hernández-Tejera M Heuristic algorithms for fast and accurate tracking of moving objects in unrestricted environments Proceedings of the First international conference on Brain, Vision, and Artificial Intelligence, (507-516)
  2913. Papari G and Petkov N Algorithm that mimics human perceptual grouping of dot patterns Proceedings of the First international conference on Brain, Vision, and Artificial Intelligence, (497-506)
  2914. ACM
    Achir N Multi-object video error recovery over wireless networks Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, (32-37)
  2915. Aono M and Doi H A method for query expansion using a hierarchy of clusters Proceedings of the Second Asia conference on Asia Information Retrieval Technology, (479-484)
  2916. Yoon Y and Lee G Practical application of associative classifier for document classification Proceedings of the Second Asia conference on Asia Information Retrieval Technology, (467-478)
  2917. Liu W, Xue G, Huang S and Yu Y Interactive chinese search results clustering for personalization Proceedings of the 6th international conference on Advances in Web-Age Information Management, (676-681)
  2918. ACM
    Baljko M The information-theoretic analysis of unimodal interfaces and their multimodal counterparts Proceedings of the 7th international ACM SIGACCESS conference on Computers and accessibility, (28-35)
  2919. ACM
    Baljko M The contrastive evaluation of unimodal and multimodal interfaces for voice otput communication aids Proceedings of the 7th international conference on Multimodal interfaces, (301-308)
  2920. Melville P, Yang S, Saar-Tsechansky M and Mooney R Active learning for probability estimation using jensen-shannon divergence Proceedings of the 16th European conference on Machine Learning, (268-279)
  2921. Yeung R, Li S, Cai N and Zhang Z (2005). Network coding theory part II, Communications and Information Theory, 2:5, (330-381), Online publication date: 1-Oct-2005.
  2922. ACM
    Xu K, Zhang Z and Bhattacharyya S (2005). Profiling internet backbone traffic, ACM SIGCOMM Computer Communication Review, 35:4, (169-180), Online publication date: 1-Oct-2005.
  2923. ACM
    Jain S, Demmer M, Patra R and Fall K (2005). Using redundancy to cope with failures in a delay tolerant network, ACM SIGCOMM Computer Communication Review, 35:4, (109-120), Online publication date: 1-Oct-2005.
  2924. Cuturi M and Vert J (2005). 2005 Special Issue, Neural Networks, 18:8, (1111-1123), Online publication date: 1-Oct-2005.
  2925. Wilkie K and Vrscay E Mutual information-based methods to improve local region-of-interest image registration Proceedings of the Second international conference on Image Analysis and Recognition, (63-72)
  2926. Aribisala B and Claridge E A border irregularity measure using a modified conditional entropy method as a malignant melanoma predictor Proceedings of the Second international conference on Image Analysis and Recognition, (914-921)
  2927. Hoi S, Zhu J and Lyu M CUHK at ImageCLEF 2005 Proceedings of the 6th international conference on Cross-Language Evalution Forum: accessing Multilingual Information Repositories, (602-611)
  2928. Sánchez-Nielsen E and Hernández-Tejera M Heuristic algorithm for computing fast template motion in video streams Proceedings of the 7th international conference on Advanced Concepts for Intelligent Vision Systems, (547-554)
  2929. Shen J Γ-Convergence approximation to piecewise constant mumford-shah segmentation Proceedings of the 7th international conference on Advanced Concepts for Intelligent Vision Systems, (499-506)
  2930. Voloshynovskiy S, Koval O, Topak E, Vila-Forcén J, Alfaro P and Pun T On reversibility of random binning techniques Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (108-118)
  2931. Tautenhahn R, Ihlow A and Seiffert U Adaptive feature selection for classification of microscope images Proceedings of the 6th international conference on Fuzzy Logic and Applications, (215-222)
  2932. Hogan M, Balado F, Hurley N and Silvestre G On the achievable rate of side informed embedding techniques with steganographic constraints Proceedings of the 4th international conference on Digital Watermarking, (387-402)
  2933. Korzhik V, Morales-Luna G and Lee M On the existence of perfect stegosystems Proceedings of the 4th international conference on Digital Watermarking, (30-38)
  2934. Moulin P and Wang Y Improved QIM strategies for gaussian watermarking Proceedings of the 4th international conference on Digital Watermarking, (372-386)
  2935. Sun W and Yang E Closed-form formulas for private watermarking capacities of laplacian sources with the magnitude-error distortion measure and under additive attacks Proceedings of the 4th international conference on Digital Watermarking, (361-371)
  2936. Venturini I Oracle attacks and covert channels Proceedings of the 4th international conference on Digital Watermarking, (171-185)
  2937. Mathews G, Durrant-Whyte H and Prokopenko M Measuring global behaviour of multi-agent systems from pair-wise mutual information Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV, (587-594)
  2938. Montemurro M and Panzeri S Optimal information transmission through cortico-cortical synapses Proceedings of the 15th international conference on Artificial Neural Networks: biological Inspirations - Volume Part I, (39-44)
  2939. Klyubin A, Polani D and Nehaniv C All else being equal be empowered Proceedings of the 8th European conference on Advances in Artificial Life, (744-753)
  2940. Polani D, Dauscher P and Uthmann T On a quantitative measure for modularity based on information theory Proceedings of the 8th European conference on Advances in Artificial Life, (393-402)
  2941. Hintoğlu A and Saygın Y Suppressing microdata to prevent probabilistic classification based inference Proceedings of the Second VDLB international conference on Secure Data Management, (155-169)
  2942. Nielsen M and Petz D (2005). A simple proof of the strong subadditivity inequality, Quantum Information & Computation, 5:6, (507-513), Online publication date: 1-Sep-2005.
  2943. Nemenman I (2005). Fluctuation-Dissipation Theorem and Models of Learning, Neural Computation, 17:9, (2006-2033), Online publication date: 1-Sep-2005.
  2944. Pola G, Petersen R, Thiele A, Young M and Panzeri S (2005). Data-Robust Tight Lower Bounds to the Information Carried by Spike Times of a Neuronal Population, Neural Computation, 17:9, (1962-2005), Online publication date: 1-Sep-2005.
  2945. Balakrishnan N, Hariharakrishnan K and Schonfeld D (2005). A New Image Representation Algorithm Inspired by Image Submodality Models, Redundancy Reduction, and Learning in Biological Vision, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:9, (1367-1378), Online publication date: 1-Sep-2005.
  2946. Rico-Juan J, Calera-Rubio J and Carrasco R (2005). Smoothing and compression with stochastic k-testable tree languages, Pattern Recognition, 38:9, (1420-1430), Online publication date: 1-Sep-2005.
  2947. Dupont P, Denis F and Esposito Y (2005). Links between probabilistic automata and hidden Markov models, Pattern Recognition, 38:9, (1349-1371), Online publication date: 1-Sep-2005.
  2948. Khayam S and Radha H (2005). Linear-complexity models for wireless MAC-to-MAC channels, Wireless Networks, 11:5, (543-555), Online publication date: 1-Sep-2005.
  2949. Carvalho D and Freitas A (2005). Evaluating Six Candidate Solutions for the Small-Disjunct Problem and Choosing the Best Solution via Meta-Learning, Artificial Intelligence Review, 24:1, (61-98), Online publication date: 1-Sep-2005.
  2950. Beder C Agglomerative grouping of observations by bounding entropy variation Proceedings of the 27th DAGM conference on Pattern Recognition, (101-108)
  2951. Burdick D, Deshpande P, Jayram T, Ramakrishnan R and Vaithyanathan S OLAP over uncertain and imprecise data Proceedings of the 31st international conference on Very large data bases, (970-981)
  2952. ACM
    Wang W, Srinivasan V and Chua K Using mobile relays to prolong the lifetime of wireless sensor networks Proceedings of the 11th annual international conference on Mobile computing and networking, (270-283)
  2953. Zhang C and Hu H An effective feature selection scheme via genetic algorithm using mutual information Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (73-80)
  2954. ACM
    Xu K, Zhang Z and Bhattacharyya S Profiling internet backbone traffic Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (169-180)
  2955. ACM
    Jain S, Demmer M, Patra R and Fall K Using redundancy to cope with failures in a delay tolerant network Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (109-120)
  2956. Debenham J Foundations for automated trading — its the information that matters Proceedings of the 16th international conference on Database and Expert Systems Applications, (534-543)
  2957. Weng J, Miao C and Goh A Protecting online rating systems from unfair ratings Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business, (50-59)
  2958. ACM
    Cole R, Shasha D and Zhao X Fast window correlations over uncooperative time series Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (743-749)
  2959. ACM
    Tao T and Zhai C Mining comparable bilingual text corpora for cross-language information integration Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (691-696)
  2960. ACM
    Spertus E, Sahami M and Buyukkokten O Evaluating similarity measures Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (678-684)
  2961. ACM
    Mane S, Srivastava J and Hwang S Estimating missed actual positives using independent classifiers Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (648-653)
  2962. ACM
    Zhang N, Wang S and Zhao W A new scheme on privacy-preserving data classification Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (374-383)
  2963. ACM
    Merugu S and Ghosh J A distributed learning framework for heterogeneous data sources Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (208-217)
  2964. ACM
    Mei Q and Zhai C Discovering evolutionary theme patterns from text Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (198-207)
  2965. ACM
    Lange T and Buhmann J Combining partitions by probabilistic label aggregation Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (147-156)
  2966. ACM
    Kolcz A Local sparsity control for naive Bayes with extreme misclassification costs Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (128-137)
  2967. Poon C and Yiu W Opportunistic Data Structures for Range Queries Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (560-569)
  2968. ACM
    Aslam J, Yilmaz E and Pavlu V The maximum entropy method for analyzing retrieval measures Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval, (27-34)
  2969. Reznik Y Analysis of a class of tries with adaptive multi-digit branching Proceedings of the 9th international conference on Algorithms and Data Structures, (61-72)
  2970. Lu Y, Meier W and Vaudenay S The conditional correlation attack Proceedings of the 25th annual international conference on Advances in Cryptology, (97-117)
  2971. Holenstein T and Renner R One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption Proceedings of the 25th annual international conference on Advances in Cryptology, (478-493)
  2972. Yun Z and Keong K Identifying Simple Discriminatory Gene Vectors with an Information Theory Approach Proceedings of the 2005 IEEE Computational Systems Bioinformatics Conference, (13-24)
  2973. ACM
    Tsuda K Propagating distributions on a hypergraph by dual information regularization Proceedings of the 22nd international conference on Machine learning, (920-927)
  2974. ACM
    Rosell B, Hellerstein L, Ray S and Page D Why skewing works Proceedings of the 22nd international conference on Machine learning, (728-735)
  2975. ACM
    Pernkopf F and Bilmes J Discriminative versus generative parameter and structure learning of Bayesian network classifiers Proceedings of the 22nd international conference on Machine learning, (657-664)
  2976. ACM
    Meilǎ M Comparing clusterings Proceedings of the 22nd international conference on Machine learning, (577-584)
  2977. ACM
    Liao X, Xue Y and Carin L Logistic regression with an auxiliary data source Proceedings of the 22nd international conference on Machine learning, (505-512)
  2978. ACM
    Laviolette F and Marchand M PAC-Bayes risk bounds for sample-compressed Gibbs classifiers Proceedings of the 22nd international conference on Machine learning, (481-488)
  2979. ACM
    Guestrin C, Krause A and Singh A Near-optimal sensor placements in Gaussian processes Proceedings of the 22nd international conference on Machine learning, (265-272)
  2980. Gray R (2005). Toeplitz and circulant matrices, Communications and Information Theory, 2:3, (155-239), Online publication date: 1-Aug-2005.
  2981. Kobayashi M and Caire G (2005). A low-complexity approach to space-time coding for multipath fading channels, EURASIP Journal on Wireless Communications and Networking, 2005:3, (437-446), Online publication date: 1-Aug-2005.
  2982. ACM
    Harmsen J and Pearlman W Capacity of steganographic channels Proceedings of the 7th workshop on Multimedia and security, (11-24)
  2983. Liu J, Lee J, Li L, Luo Z and Wong K (2005). Online Clustering Algorithms for Radar Emitter Classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:8, (1185-1196), Online publication date: 1-Aug-2005.
  2984. Peng H, Long F and Ding C (2005). Feature Selection Based on Mutual Information, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:8, (1226-1238), Online publication date: 1-Aug-2005.
  2985. Kim H, Kim J and Ra Y (2005). Letter, Neurocomputing, 67, (403-410), Online publication date: 1-Aug-2005.
  2986. Kung W, Kim C and Kuo C (2005). Packet video transmission over wireless channels with adaptive channel rate allocation, Journal of Visual Communication and Image Representation, 16:4-5, (475-498), Online publication date: 1-Aug-2005.
  2987. Sánchez-Nielsen E and Hernández-Tejera M An heuristic search based approach for moving objects tracking Proceedings of the 19th international joint conference on Artificial intelligence, (1736-1737)
  2988. ACM
    Rauenbusch T, Shieber S and Grosz B Computing the communication costs of item allocation Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (1205-1206)
  2989. ACM
    van Otterloo S The value of privacy Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (1015-1022)
  2990. ACM
    Rabinovich Z and Rosenschein J Multiagent coordination by Extended Markov Tracking Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (431-438)
  2991. Spellman E and Vemuri B Efficient shape indexing using an information theoretic representation Proceedings of the 4th international conference on Image and Video Retrieval, (145-153)
  2992. Zhang J and Rangarajan A Multimodality image registration using an extensible information metric and high dimensional histogramming Proceedings of the 19th international conference on Information Processing in Medical Imaging, (725-737)
  2993. Learned-Miller E and Jain V Many heads are better than one Proceedings of the 19th international conference on Information Processing in Medical Imaging, (615-626)
  2994. Li H, Zhang K and Jiang T The regularized EM algorithm Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (807-812)
  2995. Bagnell J Robust supervised learning Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (714-719)
  2996. Johns J and Mahadevan S A variational learning algorithm for the abstract hidden Markov model Proceedings of the 20th national conference on Artificial intelligence - Volume 1, (9-14)
  2997. Makrehchi M and Kamel M Text classification using small number of features Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (580-589)
  2998. Harrow A and Leung D (2005). Bidirectional coherent classical communication, Quantum Information & Computation, 5:4, (380-395), Online publication date: 1-Jul-2005.
  2999. Jan Latecki L, Miezianko R and Pokrajac D (2005). Reliability of motion features in surveillance videos, Integrated Computer-Aided Engineering, 12:3, (279-290), Online publication date: 1-Jul-2005.
  3000. Chiang M (2005). Geometric programming for communication systems, Communications and Information Theory, 2:1/2, (1-154), Online publication date: 1-Jul-2005.
  3001. Mossel E and O'Donnell R (2005). Coin flipping from a cosmic source: On error correction of truly random bits, Random Structures & Algorithms, 26:4, (418-436), Online publication date: 1-Jul-2005.
  3002. ACM
    Ferragina P, Giancarlo R, Manzini G and Sciortino M (2005). Boosting textual compression in optimal linear time, Journal of the ACM, 52:4, (688-713), Online publication date: 1-Jul-2005.
  3003. Vidal E, Thollard F, de la Higuera C, Casacuberta F and Carrasco R (2005). Probabilistic Finite-State Machines-Part I, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:7, (1013-1025), Online publication date: 1-Jul-2005.
  3004. Verdu-Mas J, Carrasco R and Calera-Rubio J (2005). Parsing with Probabilistic Strictly Locally Testable Tree Languages, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:7, (1040-1050), Online publication date: 1-Jul-2005.
  3005. Kundaje A, Middendorf M, Gao F, Wiggins C and Leslie C (2005). Combining Sequence and Time Series Expression Data to Learn Transcriptional Modules, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2:3, (194-202), Online publication date: 1-Jul-2005.
  3006. Jeong S, Kim S and Lee H (2005). Data traffic scheduling algorithm for multiuser OFDM system with adaptive modulation considering fairness among users, Computers and Operations Research, 32:7, (1723-1737), Online publication date: 1-Jul-2005.
  3007. Barwick S, Jackson W and Martin K (2005). A General Approach to Robust Web Metering, Designs, Codes and Cryptography, 36:1, (5-27), Online publication date: 1-Jul-2005.
  3008. Carpenter B Scaling high-order character language models to gigabytes Proceedings of the Workshop on Software, (86-99)
  3009. Luo H and Pottie G Routing explicit side information for data compression in wireless sensor networks Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems, (75-88)
  3010. Ivanovic E Dialogue act tagging for instant messaging chat sessions Proceedings of the ACL Student Research Workshop, (79-84)
  3011. Grünwald P and de Rooij S Asymptotic log-loss of prequential maximum likelihood codes Proceedings of the 18th annual conference on Learning Theory, (652-667)
  3012. Crammer K and Singer Y Loss bounds for online category ranking Proceedings of the 18th annual conference on Learning Theory, (48-62)
  3013. ACM
    Mühlenbein H and Höns R Approximate factorizations of distributions and the minimum relative entropy principle Proceedings of the 7th annual workshop on Genetic and evolutionary computation, (199-211)
  3014. ACM
    Azimi R, Stumm M and Wisniewski R Online performance analysis by statistical sampling of microprocessor performance counters Proceedings of the 19th annual international conference on Supercomputing, (101-110)
  3015. Haven K, Majda A and Abramov R (2005). Quantifying predictability through information theory, Journal of Computational Physics, 206:1, (334-362), Online publication date: 10-Jun-2005.
  3016. ACM
    Gonçalves T and Quaresma P Is linguistic information relevant for the classification of legal texts? Proceedings of the 10th international conference on Artificial intelligence and law, (168-176)
  3017. Bounkong S, Toch B and Saad D Optimal embedding for watermarking in discrete data spaces Proceedings of the 7th international conference on Information Hiding, (77-90)
  3018. Swaminathan A, Mao Y, Wu M and Kailas K Data hiding in compiled program binaries for enhancing computer system performance Proceedings of the 7th international conference on Information Hiding, (357-371)
  3019. Comesaña P, Pérez-Freire L and Pérez-González F Fundamentals of data hiding security and their application to spread-spectrum analysis Proceedings of the 7th international conference on Information Hiding, (146-160)
  3020. Pérez-Freire L, Comesaña P and Pérez-González F Information-theoretic analysis of security in side-informed data hiding Proceedings of the 7th international conference on Information Hiding, (131-145)
  3021. Fred A and Jain A (2005). Combining Multiple Clusterings Using Evidence Accumulation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:6, (835-850), Online publication date: 1-Jun-2005.
  3022. Zorkadis V, Karras D and Panayotou M (2005). 2005 Special Issue, Neural Networks, 18:5-6, (799-807), Online publication date: 1-Jun-2005.
  3023. Patel A and Kosko B (2005). 2005 Special Issue, Neural Networks, 18:5-6, (467-478), Online publication date: 1-Jun-2005.
  3024. Xu P and Abshire P (2005). 2005 Special issue, Neural Networks, 18:5-6, (479-487), Online publication date: 1-Jun-2005.
  3025. Fortnow L and Lutz J (2005). Prediction and dimension, Journal of Computer and System Sciences, 70:4, (570-589), Online publication date: 1-Jun-2005.
  3026. Yang K (2005). New lower bounds for statistical query learning, Journal of Computer and System Sciences, 70:4, (485-509), Online publication date: 1-Jun-2005.
  3027. Salem F, Waheed K and Erten G (2005). Blind Source Recovery in a State-Space Famework, Neural Processing Letters, 21:3, (153-173), Online publication date: 1-Jun-2005.
  3028. ACM
    Bhatia R and Li L Characterizing achievable multicast rates in multi-hop wireless networks Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (133-144)
  3029. Liu C Some theoretical properties of mutual information for student assessments in intelligent tutoring systems Proceedings of the 15th international conference on Foundations of Intelligent Systems, (524-534)
  3030. ACM
    Holenstein T Key agreement from weak bit agreement Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (664-673)
  3031. Sbert M, Plemenos D, Feixas M and González F Viewpoint quality Proceedings of the First Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (185-192)
  3032. Rigau J, Feixas M and Sbert M An information-theoretic framework for image complexity Proceedings of the First Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (177-184)
  3033. Middendorf M, Kundaje A, Shah M, Freund Y, Wiggins C and Leslie C Motif discovery through predictive modeling of gene regulation Proceedings of the 9th Annual international conference on Research in Computational Molecular Biology, (538-552)
  3034. Burstein D, Ulitsky I, Tuller T and Chor B Information theoretic approaches to whole genome phylogenies Proceedings of the 9th Annual international conference on Research in Computational Molecular Biology, (283-295)
  3035. ACM
    Maguitman A, Menczer F, Roinestad H and Vespignani A Algorithmic detection of semantic similarity Proceedings of the 14th international conference on World Wide Web, (107-116)
  3036. Butz T and Thiran J (2005). From error probability to information theoretic (multi-modal) signal processing, Signal Processing, 85:5, (875-902), Online publication date: 1-May-2005.
  3037. Vrins F and Verleysen M (2005). On the entropy minimization of a linear mixture of variables for source separation, Signal Processing, 85:5, (1029-1044), Online publication date: 1-May-2005.
  3038. Shwartz S, Zibulevsky M and Schechner Y (2005). Fast kernel entropy estimation and optimization, Signal Processing, 85:5, (1045-1058), Online publication date: 1-May-2005.
  3039. Babaie-Zadeh M and Jutten C (2005). A general approach for mutual information minimization and its application to blind source separation, Signal Processing, 85:5, (975-995), Online publication date: 1-May-2005.
  3040. Van Hulle M (2005). Mixture density modeling, Kullback-Leibler divergence, and differential log-likelihood, Signal Processing, 85:5, (951-963), Online publication date: 1-May-2005.
  3041. Erdogmus D, Agrawal R and Principe J (2005). A mutual information extension to the matched filter, Signal Processing, 85:5, (927-935), Online publication date: 1-May-2005.
  3042. Unal G, Yezzi A and Krim H (2005). Information-Theoretic Active Polygons for Unsupervised Texture Segmentation, International Journal of Computer Vision, 62:3, (199-220), Online publication date: 1-May-2005.
  3043. Niemi A, Joutsensalo J and Hämäläinen T Generic model for revenue maximization Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science, (1-6)
  3044. Bajwa W, Sayeed A and Nowak R Matched source-channel communication for field estimation in wireless sensor networks Proceedings of the 4th international symposium on Information processing in sensor networks, (44-es)
  3045. Cristescu R and Beferull-Lozano B Lossy network correlated data gathering with high-resolution coding Proceedings of the 4th international symposium on Information processing in sensor networks, (29-es)
  3046. Cristescu R and Vetterli M On the optimal density for real-time data gathering of spatio-temporal processes in sensor networks Proceedings of the 4th international symposium on Information processing in sensor networks, (21-es)
  3047. Solé-Casals J and Monte-Moreno E Blind channel deconvolution of real world signals using source separation techniques Proceedings of the 3rd international conference on Non-Linear Analyses and Algorithms for Speech Processing, (357-367)
  3048. Gupta G, Toumpis S, Sayir J and Muller R On the Transport Capacity of Gaussian Multiple Access and Broadcast Channels Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (10-20)
  3049. Khalili R and Salamatian K A New Relaying Scheme for Cheap Wireless Relay Nodes Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (197-206)
  3050. Sgarro A (2005). Utilities and distortions, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 13:2, (139-161), Online publication date: 1-Apr-2005.
  3051. V'Yugin V and Maslov V (2005). Concentration Theorems for Entropy and Free Energy, Problems of Information Transmission, 41:2, (134-149), Online publication date: 1-Apr-2005.
  3052. Liu G, Zhu W and Yu Y A unified probabilistic framework for clustering correlated heterogeneous web objects Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development, (76-87)
  3053. De Santis A, Ferrara A and Masucci B A new key assignment scheme for access control in a complete tree hierarchy Proceedings of the 2005 international conference on Coding and Cryptography, (202-217)
  3054. ACM
    Nakayama T Alternative source coding model for mobile text communication Proceedings of the 2005 ACM symposium on Applied computing, (1139-1145)
  3055. ACM
    Arenas M and Libkin L (2005). An information-theoretic approach to normal forms for relational and XML data, Journal of the ACM, 52:2, (246-283), Online publication date: 1-Mar-2005.
  3056. Rubinstein R (2005). A Stochastic Minimum Cross-Entropy Method for Combinatorial Optimization and Rare-event Estimation*, Methodology and Computing in Applied Probability, 7:1, (5-50), Online publication date: 1-Mar-2005.
  3057. Tuyls P, Škorić B, Stallinga S, Akkermans A and Ophey W Information-theoretic security analysis of physical uncloneable functions Proceedings of the 9th international conference on Financial Cryptography and Data Security, (141-155)
  3058. Dvořák Z, Jelínek V, Král' D, Kynčl J and Saks M Three optimal algorithms for balls of three colors Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (206-217)
  3059. Agakov F and Barber D Auxiliary variational information maximization for dimensionality reduction Proceedings of the 2005 international conference on Subspace, Latent Structure and Feature Selection, (103-114)
  3060. Schneider K Techniques for improving the performance of naive bayes for text classification Proceedings of the 6th international conference on Computational Linguistics and Intelligent Text Processing, (682-693)
  3061. Dodis Y and Smith A Entropic security and the encryption of high entropy messages Proceedings of the Second international conference on Theory of Cryptography, (556-577)
  3062. Ben-Or M, Horodecki M, Leung D, Mayers D and Oppenheim J The universal composable security of quantum key distribution Proceedings of the Second international conference on Theory of Cryptography, (386-406)
  3063. Backes M and Cachin C Public-key steganography with active attacks Proceedings of the Second international conference on Theory of Cryptography, (210-226)
  3064. Zhang K and Chan L (2005). Extended Gaussianization Method for Blind Separation of Post-Nonlinear Mixtures, Neural Computation, 17:2, (425-452), Online publication date: 1-Feb-2005.
  3065. Andritsos P and Tzerpos V (2005). Information-Theoretic Software Clustering, IEEE Transactions on Software Engineering, 31:2, (150-165), Online publication date: 1-Feb-2005.
  3066. Trappe W, Wang Y and Liu K (2005). Resource-aware conference key establishment for heterogeneous networks, IEEE/ACM Transactions on Networking, 13:1, (134-146), Online publication date: 1-Feb-2005.
  3067. Demirciler K and Ortega A (2005). Reduced-complexity deterministic annealing for vector quantizer design, EURASIP Journal on Advances in Signal Processing, 2005, (1807-1820), Online publication date: 1-Jan-2005.
  3068. Veselinovic N, Matsumoto T and Juntti M (2005). Iterative PDF estimation-based multiuser diversity detection and channel estimation with unknown interference, EURASIP Journal on Advances in Signal Processing, 2005, (872-882), Online publication date: 1-Jan-2005.
  3069. Regalia P (2005). Iterative decoding of concatenated codes, EURASIP Journal on Advances in Signal Processing, 2005, (762-774), Online publication date: 1-Jan-2005.
  3070. Daschiel H and Datcu M (2005). Image information mining system evaluation using information-theoretic measures, EURASIP Journal on Advances in Signal Processing, 2005, (2153-2163), Online publication date: 1-Jan-2005.
  3071. Zhang J, Raghothaman B, Wang Y and Mandyam G (2005). Receivers and CQI measures for MIMO-CDMA systems in frequency-selective channels, EURASIP Journal on Advances in Signal Processing, 2005, (1668-1679), Online publication date: 1-Jan-2005.
  3072. Garba A, Yim R, Bajcsy J and Chen L (2005). Analysis of optical CDMA signal transmission, EURASIP Journal on Advances in Signal Processing, 2005, (1603-1616), Online publication date: 1-Jan-2005.
  3073. ACM
    Fonseca R, Almeida V and Crovella M (2005). Locality in a web of streams, Communications of the ACM, 48:1, (82-88), Online publication date: 1-Jan-2005.
  3074. Verbeek J, Vlassis N and Kröse B (2005). Self-organizing mixture models, Neurocomputing, 63, (99-123), Online publication date: 1-Jan-2005.
  3075. Huang D and Chow T (2005). Effective feature selection scheme using mutual information, Neurocomputing, 63, (325-343), Online publication date: 1-Jan-2005.
  3076. Vora P Information theory and the security of binary data perturbation Proceedings of the 5th international conference on Cryptology in India, (136-147)
  3077. Popescu O and Rose C (2004). Greedy SINR maximization in collaborative multibase wireless systems, EURASIP Journal on Wireless Communications and Networking, 2004:2, (201-209), Online publication date: 15-Dec-2004.
  3078. Daugman J Recognising persons by their iris patterns Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication, (5-25)
  3079. Shor P (2004). The classical capacity achievable by a quantum channel assisted by a limited entanglement, Quantum Information & Computation, 4:6, (537-545), Online publication date: 1-Dec-2004.
  3080. Fleuret F (2004). Fast Binary Feature Selection with Conditional Mutual Information, The Journal of Machine Learning Research, 5, (1531-1555), Online publication date: 1-Dec-2004.
  3081. Zhang N (2004). Hierarchical Latent Class Models for Cluster Analysis, The Journal of Machine Learning Research, 5, (697-723), Online publication date: 1-Dec-2004.
  3082. Langford J and McAllester D (2004). Computable Shell Decomposition Bounds, The Journal of Machine Learning Research, 5, (529-547), Online publication date: 1-Dec-2004.
  3083. Clark A and Thollard F (2004). PAC-learnability of Probabilistic Deterministic Finite State Automata, The Journal of Machine Learning Research, 5, (473-497), Online publication date: 1-Dec-2004.
  3084. Luxburg U, Bousquet O and Schölkopf B (2004). A Compression Approach to Support Vector Model Selection, The Journal of Machine Learning Research, 5, (293-323), Online publication date: 1-Dec-2004.
  3085. Csiszár I and Shields P (2004). Information theory and statistics, Communications and Information Theory, 1:4, (417-528), Online publication date: 1-Dec-2004.
  3086. Maybank S (2004). Detection of Image Structures Using the Fisher Information and the Rao Metric, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:12, (1579-1589), Online publication date: 1-Dec-2004.
  3087. Li Z, Lu H and Tan Y Video scene segmentation using sequential change detection Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III, (575-582)
  3088. ACM
    Lavelli A, Sebastiani F and Zanoli R Distributional term representations Proceedings of the thirteenth ACM international conference on Information and knowledge management, (615-624)
  3089. ACM
    Wang G and Lochovsky F Feature selection with conditional mutual information maximin in text categorization Proceedings of the thirteenth ACM international conference on Information and knowledge management, (342-349)
  3090. ACM
    Zhang N, Zhao W and Chen J Cardinality-based inference control in OLAP systems Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, (59-64)
  3091. ACM
    Kremenek T, Ashcraft K, Yang J and Engler D (2004). Correlation exploitation in error ranking, ACM SIGSOFT Software Engineering Notes, 29:6, (83-93), Online publication date: 1-Nov-2004.
  3092. Almansa A, Durand S and Rougé B (2004). Measuring and Improving Image Resolution by Adaptation of the Reciprocal Cell, Journal of Mathematical Imaging and Vision, 21:3, (235-279), Online publication date: 1-Nov-2004.
  3093. Blundo C, Martín S, Masucci B and Padró C (2004). A Linear Algebraic Approach to Metering Schemes, Designs, Codes and Cryptography, 33:3, (241-260), Online publication date: 1-Nov-2004.
  3094. ACM
    Kremenek T, Ashcraft K, Yang J and Engler D Correlation exploitation in error ranking Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (83-93)
  3095. Majumdar A and Ramchandran K PRISM Proceedings of the First International Conference on Broadband Networks, (478-485)
  3096. Rajan D, Sabharwal A and Aazhang B Power Efficient Broadcast Scheduling with Delay Deadlines Proceedings of the First International Conference on Broadband Networks, (439-448)
  3097. ACM
    Corndorf E, Liang C, Kanter G, Kumar P and Yuen H (2004). Quantum-noise, ACM SIGCOMM Computer Communication Review, 34:5, (21-30), Online publication date: 15-Oct-2004.
  3098. Biglieri E and Taricco G (2004). Transmission and reception with multiple antennas, Communications and Information Theory, 1:2, (183-332), Online publication date: 1-Oct-2004.
  3099. Mitchell T, Hutchinson R, Niculescu R, Pereira F, Wang X, Just M and Newman S (2004). Learning to Decode Cognitive States from Brain Images, Machine Language, 57:1-2, (145-175), Online publication date: 1-Oct-2004.
  3100. Lippman A and Reed D (2004). Viral Radio, BT Technology Journal, 22:4, (13-24), Online publication date: 1-Oct-2004.
  3101. Laaksonen J, Koskela J and Oja E (2004). Class distribution on SOM surfaces for feature extraction and object retrieval, Neural Networks, 17:8-9, (1121-1133), Online publication date: 1-Oct-2004.
  3102. Seo S and Obermayer K (2004). Self-organizing maps and clustering methods for matrix data, Neural Networks, 17:8-9, (1211-1229), Online publication date: 1-Oct-2004.
  3103. Cai N, Winter A and Yeung R (2004). Quantum privacy and quantum wiretap channels, Problems of Information Transmission, 40:4, (318-336), Online publication date: 1-Oct-2004.
  3104. Maggini M, Rigutini L and Turchi M Pseudo-Supervised Clustering for Text Documents Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (363-369)
  3105. ACM
    Venturini I Counteracting Oracle attacks Proceedings of the 2004 workshop on Multimedia and security, (187-192)
  3106. ACM
    Yi T and Wu F (2004). Empirical analysis of entropy distance metric for UML class diagrams, ACM SIGSOFT Software Engineering Notes, 29:5, (1-6), Online publication date: 1-Sep-2004.
  3107. ACM
    Vincent M, Liu J and Liu C (2004). Strong functional dependencies and their application to normal forms in XML, ACM Transactions on Database Systems, 29:3, (445-462), Online publication date: 1-Sep-2004.
  3108. Hore B, Mehrotra S and Tsudik G A privacy-preserving index for range queries Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (720-731)
  3109. Weeds J, Weir D and McCarthy D Characterising measures of lexical distributional similarity Proceedings of the 20th international conference on Computational Linguistics, (1015-es)
  3110. ACM
    Banerjee A and Langford J An objective evaluation criterion for clustering Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (515-520)
  3111. ACM
    Banerjee A, Dhillon I, Ghosh J, Merugu S and Modha D A generalized maximum entropy approach to bregman co-clustering and matrix approximation Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (509-514)
  3112. ACM
    Ramakrishnan N, Kumar D, Mishra B, Potts M and Helm R Turning CARTwheels Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (266-275)
  3113. ACM
    Basu S, Bilenko M and Mooney R A probabilistic framework for semi-supervised clustering Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (59-68)
  3114. Nan F and Adjeroh D On Complexity Measures for Biological Sequences Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (522-526)
  3115. Li H, Zhang K and Jiang T Minimum Entropy Clustering and Applications to Gene Expression Analysis Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (142-151)
  3116. Hu M and Zhang J (2004). Opportunistic multi-access, Mobile Networks and Applications, 9:4, (435-444), Online publication date: 1-Aug-2004.
  3117. Sun Y, Trappe W and Liu K (2004). A scalable multicast key management scheme for heterogeneous wireless networks, IEEE/ACM Transactions on Networking, 12:4, (653-666), Online publication date: 1-Aug-2004.
  3118. Ferraro M and Boccignone G (2004). Image contrast enhancement via entropy production, Real-Time Imaging, 10:4, (229-238), Online publication date: 1-Aug-2004.
  3119. Aldini A and Di Pierro A (2004). A Quantitative Approach to Noninterference for Probabilistic Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 99, (155-182), Online publication date: 1-Aug-2004.
  3120. ACM
    Li T, Ma S and Ogihara M Document clustering via adaptive subspace iteration Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, (218-225)
  3121. Schneider K A new feature selection score for multinomial naive Bayes text classification based on KL-divergence Proceedings of the ACL 2004 on Interactive poster and demonstration sessions, (24-es)
  3122. Smith N and Eisner J Annealing techniques for unsupervised statistical language learning Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, (486-es)
  3123. Infante-Lopez G and de Rijke M Alternative approaches for generating bodies of grammar rules Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, (454-es)
  3124. Guo Y, Muller J and Bauer B A Multiagent Approach for Logistics Performance Prediction Using Historical and Context Information Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1164-1171)
  3125. Shalizi C and Shalizi K Blind construction of optimal nonlinear recursive predictors for discrete sequences Proceedings of the 20th conference on Uncertainty in artificial intelligence, (504-511)
  3126. Orlitsky A, Santhanam N, Viswanathan K and Zhang J On modeling profiles instead of values Proceedings of the 20th conference on Uncertainty in artificial intelligence, (426-435)
  3127. Grünwald P and Halpern J When ignorance is bliss Proceedings of the 20th conference on Uncertainty in artificial intelligence, (226-234)
  3128. Globerson A and Tishby N The minimum information principle for discriminative learning Proceedings of the 20th conference on Uncertainty in artificial intelligence, (193-200)
  3129. ACM
    Banerjee A, Dhillon I, Ghosh J and Merugu S An information theoretic analysis of maximum likelihood mixture estimation for exponential families Proceedings of the twenty-first international conference on Machine learning
  3130. ACM
    Fern X and Brodley C Solving cluster ensemble problems by bipartite graph partitioning Proceedings of the twenty-first international conference on Machine learning
  3131. ACM
    Li T, Ma S and Ogihara M Entropy-based criterion in categorical clustering Proceedings of the twenty-first international conference on Machine learning
  3132. ACM
    Melville P and Mooney R Diverse ensembles for active learning Proceedings of the twenty-first international conference on Machine learning
  3133. ACM
    Agarwal A and Kumar P (2004). Capacity bounds for ad hoc and hybrid wireless networks, ACM SIGCOMM Computer Communication Review, 34:3, (71-81), Online publication date: 1-Jul-2004.
  3134. Goudail F and Refregier P (2004). Contrast Definition for Optical Coherent Polarimetric Images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:7, (947-951), Online publication date: 1-Jul-2004.
  3135. Cachin C (2004). An information-theoretic model for steganography, Information and Computation, 192:1, (41-56), Online publication date: 1-Jul-2004.
  3136. Blundo C, D'Arco P, Daza V and Padró C (2004). Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures, Theoretical Computer Science, 320:2-3, (269-291), Online publication date: 14-Jun-2004.
  3137. Carvalho D and Freitas A (2004). A hybrid decision tree/genetic algorithm method for data mining, Information Sciences: an International Journal, 163:1-3, (13-35), Online publication date: 14-Jun-2004.
  3138. ACM
    Andritsos P, Miller R and Tsaparas P Information-theoretic tools for mining database structure from large data sets Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (731-742)
  3139. ACM
    Dhamankar R, Lee Y, Doan A, Halevy A and Domingos P iMAP Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (383-394)
  3140. ACM
    Bar-Yossef Z, Jayram T and Kerenidis I Exponential separation of quantum and classical one-way communication complexity Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (128-137)
  3141. Erdogmus D and Principe J (2004). Lower and Upper Bounds for Misclassification Probability Based on Renyi's Information, Journal of VLSI Signal Processing Systems, 37:2-3, (305-317), Online publication date: 1-Jun-2004.
  3142. Srikanchana R, Xuan J, Freedman M, Nguyen C and Wang Y (2004). Non-Rigid Image Registration by Neural Computation, Journal of VLSI Signal Processing Systems, 37:2-3, (237-246), Online publication date: 1-Jun-2004.
  3143. Loog M and Duin R (2004). Linear Dimensionality Reduction via a Heteroscedastic Extension of LDA, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:6, (732-739), Online publication date: 1-Jun-2004.
  3144. Martin P, Réfrégier P, Goudail F and Guérault F (2004). Influence of the Noise Model on Level Set Active Contour Segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:6, (799-803), Online publication date: 1-Jun-2004.
  3145. Abrardo A and Barni M Fixed-Distortion orthogonal dirty paper coding for perceptual still image watermarking Proceedings of the 6th international conference on Information Hiding, (52-66)
  3146. Sun W and Yang E On achievable regions of public multiple-access gaussian watermarking systems Proceedings of the 6th international conference on Information Hiding, (38-51)
  3147. ACM
    Gabrilovich E, Dumais S and Horvitz E Newsjunkie Proceedings of the 13th international conference on World Wide Web, (482-490)
  3148. Begeja L, Renger B, Saraclar M, Gibbon D, Liu Z and Shahraray B A system for searching and browsing spoken communications Proceedings of the Workshop on Interdisciplinary Approaches to Speech Indexing and Retrieval at HLT-NAACL 2004, (1-8)
  3149. Vasserman A Identifying chemical names in biomedical text Proceedings of the Student Research Workshop at HLT-NAACL 2004, (7-12)
  3150. Yamanishi K, Takeuchi J, Williams G and Milne P (2004). On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms, Data Mining and Knowledge Discovery, 8:3, (275-300), Online publication date: 1-May-2004.
  3151. ACM
    Beferull-Lozano B, Konsbruck R and Vetterli M Rate-distortion problem for physics based distributed sensing Proceedings of the 3rd international symposium on Information processing in sensor networks, (330-339)
  3152. ACM
    Gastpar M and Vetterli M Power-bandwidth-distortion scaling laws for sensor networks Proceedings of the 3rd international symposium on Information processing in sensor networks, (320-329)
  3153. ACM
    ElBatt T On the scalability of hierarchical cooperation for dense sensor networks Proceedings of the 3rd international symposium on Information processing in sensor networks, (387-293)
  3154. ACM
    Biswas R, Thrun S and Guibas L A probabilistic approach to inference with limited information in sensor networks Proceedings of the 3rd international symposium on Information processing in sensor networks, (269-276)
  3155. ACM
    Ganesan D, Cristescu R and Beferull-Lozano B Power-efficient sensor placement and transmission structure for data gathering under distortion constraints Proceedings of the 3rd international symposium on Information processing in sensor networks, (142-150)
  3156. ACM
    Kumar A, Ishwar P and Ramchandran K On distributed sampling of smooth non-bandlimited fields Proceedings of the 3rd international symposium on Information processing in sensor networks, (89-98)
  3157. ACM
    Pattem S, Krishnamachari B and Govindan R The impact of spatial correlation on routing with compression in wireless sensor networks Proceedings of the 3rd international symposium on Information processing in sensor networks, (28-35)
  3158. ACM
    Peng H and Myers E Comparing in situ mRNA expression patterns of drosophila embryos Proceedings of the eighth annual international conference on Research in computational molecular biology, (157-166)
  3159. Greenspan H, Goldberger J and Mayer A (2004). Probabilistic Space-Time Video Modeling via Piecewise GMM, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:3, (384-396), Online publication date: 1-Mar-2004.
  3160. Wei J (2004). Markov Edit Distance, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:3, (311-321), Online publication date: 1-Mar-2004.
  3161. Girardin V (2004). Entropy Maximization for Markov and Semi-Markov Processes, Methodology and Computing in Applied Probability, 6:1, (109-127), Online publication date: 1-Mar-2004.
  3162. Elomaa T and Rousu J (2004). Efficient Multisplitting Revisited, Data Mining and Knowledge Discovery, 8:2, (97-126), Online publication date: 1-Mar-2004.
  3163. Last M and Maimon O (2004). A Compact and Accurate Model for Classification, IEEE Transactions on Knowledge and Data Engineering, 16:2, (203-215), Online publication date: 1-Feb-2004.
  3164. Borodin A, El-Yaniv R and Gogan V (2004). Can we learn to beat the best stock, Journal of Artificial Intelligence Research, 21:1, (579-594), Online publication date: 1-Jan-2004.
  3165. Halpern J and Koller D (2004). Representation dependence in probabilistic inference, Journal of Artificial Intelligence Research, 21:1, (319-356), Online publication date: 1-Jan-2004.
  3166. Guo Y, Weng F and Wu L Grammar induction by MDL-based distributional classification New developments in parsing technology, (291-306)
  3167. Biglieri E and Taricco G Multiple antennas Wireless communications systems and networks, (613-654)
  3168. Khaled N, Desset C, Thoen S and De Man H (2004). Spatial-mode selection for the joint transmit and receive MMSE design, EURASIP Journal on Advances in Signal Processing, 2004, (1199-1211), Online publication date: 1-Jan-2004.
  3169. Jin H and Acampora A (2004). Bounds on the outage-constrained capacity region of space-division multiple-access radio systems, EURASIP Journal on Advances in Signal Processing, 2004, (1288-1298), Online publication date: 1-Jan-2004.
  3170. Zhao Y, Adve R and Lim T (2004). Optimal STBC precoding with channel covariance feedback for minimum error probability, EURASIP Journal on Advances in Signal Processing, 2004, (1257-1265), Online publication date: 1-Jan-2004.
  3171. Jafar S, Foschini G and Goldsmith A (2004). PhantomNet, EURASIP Journal on Advances in Signal Processing, 2004, (591-604), Online publication date: 1-Jan-2004.
  3172. Chung S, Lozano A, Huang H, Sutivong A and Cioffi J (2004). Approaching the MIMO capacity with a low-rate feedback channel in V-BLAST, EURASIP Journal on Advances in Signal Processing, 2004, (762-771), Online publication date: 1-Jan-2004.
  3173. Blum R (2004). Maximum MIMO system mutual information with antenna selection and interference, EURASIP Journal on Advances in Signal Processing, 2004, (676-684), Online publication date: 1-Jan-2004.
  3174. Song J and Liu K (2004). An integrated source and channel rate allocation scheme for robust video coding and transmission over wireless channels, EURASIP Journal on Advances in Signal Processing, 2004, (304-316), Online publication date: 1-Jan-2004.
  3175. Padberg F, Ragg T and Schoknecht R (2004). Using Machine Learning for Estimating the Defect Content After an Inspection, IEEE Transactions on Software Engineering, 30:1, (17-28), Online publication date: 1-Jan-2004.
  3176. Yu K, Schwaighofer A, Tresp V, Xu X and Kriegel H (2004). Probabilistic Memory-Based Collaborative Filtering, IEEE Transactions on Knowledge and Data Engineering, 16:1, (56-69), Online publication date: 1-Jan-2004.
  3177. Dai J, Lathrop J, Lutz J and Mayordomo E (2004). Finite-state dimension, Theoretical Computer Science, 310:1-3, (1-33), Online publication date: 1-Jan-2004.
  3178. Virine L and Rapley L The process of process reengineering Proceedings of the 35th conference on Winter simulation: driving innovation, (1779-1786)
  3179. Aguirre A and Coello Coello C (2003). Evolutionary Synthesis of LogicCircuits Using Information Theory, Artificial Intelligence Review, 20:3-4, (445-471), Online publication date: 1-Dec-2003.
  3180. Ay N and Wennekers T (2003). Dynamical properties of strongly interacting Markov chains, Neural Networks, 16:10, (1483-1497), Online publication date: 1-Dec-2003.
  3181. Bilmes J and Kirchhoff K (2003). Generalized rules for combination and joint training of classifiers, Pattern Analysis & Applications, 6:3, (201-211), Online publication date: 1-Dec-2003.
  3182. Merugu S and Ghosh J Privacy-preserving Distributed Clustering using Generative Models Proceedings of the Third IEEE International Conference on Data Mining
  3183. Dhillon I and Guan Y Information Theoretic Clustering of Sparse Co-Occurrence Data Proceedings of the Third IEEE International Conference on Data Mining
  3184. ACM
    Kompella R and Snoeren A Practical lazy scheduling in sensor networks Proceedings of the 1st international conference on Embedded networked sensor systems, (280-291)
  3185. ACM
    Buchsbaum A, Fowler G and Giancarlo R (2003). Improving table compression with combinatorial optimization, Journal of the ACM, 50:6, (825-851), Online publication date: 1-Nov-2003.
  3186. Kwak N and Choi C (2003). Feature Extraction Based on ICA for Binary Classification Problems, IEEE Transactions on Knowledge and Data Engineering, 15:6, (1374-1388), Online publication date: 1-Nov-2003.
  3187. ACM
    More S, Malkin M, Staddon J and Balfanz D Sliding-window self-healing key distribution Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security, (82-90)
  3188. ACM
    Moskowitz I, Newman R, Crepeau D and Miller A Covert channels and anonymizing networks Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (79-88)
  3189. ACM
    Liu D, Ning P and Sun K Efficient self-healing group key distribution with revocation capability Proceedings of the 10th ACM conference on Computer and communications security, (231-240)
  3190. Yeh E and Cohen A A fundamental cross-layer approach to uplink resource allocation Proceedings of the 2003 IEEE conference on Military communications - Volume I, (699-704)
  3191. Kim I, Yim R and Charskar H Optimum scheduling for smart antenna systems in Rayleigh fading channel Proceedings of the 2003 IEEE conference on Military communications - Volume I, (658-663)
  3192. V'Yugin V and Maslov V (2003). Extremal Relations between Additive Loss Functions and the Kolmogorov Complexity, Problems of Information Transmission, 39:4, (380-394), Online publication date: 1-Oct-2003.
  3193. Chowdhury A and Chellappa R (2003). Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation, International Journal of Computer Vision, 55:1, (27-53), Online publication date: 1-Oct-2003.
  3194. ACM
    Liu J, Zhao F and Petrovic D Information-directed routing in ad hoc sensor networks Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (88-97)
  3195. ACM
    Khayam S and Radha H Markov-based modeling of wireless local area networks Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, (100-107)
  3196. ACM
    Kozat U and Tassiulas L Throughput capacity of random ad hoc networks with infrastructure support Proceedings of the 9th annual international conference on Mobile computing and networking, (55-65)
  3197. Xiao L, Johansson M, Hindi H, Boyd S and Goldsmith A Joint optimization of wireless communication and networked control systems Switching and Learning in Feedback Systems, (248-272)
  3198. Grünwald P and Vitányi P (2003). Kolmogorov Complexity and Information Theory.With an Interpretation in Terms of Questions and Answers, Journal of Logic, Language and Information, 12:4, (497-529), Online publication date: 1-Sep-2003.
  3199. Zhang Y, Lee W and Huang Y (2003). Intrusion detection techniques for mobile wireless networks, Wireless Networks, 9:5, (545-556), Online publication date: 1-Sep-2003.
  3200. Sadakane K (2003). New text indexing functionalities of the compressed suffix arrays, Journal of Algorithms, 48:2, (294-313), Online publication date: 1-Sep-2003.
  3201. Aazhang B and Sabharwal A (2003). Algorithms for Wireless Communication Systems, Wireless Personal Communications: An International Journal, 26:2-3, (217-226), Online publication date: 27-Aug-2003.
  3202. ACM
    Last M, Friedman M and Kandel A The data mining approach to automated software testing Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (388-396)
  3203. ACM
    Dhillon I, Mallela S and Modha D Information-theoretic co-clustering Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (89-98)
  3204. ACM
    Banerjee A, Dhillon I, Ghosh J and Sra S Generative model-based clustering of directional data Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (19-28)
  3205. Wang S, Schuurmans D, Peng F and Zhao Y Learning mixture models with the latent maximum entropy principle Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (784-791)
  3206. Szpankowski W, Ren W and Szpankowski L An Optimal DNA Segmentation Based on the MDL Principle Proceedings of the IEEE Computer Society Conference on Bioinformatics
  3207. Sanghai S, Domingos P and Weld D Dynamic probabilistic relational models Proceedings of the 18th international joint conference on Artificial intelligence, (992-997)
  3208. Cho S, Perrone M and Ratzlaff E Probability Table Compression for Handwritten Character Recognition Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
  3209. Arcas B, Fairhall A and Bialek W (2003). Computation in a single Neuron, Neural Computation, 15:8, (1715-1749), Online publication date: 1-Aug-2003.
  3210. Lee A, Pedersen K and Mumford D (2003). The Nonlinear Statistics of High-Contrast Patches in Natural Images, International Journal of Computer Vision, 54:1-3, (83-103), Online publication date: 1-Aug-2003.
  3211. Fischer R, Huber J and Windpassinger C (2003). Signal processing in decision-feedback equalization of intersymbol-interference and multiple-input/multiple-output channels, Signal Processing, 83:8, (1633-1642), Online publication date: 1-Aug-2003.
  3212. ACM
    Aslam J and Frost M An information-theoretic measure for document similarity Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, (449-450)
  3213. ACM
    Wang J, Zeng H, Chen Z, Lu H, Tao L and Ma W ReCoM Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, (274-281)
  3214. ACM
    Chen Z, Liu S, Wenyin L, Pu G and Ma W Building a web thesaurus from web link structure Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, (48-55)
  3215. Nock H, Iyengar G and Neti C Speaker localisation using audio-visual synchrony Proceedings of the 2nd international conference on Image and video retrieval, (488-499)
  3216. Wineberg M and Oppacher F The underlying similarity of diversity measures used in evolutionary computation Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (1493-1504)
  3217. Seo D, Kim Y and Moon B New entropy-based measures of gene significance and epistasis Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (1345-1356)
  3218. Tomokiyo T and Hurst M A language model approach to keyphrase extraction Proceedings of the ACL 2003 workshop on Multiword expressions: analysis, acquisition and treatment - Volume 18, (33-40)
  3219. Weeds J and Weir D A general framework for distributional similarity Proceedings of the 2003 conference on Empirical methods in natural language processing, (81-88)
  3220. Sy B Discovering association patterns based on mutual information Proceedings of the 3rd international conference on Machine learning and data mining in pattern recognition, (369-378)
  3221. Grünwald P and Halpern J (2003). Updating probabilities, Journal of Artificial Intelligence Research, 19:1, (243-278), Online publication date: 1-Jul-2003.
  3222. Dong Y and Carin L (2003). Rate-Distortion Analysis of Discrete-HMM Pose Estimation via Multiaspect Scattering Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25:7, (872-883), Online publication date: 1-Jul-2003.
  3223. Song Y, Goncalves L and Perona P (2003). Unsupervised Learning of Human Motion, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25:7, (814-827), Online publication date: 1-Jul-2003.
  3224. Zhou S, Krueger V and Chellappa R (2003). Probabilistic recognition of human faces from video, Computer Vision and Image Understanding, 91:1-2, (214-245), Online publication date: 1-Jul-2003.
  3225. Chowdhury A and Chellappa R (2003). Face reconstruction from monocular video using uncertainty analysis and a generic model, Computer Vision and Image Understanding, 91:1-2, (188-213), Online publication date: 1-Jul-2003.
  3226. Krishnapuram R and Kummamuru K Automatic taxonomy generation Proceedings of the 10th international fuzzy systems association World Congress conference on Fuzzy sets and systems, (52-63)
  3227. Schenker A, Last M, Bunke H and Kandel A Comparison of distance measures for graph-based clustering of documents Proceedings of the 4th IAPR international conference on Graph based representations in pattern recognition, (202-213)
  3228. Apolloni B, Brega A, Malchiodi D, Palmas G and Zanaboni A Learning rule representations from Boolean data Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing, (875-882)
  3229. Knoblauch A Optimal matrix compression yields storage capacity 1 for binary Willshaw associative memory Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing, (325-332)
  3230. Rigau J, Feixas M and Sbert M Refinement criteria based on f-divergences Proceedings of the 14th Eurographics workshop on Rendering, (260-269)
  3231. Giancarlo R and Sciortino M Optimal partitions of strings Proceedings of the 14th annual conference on Combinatorial pattern matching, (129-143)
  3232. Lyon C, Nehaniv C, Warren S, Dickerson B and Baillie J Homophony and disambiguation through sequential processes in the evolution of language Proceedings of the 2003 and 2004 international conference on New frontiers in artificial intelligence, (315-324)
  3233. Sow D, Olshefski D, Beigi M and Banavar G Prefetching based on web usage mining Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware, (262-281)
  3234. Cohen S and Intrator N A study of ensemble of hybrid networks with strong regularization Proceedings of the 4th international conference on Multiple classifier systems, (227-235)
  3235. ACM
    Kang J and Naughton J On schema matching with opaque column names and data values Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (205-216)
  3236. ACM
    Jayram T, Kumar R and Sivakumar D Two applications of information complexity Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (673-682)
  3237. ACM
    Bar-Yossef Z Sampling lower bounds via information theory Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (335-344)
  3238. ACM
    Bobkov S and Tetali P Modified log-sobolev inequalities, mixing and hypercontractivity Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (287-296)
  3239. ACM
    Arenas M and Libkin L An information-theoretic approach to normal forms for relational and XML data Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (15-26)
  3240. ACM
    Qin W and Malik S Automated synthesis of efficient binary decoders for retargetable software toolkits Proceedings of the 40th annual Design Automation Conference, (764-769)
  3241. Paninski L (2003). Estimation of entropy and mutual information, Neural Computation, 15:6, (1191-1253), Online publication date: 1-Jun-2003.
  3242. ACM
    Peraki C and Servetto S On the maximum stable throughput problem in random networks with directional antennas Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (76-87)
  3243. ACM
    Dai M and Loguinov D Analysis of rate-distortion functions and congestion control in scalable internet video streaming Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, (60-69)
  3244. Guo C, Zhu S and Wu Y (2003). Modeling Visual Patterns by Integrating Descriptive and Generative Methods, International Journal of Computer Vision, 53:1, (5-29), Online publication date: 1-Jun-2003.
  3245. Cesa-Bianchi N and Lugosi G (2003). Potential-Based Algorithms in On-Line Prediction and Game Theory, Machine Language, 51:3, (239-261), Online publication date: 1-Jun-2003.
  3246. Kosko B and Mitaim S (2003). Stochastic resonance in noisy threshold neurons, Neural Networks, 16:5-6, (755-761), Online publication date: 1-Jun-2003.
  3247. Kim S, Sanchez J, Erdogmus D, Rao Y, Wessberg J, Principe J and Nicolelis M (2003). Divide-and-conquer approach for brain machine interfaces, Neural Networks, 16:5-6, (865-871), Online publication date: 1-Jun-2003.
  3248. Wallace R, Wallace D and Wallace R (2003). Toward Cultural Oncology, Open Systems & Information Dynamics, 10:2, (159-181), Online publication date: 21-May-2003.
  3249. Vázquez P and Sbert M Fast adaptive selection of best views Proceedings of the 2003 international conference on Computational science and its applications: PartIII, (295-305)
  3250. Rigau J, Feixas M and Sbert M Information-theory-based oracles for hierarchical radiosity Proceedings of the 2003 international conference on Computational science and its applications: PartIII, (275-284)
  3251. Sáez G (2003). Generation of key predistribution schemes using secret sharing schemes, Discrete Applied Mathematics, 128:1, (239-249), Online publication date: 15-May-2003.
  3252. Blundo C, D'Arco P and Padró C (2003). A ramp model for distributed key distribution schemes, Discrete Applied Mathematics, 128:1, (47-64), Online publication date: 15-May-2003.
  3253. Ekdahl P, Meier W and Johansson T Predicting the shrinking generator with fixed connections Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (330-344)
  3254. Comaniciu D, Ramesh V and Meer P (2003). Kernel-Based Object Tracking, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25:5, (564-575), Online publication date: 1-May-2003.
  3255. Wolff J (2003). Information Compression by Multiple Alignment, Unification and Search as a Unifying Principle in Computing and Cognition, Artificial Intelligence Review, 19:3, (193-230), Online publication date: 1-May-2003.
  3256. Kojadinovic I (2003). Modeling interaction phenomena using fuzzy measures, Fuzzy Sets and Systems, 135:3, (317-340), Online publication date: 1-May-2003.
  3257. Ihler A, Fisher J and Willsky A Hypothesis testing over factorizations for data association Proceedings of the 2nd international conference on Information processing in sensor networks, (239-253)
  3258. Shin J, Guibas L and Zhao F A distributed algorithm for managing multi-target identities in wireless ad-hoc sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (223-238)
  3259. D'Costa A and Sayeed A Collaborative signal processing for distributed classification in sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (193-208)
  3260. Ishwar P, Puri R, Pradhan S and Ramchandran K On rate-constrained estimation in unreliable sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (178-192)
  3261. Gastpar M and Vetterli M Source-channel communication in sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (162-177)
  3262. Khojastepour M, Sabharwal A and Aazhang B Bounds on achievable rates for general multi-terminal networks with practical constraints Proceedings of the 2nd international conference on Information processing in sensor networks, (146-161)
  3263. Woodward J Modularity in genetic programming Proceedings of the 6th European conference on Genetic programming, (254-263)
  3264. Bigi B Using Kullback-Leibler distance for text categorization Proceedings of the 25th European conference on IR research, (305-319)
  3265. Wang H and Pieprzyk J Shared generation of pseudo-random functions with cumulative maps Proceedings of the 2003 RSA conference on The cryptographers' track, (281-295)
  3266. Schneider K A comparison of event models for Naive Bayes anti-spam e-mail filtering Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1, (307-314)
  3267. ACM
    Roskin K, Diekhans M and Haussler D Scoring two-species local alignments to try to statistically separate neutrally evolving from selected DNA segments Proceedings of the seventh annual international conference on Research in computational molecular biology, (257-266)
  3268. ACM
    Bejerano G Efficient exact value computation and applications to biosequence analysis Proceedings of the seventh annual international conference on Research in computational molecular biology, (38-47)
  3269. Austin A and Egerstedt M Mode reconstruction for source coding and multi-modal control Proceedings of the 6th international conference on Hybrid systems: computation and control, (36-49)
  3270. Roy A, Das Bhaumik S, Bhattacharya A, Basu K, Cook D and Das S Location Aware Resource Management in Smart Homes Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  3271. Aguirre A, Equihua E and Coello C Synthesis of boolean functions using information theory Proceedings of the 5th international conference on Evolvable systems: from biology to hardware, (218-227)
  3272. ACM
    Debole F and Sebastiani F Supervised term weighting for automated text categorization Proceedings of the 2003 ACM symposium on Applied computing, (784-788)
  3273. Cardinal J (2003). Tree-Structured Multiple Description Coding, Journal of VLSI Signal Processing Systems, 33:3, (287-294), Online publication date: 1-Mar-2003.
  3274. ACM
    Sahai A and Vadhan S (2003). A complete problem for statistical zero knowledge, Journal of the ACM, 50:2, (196-249), Online publication date: 1-Mar-2003.
  3275. Wang B, Mckay R, Abbass H and Barlow M A comparative study for domain ontology guided feature extraction Proceedings of the 26th Australasian computer science conference - Volume 16, (69-78)
  3276. Eboli M (2003). Two Models of Information Costs Based on Computational Complexity, Computational Economics, 21:1-2, (87-105), Online publication date: 1-Feb-2003.
  3277. Goldberg A and Hartline J Competitiveness via consensus Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (215-222)
  3278. Lozano A Multiantenna technology for high-speed wireless internet access Wireless internet handbook, (335-350)
  3279. Smola A and Schölkopf B Bayesian kernel methods Advanced lectures on machine learning, (65-117)
  3280. McAllester D and Schapire R Learning theory and language modeling Exploring artificial intelligence in the new millennium, (271-287)
  3281. Yedidia J, Freeman W and Weiss Y Understanding belief propagation and its generalizations Exploring artificial intelligence in the new millennium, (239-269)
  3282. Binz E, Pods S and Schempp W (2003). Heisenberg groups, The Korean Journal of Computational & Applied Mathematics, 11:1-2, (1-57), Online publication date: 1-Jan-2003.
  3283. Afrati F, Leiß H and de Rougemont M (2003). Definability and Compression, Fundamenta Informaticae, 56:1-2, (155-180), Online publication date: 1-Jan-2003.
  3284. Mouchtaris A, Narayanan S and Kyriakakis C (2003). Virtual microphones for multichannel audio resynthesis, EURASIP Journal on Advances in Signal Processing, 2003, (968-979), Online publication date: 1-Jan-2003.
  3285. Liu J, Reich J and Zhao F (2003). Collaborative in-network processing for target tracking, EURASIP Journal on Advances in Signal Processing, 2003, (378-391), Online publication date: 1-Jan-2003.
  3286. Slonim N, Bejerano G, Fine S and Tishby N (2003). Discriminative feature selection via multiclass variable memory Markov model, EURASIP Journal on Advances in Signal Processing, 2003, (93-102), Online publication date: 1-Jan-2003.
  3287. Konishi S, Yuille A, Coughlan J and Zhu S (2003). Statistical Edge Detection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25:1, (57-74), Online publication date: 1-Jan-2003.
  3288. Benedetto D, Caglioti E and Loreto V (2003). Zipping Out Relevant Information, Computing in Science and Engineering, 5:1, (80-85), Online publication date: 1-Jan-2003.
  3289. Aizawa A (2003). An information-theoretic perspective of tf—idf measures, Information Processing and Management: an International Journal, 39:1, (45-65), Online publication date: 1-Jan-2003.
  3290. Leung D (2002). Quantum vernam cipher, Quantum Information & Computation, 2:1, (14-34), Online publication date: 1-Dec-2002.
  3291. ACM
    Sundaram H, Xie L and Chang S A utility framework for the automatic generation of audio-visual skims Proceedings of the tenth ACM international conference on Multimedia, (189-198)
  3292. ACM
    Lei Z and Georganas N Rate adaptation transcoding for precoded video streams Proceedings of the tenth ACM international conference on Multimedia, (127-136)
  3293. ACM
    Ciaccia P and Patella M (2002). Searching in metric spaces with user-defined and approximate distances, ACM Transactions on Database Systems, 27:4, (398-437), Online publication date: 1-Dec-2002.
  3294. Kwak N and Choi C (2002). Input Feature Selection by Mutual Information Based on Parzen Window, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:12, (1667-1671), Online publication date: 1-Dec-2002.
  3295. Khalighi M, Raoof K and Jourdain G (2002). Capacity of Wireless Communication Systems Employing Antenna Arrays, a Tutorial Study, Wireless Personal Communications: An International Journal, 23:3, (321-352), Online publication date: 1-Dec-2002.
  3296. Tagliani A (2002). An upper bound for entropy of discrete distributions having assigned moments, Applied Mathematics and Computation, 133:1, (159-170), Online publication date: 25-Nov-2002.
  3297. Miller M, Doërr G and Cox I Informed embedding for multi-bit watermarks Proceedings of the 1st international conference on Digital watermarking, (13-21)
  3298. Moulin P Information-hiding games Proceedings of the 1st international conference on Digital watermarking, (1-12)
  3299. Baccelli F, Błaszczyszyn B and Tournois F (2002). Spatial averages of coverage characteristics in large CDMA networks, Wireless Networks, 8:6, (569-586), Online publication date: 1-Nov-2002.
  3300. Foster D and Dayan P (2002). Structure in the Space of Value Functions, Machine Language, 49:2-3, (325-346), Online publication date: 1-Nov-2002.
  3301. Reznik Y (2002). Some results on tries with adaptive branching, Theoretical Computer Science, 289:2, (1009-1026), Online publication date: 30-Oct-2002.
  3302. Afrati F, Leiß H and de Rougemont M (2002). Definability and compression, Fundamenta Informaticae, 56:1,2, (155-180), Online publication date: 1-Oct-2002.
  3303. Bethge M, Rotermund D and Pawelzik K (2002). Optimal short-term population coding, Neural Computation, 14:10, (2317-2351), Online publication date: 1-Oct-2002.
  3304. Antoniol G, Canfora G, Casazza G, De Lucia A and Merlo E (2002). Recovering Traceability Links between Code and Documentation, IEEE Transactions on Software Engineering, 28:10, (970-983), Online publication date: 1-Oct-2002.
  3305. Schurgers C, Kulkarni G and Srivastava M (2002). Distributed On-Demand Address Assignment in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, 13:10, (1056-1065), Online publication date: 1-Oct-2002.
  3306. Burnashev M and Amari S (2002). On Density Estimation under Relative Entropy Loss Criterion, Problems of Information Transmission, 38:4, (323-346), Online publication date: 1-Oct-2002.
  3307. Last M, Bunke H and Kandel A (2002). A Feature-Based Serial Approach to Classifier Combination, Pattern Analysis & Applications, 5:4, (385-398), Online publication date: 1-Oct-2002.
  3308. Schuurmans D and Southey F (2002). Metric-Based Methods for Adaptive Model Selection and Regularization, Machine Language, 48:1-3, (51-84), Online publication date: 30-Sep-2002.
  3309. ACM
    Servetto S and Barrenechea G Constrained random walks on random graphs Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, (12-21)
  3310. Zou K, Wells W, Kaus M, Kikinis R, Jolesz F and Warfield S Statistical Validation of Automated Probabilistic Segmentation against Composite Latent Expert Ground Truth in MR Imaging of Brain Tumors Proceedings of the 5th International Conference on Medical Image Computing and Computer-Assisted Intervention-Part I, (315-322)
  3311. ACM
    Ahamad M, Mark L, Lee W, Omicienski E, Santos A, Liu L and Pu C Guarding the next Internet frontier Proceedings of the 2002 workshop on New security paradigms, (136-143)
  3312. ACM
    Moskowitz I, Chang L and Newman R Capacity is the wrong paradigm Proceedings of the 2002 workshop on New security paradigms, (114-126)
  3313. ACM
    Scaglione A and Servetto S On the interdependence of routing and data compression in multi-hop sensor networks Proceedings of the 8th annual international conference on Mobile computing and networking, (140-147)
  3314. ACM
    Gupta V (2002). Communication complexity for file synchronization is undecidable, ACM SIGACT News, 33:3, (110-112), Online publication date: 1-Sep-2002.
  3315. Jain A, Moulin P, Miller M and Ramchandran K (2002). Information-Theoretic Bounds on Target Recognition Performance Based on Degraded Image Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:9, (1153-1166), Online publication date: 1-Sep-2002.
  3316. Korhonen A and Krymolowski Y On the robustness of entropy-based similarity measures in evaluation of subcategorization acquisition systems proceedings of the 6th conference on Natural language learning - Volume 20, (1-7)
  3317. Dagan I, Marx Z and Shamir E Cross-dataset clustering proceedings of the 6th conference on Natural language learning - Volume 20, (1-7)
  3318. Cao Y and Li H Base Noun Phrase translation using web data and the EM algorithm Proceedings of the 19th international conference on Computational linguistics - Volume 1, (1-7)
  3319. Li J and Zha H Simultaneous Classification and Feature Clustering Using Discriminant Vector Quantization with Applications to Microarray Data Analysis Proceedings of the IEEE Computer Society Conference on Bioinformatics
  3320. ACM
    Cronen-Townsend S, Zhou Y and Croft W Predicting query performance Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval, (299-306)
  3321. ACM
    Slonim N, Friedman N and Tishby N Unsupervised document classification using sequential information maximization Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval, (129-136)
  3322. Globerson A, Chechik G and Tishby N Sufficient dimensionality reduction with irrelevance statistics Proceedings of the Nineteenth conference on Uncertainty in Artificial Intelligence, (281-288)
  3323. Elidan G and Friedman N The Information bottleneck EM algorithm Proceedings of the Nineteenth conference on Uncertainty in Artificial Intelligence, (200-208)
  3324. Zaffalon M and Hutter M Robust feature selection by mutual information distributions Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (577-584)
  3325. Grünwald P and Halpern J Updating probabilities Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (187-196)
  3326. Dom B An information-theoretic external cluster-validity measure Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (137-145)
  3327. Uysal-Biyikoglu E, Prabhakar B and El Gamal A (2002). Energy-efficient packet transmission over a wireless link, IEEE/ACM Transactions on Networking, 10:4, (487-499), Online publication date: 1-Aug-2002.
  3328. Datta N and Suhov Y (2002). Data Compression Limit for an Information Source of Interacting Qubits, Quantum Information Processing, 1:4, (257-281), Online publication date: 1-Aug-2002.
  3329. Raz R, Reingold O and Vadhan S (2002). Extracting all the randomness and reducing the error in Trevisan's extractors, Journal of Computer and System Sciences, 65:1, (97-128), Online publication date: 1-Aug-2002.
  3330. Globerson A and Tishby N Most informative dimension reduction Eighteenth national conference on Artificial intelligence, (1024-1029)
  3331. Rish I, Brodie M and Ma S Accuracy vs. efficiency trade-offs in probabilistic diagnosis Eighteenth national conference on Artificial intelligence, (560-566)
  3332. Zhang N Hierarchical latent class models for cluster analysis Eighteenth national conference on Artificial intelligence, (230-237)
  3333. Patterson D, Rooney N and Galushka M A regression based adaptation strategy for case-based reasoning Eighteenth national conference on Artificial intelligence, (87-92)
  3334. ACM
    Dhillon I, Mallela S and Kumar R Enhanced word clustering for hierarchical text classification Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (191-200)
  3335. ACM
    Morasca S A proposal for using continuous attributes in classification trees Proceedings of the 14th international conference on Software engineering and knowledge engineering, (417-424)
  3336. Hyvärinen A (2002). Topography as a property of the natural sensory world, Natural Computing: an international journal, 1:2-3, (185-198), Online publication date: 1-Jun-2002.
  3337. Babich F and Vatta F (2002). Effects of Sectorization on Cellular Radio Systems Capacity with Different Traffic Loads, Wireless Personal Communications: An International Journal, 21:3, (269-288), Online publication date: 1-Jun-2002.
  3338. Apolloni B, Malchiodi D, Orovas C and Palmas G (2002). From synapses to rules, Cognitive Systems Research, 3:2, (167-201), Online publication date: 1-Jun-2002.
  3339. Guo L (2002). Exploring the maximum capability of adaptive feedback, International Journal of Adaptive Control and Signal Processing, 16:5, (341-354), Online publication date: 1-Jun-2002.
  3340. Vázquez P, Feixas M, Sbert M and Llobet A Viewpoint entropy Proceedings of the symposium on Data Visualisation 2002, (183-188)
  3341. ACM
    Charikar M, Lehman E, Liu D, Panigrahy R, Prabhakaran M, Rasala A, Sahai A and shelat a Approximating the smallest grammar Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (792-801)
  3342. ACM
    Nayak A and Salzman J On communication over an entanglement-assisted quantum channel Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (698-704)
  3343. ACM
    Saks M and Sun X Space lower bounds for distance approximation in the data stream model Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (360-369)
  3344. ACM
    Dziembowski S and Maurer U Tight security proofs for the bounded-storage model Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (341-350)
  3345. ACM
    Chakrabarti S, Joshi M, Punera K and Pennock D The structure of broad topics on the web Proceedings of the 11th international conference on World Wide Web, (251-262)
  3346. Cheung D, Lee S and Xiao V (2002). Effect of Data Skewness and Workload Balance in Parallel Data Mining, IEEE Transactions on Knowledge and Data Engineering, 14:3, (498-514), Online publication date: 1-May-2002.
  3347. Erdogmus D, Principe J and Hild K (2002). Beyond second-order statistics for learning, Natural Computing: an international journal, 1:1, (85-108), Online publication date: 1-May-2002.
  3348. ACM
    ¯Cerneková Z, Nikou C and Pitas I Entropy metrics used for video summarization Proceedings of the 18th Spring Conference on Computer Graphics, (73-82)
  3349. ACM
    Segal E and Koller D Probabilistic hierarchical clustering for biological data Proceedings of the sixth annual international conference on Computational biology, (273-280)
  3350. Parthasarathy S and Ramakrishnan A Parallel Incremental 2D-Discretization on Dynamic Datasets Proceedings of the 16th International Parallel and Distributed Processing Symposium
  3351. Díaz C, Seys S, Claessens J and Preneel B Towards measuring anonymity Proceedings of the 2nd international conference on Privacy enhancing technologies, (54-68)
  3352. Reznik Y and Szpankowski W Improved Behaviour of Tries by the "Symmetrization" of the Source Proceedings of the Data Compression Conference
  3353. Drmota M, Hwang H and Szpankowski W Precise Average Redundancy Of An Idealized Arithmetic Coding Proceedings of the Data Compression Conference
  3354. Kochman Y and Zamir R Adaptive Parametric Vector Quantization by Natural Type Selection Proceedings of the Data Compression Conference
  3355. Li J A Source Coding Approach to Classification by Vector Quantization and the Principle of Minimum Description Length Proceedings of the Data Compression Conference
  3356. Puri R, Ramchandran K and Pradhan S n-Channel Multiple Descriptions Proceedings of the Data Compression Conference
  3357. Samengo I (2002). Information loss in an optimal maximum likelihood decoding, Neural Computation, 14:4, (771-779), Online publication date: 1-Apr-2002.
  3358. Schumacher B and Westmoreland M (2002). Approximate Quantum Error Correction, Quantum Information Processing, 1:1/2, (5-12), Online publication date: 1-Apr-2002.
  3359. Liu H and Motoda H (2002). On Issues of Instance Selection, Data Mining and Knowledge Discovery, 6:2, (115-130), Online publication date: 1-Apr-2002.
  3360. Cronen-Townsend S and Croft W Quantifying query ambiguity Proceedings of the second international conference on Human Language Technology Research, (104-109)
  3361. ACM
    Kim H and Lee S An effective document clustering method using user-adaptable distance metrics Proceedings of the 2002 ACM symposium on Applied computing, (16-20)
  3362. Bousquet O and Elisseeff A (2002). Stability and generalization, The Journal of Machine Learning Research, 2, (499-526), Online publication date: 1-Mar-2002.
  3363. Tung T and Yao K (2002). Channel estimation and optimal power allocation for a multiple-antenna OFDM system, EURASIP Journal on Advances in Signal Processing, 2002:3, (330-339), Online publication date: 1-Mar-2002.
  3364. Grant A (2002). Rayleigh fading multi-antenna channels, EURASIP Journal on Advances in Signal Processing, 2002:3, (316-329), Online publication date: 1-Mar-2002.
  3365. Figueiredo M and Jain A (2002). Unsupervised Learning of Finite Mixture Models, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:3, (381-396), Online publication date: 1-Mar-2002.
  3366. Vinokourov A and Girolami M (2002). A Probabilistic Framework for the Hierarchic Organisation and Classification of Document Collections, Journal of Intelligent Information Systems, 18:2-3, (153-172), Online publication date: 1-Mar-2002.
  3367. Ryabko B and Topsøe F (2002). On Asymptotically Optimal Methods of Prediction and Adaptive Coding for Markov Sources, Journal of Complexity, 18:1, (224-241), Online publication date: 1-Mar-2002.
  3368. Harris S, Sawhill B, Wuensche A and Kauffman S (2002). A model of transcriptional regulatory networks based on biases in the observed regulation rules, Complexity, 7:4, (23-40), Online publication date: 1-Mar-2002.
  3369. Laflamme R, Cory D, Negrevergne C and Viola L (2002). NMR quantum information processing and entanglement, Quantum Information & Computation, 2:2, (166-176), Online publication date: 1-Feb-2002.
  3370. Campisi P, Kundur D, Hatzinakos D and Neri A (2002). Compressive data hiding, EURASIP Journal on Advances in Signal Processing, 2002:2, (152-163), Online publication date: 1-Feb-2002.
  3371. Gokcay E and Principe J (2002). Information Theoretic Clustering, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:2, (158-171), Online publication date: 1-Feb-2002.
  3372. Denzler J and Brown C (2002). Information Theoretic Sensor Data Selection for Active Object Recognition and State Estimation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:2, (145-157), Online publication date: 1-Feb-2002.
  3373. Buchsbaum A, Fowler G and Giancarlo R Improving table compression with combinatorial optimization Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, (213-222)
  3374. Fisher J and Darrell T Information-theoretic fusion for multimodal interfaces Multimodal interface for human-machine communication, (219-237)
  3375. Ragg T (2002). Bayesian learning and evolutionary parameter optimization, AI Communications, 15:1, (61-74), Online publication date: 1-Jan-2002.
  3376. Tung T and Yao K (2002). Channel estimation and optimal power allocation for a multiple-antenna OFDM system, EURASIP Journal on Advances in Signal Processing, 2002:1, (330-339), Online publication date: 1-Jan-2002.
  3377. Grant A (2002). Rayleigh fading multi-antenna channels, EURASIP Journal on Advances in Signal Processing, 2002:1, (316-329), Online publication date: 1-Jan-2002.
  3378. Campisi P, Kundur D, Hatzinakos D and Neri A (2002). Compressive data hiding, EURASIP Journal on Advances in Signal Processing, 2002:1, (152-163), Online publication date: 1-Jan-2002.
  3379. Ripeanu M, Iamnitchi A and Foster I (2002). Mapping the Gnutella Network, IEEE Internet Computing, 6:1, (50-57), Online publication date: 1-Jan-2002.
  3380. Yang M, Kriegman D and Ahuja N (2002). Detecting Faces in Images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:1, (34-58), Online publication date: 1-Jan-2002.
  3381. Elomaa T and Rousu J (2002). Linear-Time Preprocessing in Optimal Numerical Range Partitioning, Journal of Intelligent Information Systems, 18:1, (55-70), Online publication date: 1-Jan-2002.
  3382. Greenspan H, Goldberger J and Ridel L (2001). A continuous probabilistic framework for image matching, Computer Vision and Image Understanding, 84:3, (384-406), Online publication date: 1-Dec-2001.
  3383. ACM
    Zhang Z, Wu Y, Shan Y and Shafer S Visual panel Proceedings of the 2001 workshop on Perceptive user interfaces, (1-8)
  3384. ACM
    Fisher J and Darrell T Signal level fusion for multimodal perceptual user interface Proceedings of the 2001 workshop on Perceptive user interfaces, (1-7)
  3385. Maimon O and Rokach L Data mining by attribute decomposition with semiconductor manufacturing case study Data mining for design and manufacturing, (311-336)
  3386. Last M and Kandel A Data mining for process and quality control in the semiconductor industry Data mining for design and manufacturing, (207-234)
  3387. Daugman J (2001). Statistical Richness of Visual Phase Information, International Journal of Computer Vision, 45:1, (25-38), Online publication date: 31-Oct-2001.
  3388. Mansour Y and Schain M (2001). Learning with Maximum-Entropy Distributions, Machine Language, 45:2, (123-145), Online publication date: 18-Oct-2001.
  3389. ACM
    Zhai C and Lafferty J Model-based feedback in the language modeling approach to information retrieval Proceedings of the tenth international conference on Information and knowledge management, (403-410)
  3390. ACM
    Chen T and Chen T A framework for optimal blind watermark detection Proceedings of the 2001 workshop on Multimedia and security: new challenges, (11-14)
  3391. Kundur D (2001). Watermarking with Diversity, IEEE MultiMedia, 8:4, (46-52), Online publication date: 1-Oct-2001.
  3392. Sarawagi S (2001). iDiff, Data Mining and Knowledge Discovery, 5:4, (255-276), Online publication date: 1-Oct-2001.
  3393. van Rooy R Conversational implicatures Proceedings of the Second SIGdial Workshop on Discourse and Dialogue - Volume 16, (1-10)
  3394. ACM
    Chakrabarti S, Joshi M and Tawde V Enhanced topic distillation using text, markup tags, and hyperlinks Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval, (208-216)
  3395. ACM
    Bekkerman R, El-Yaniv R, Tishby N and Winter Y On feature distributional clustering for text categorization Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval, (146-153)
  3396. ACM
    Jin R, Falusos C and Hauptmann A Meta-scoring Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval, (83-89)
  3397. Langseth H and Bangsø O (2001). Parameter Learning in Object-Oriented Bayesian Networks, Annals of Mathematics and Artificial Intelligence, 32:1-4, (221-243), Online publication date: 27-Aug-2001.
  3398. Lafferty J and Wasserman L Iterative Markov chain Monte Carlo computation of reference priors and minimax risk Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence, (293-300)
  3399. Friedman N, Mosenzon O, Slonim N and Tishby N Multivariate information bottleneck Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence, (152-161)
  3400. El-Hay T and Friedman N Incorporating expressive graphical models in variational approximations Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence, (136-143)
  3401. Kabán A and Girolami M (2001). A Combined Latent Class and Trait Model for the Analysis and Visualization of Discrete Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:8, (859-872), Online publication date: 1-Aug-2001.
  3402. van Rooy R Relevance of communicative acts Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge, (83-96)
  3403. Ferret O, Grau B and Jardino M A cross-comparison of two clustering methods Proceedings of the workshop on Evaluation for Language and Dialogue Systems - Volume 9, (1-8)
  3404. Clark A Unsupervised induction of stochastic context-free grammars using distributional clustering Proceedings of the 2001 workshop on Computational Natural Language Learning - Volume 7, (1-8)
  3405. ACM
    Klauck H, Nayak A, Ta-Shma A and Zuckerman D Interaction in quantum communication and the complexity of set disjointness Proceedings of the thirty-third annual ACM symposium on Theory of computing, (124-133)
  3406. ACM
    Thorup M and Zwick U Compact routing schemes Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures, (1-10)
  3407. Schölkopf B, Platt J, Shawe-Taylor J, Smola A and Williamson R (2001). Estimating the Support of a High-Dimensional Distribution, Neural Computation, 13:7, (1443-1471), Online publication date: 1-Jul-2001.
  3408. Dubuc B and Zucker S (2001). Complexity, Confusion, and Perceptual Grouping. Part II, Journal of Mathematical Imaging and Vision, 15:1-2, (83-116), Online publication date: 1-Jul-2001.
  3409. Arbel T and Ferrie F (2001). On the Sequential Accumulation of Evidence, International Journal of Computer Vision, 43:3, (205-230), Online publication date: 1-Jul-2001.
  3410. Callari F and Ferrie F (2001). Active Object Recognition, International Journal of Computer Vision, 43:3, (189-204), Online publication date: 1-Jul-2001.
  3411. Carrasco R, Oncina J and Calera-Rubio J (2001). Stochastic Inference of Regular Tree Languages, Machine Language, 44:1-2, (185-197), Online publication date: 1-Jul-2001.
  3412. ACM
    Suh G, Devadas S and Rudolph L Analytical cache models with applications to cache partitioning Proceedings of the 15th international conference on Supercomputing, (1-12)
  3413. Jha S, Tan K and Maxion R Markov Chains, Classifiers, and Intrusion Detection Proceedings of the 14th IEEE workshop on Computer Security Foundations
  3414. Roark B (2001). Probabilistic top-down parsing and language modeling, Computational Linguistics, 27:2, (249-276), Online publication date: 1-Jun-2001.
  3415. ACM
    Getoor L, Taskar B and Koller D (2001). Selectivity estimation using probabilistic models, ACM SIGMOD Record, 30:2, (461-472), Online publication date: 1-Jun-2001.
  3416. ACM
    Bohannon P, Mcllroy P and Rastogi R (2001). Main-memory index structures with fixed-size partial keys, ACM SIGMOD Record, 30:2, (163-174), Online publication date: 1-Jun-2001.
  3417. Khoshgoftaar T and Allen E (2001). Empirical Assessment of a Software Metric, Software Quality Journal, 9:2, (99-112), Online publication date: 1-Jun-2001.
  3418. Handley H and Levis A (2001). A Model to Evaluate the Effect of Organizational Adaptation, Computational & Mathematical Organization Theory, 7:1, (5-44), Online publication date: 1-Jun-2001.
  3419. Cesa-Bianchi N and Lugosi G (2001). Worst-Case Bounds for the Logarithmic Loss of Predictors, Machine Language, 43:3, (247-264), Online publication date: 1-Jun-2001.
  3420. Soto A and Khosla P Adaptive agent based system for state estimation using dynamic multidimensional information sources Proceedings of the 2nd international conference on Self-adaptive software: applications, (66-83)
  3421. ACM
    Getoor L, Taskar B and Koller D Selectivity estimation using probabilistic models Proceedings of the 2001 ACM SIGMOD international conference on Management of data, (461-472)
  3422. ACM
    Bohannon P, Mcllroy P and Rastogi R Main-memory index structures with fixed-size partial keys Proceedings of the 2001 ACM SIGMOD international conference on Management of data, (163-174)
  3423. ACM
    Chakrabarti S Integrating the document object model with hyperlinks for enhanced topic distillation and information extraction Proceedings of the 10th international conference on World Wide Web, (211-220)
  3424. Desolneux A, Moisan L and Morel J (2001). Edge Detection by Helmholtz Principle, Journal of Mathematical Imaging and Vision, 14:3, (271-284), Online publication date: 1-May-2001.
  3425. ACM
    Ben-Dor A, Friedman N and Yakhini Z Class discovery in gene expression data Proceedings of the fifth annual international conference on Computational biology, (31-38)
  3426. ACM
    Barash Y and Friedman N Context-specific Bayesian clustering for gene expression data Proceedings of the fifth annual international conference on Computational biology, (12-21)
  3427. Hyvärinen A (2001). Complexity Pursuit: Separating Interesting Components from Time Series, Neural Computation, 13:4, (883-898), Online publication date: 1-Apr-2001.
  3428. Balasubramanian V, Kimber D and Berry M (2001). Metabolically Efficient Information Processing, Neural Computation, 13:4, (799-815), Online publication date: 1-Apr-2001.
  3429. Bar-Joseph Z, El-Yaniv R, Lischinski D and Werman M (2001). Texture Mixing and Texture Movie Synthesis Using Statistical Learning, IEEE Transactions on Visualization and Computer Graphics, 7:2, (120-135), Online publication date: 1-Apr-2001.
  3430. Dubuc B and Zucker S (2001). Complexity, Confusion, and Perceptual Grouping. Part II, International Journal of Computer Vision, 42:1-2, (83-115), Online publication date: 1-Apr-2001.
  3431. Pradhan S and Ramchandran K Enhancing Analog Image Transmission Systems Using Digital Side Information Proceedings of the Data Compression Conference
  3432. Rizzo F and Storer J Overlap in Adaptive Vector Quantization Proceedings of the Data Compression Conference
  3433. Chen B and Wornell G (2001). Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia, Journal of VLSI Signal Processing Systems, 27:1-2, (7-33), Online publication date: 1-Feb-2001.
  3434. Podolsky M, Mccanne S and Vetterli M (2001). Soft ARQ for Layered Streaming Media, Journal of VLSI Signal Processing Systems, 27:1-2, (81-97), Online publication date: 1-Feb-2001.
  3435. Pandurangan G and Upfal E Can entropy characterize performance of online algorithms? Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, (727-734)
  3436. Elomaa T and Rousu J (2001). On the Computational Complexity of Optimal Multisplitting, Fundamenta Informaticae, 47:1-2, (35-52), Online publication date: 1-Jan-2001.
  3437. Yuille A, Coughlan J, Wu Y and Zhu S (2001). Order Parameters for Detecting Target Curves in Images, International Journal of Computer Vision, 41:1-2, (9-33), Online publication date: 1-Jan-2001.
  3438. ACM
    Koudas N Space efficient bitmap indexing Proceedings of the ninth international conference on Information and knowledge management, (194-201)
  3439. ACM
    Alturki F and Mersereau R Secure high data embedding rate for steganographic application Proceedings of the 2000 ACM workshops on Multimedia, (131-134)
  3440. Rubner Y, Tomasi C and Guibas L (2000). The Earth Mover's Distance as a Metric for Image Retrieval, International Journal of Computer Vision, 40:2, (99-121), Online publication date: 1-Nov-2000.
  3441. Dai J (2000). The Scheduling to Achieve Optimized Performance of Randomly Addressed Polling Protocol, Wireless Personal Communications: An International Journal, 15:2, (161-179), Online publication date: 1-Nov-2000.
  3442. Bell D and Wang H (2000). A Formalism for Relevance and Its Application in Feature Subset Selection, Machine Language, 41:2, (175-195), Online publication date: 1-Nov-2000.
  3443. ACM
    Zhu L, Zhang A, Rao A and Srihari R Keyblock Proceedings of the eighth ACM international conference on Multimedia, (157-166)
  3444. ACM
    Chou J, Pradhan S and Ramchandran K A robust blind watermarking scheme based on distributed source coding principles Proceedings of the eighth ACM international conference on Multimedia, (49-56)
  3445. Korhonen A Using semantically motivated estimates to help subcategorization acquisition Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 13, (216-223)
  3446. Hwa R Sample selection for statistical grammar induction Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 13, (45-52)
  3447. Li H and Yamanishi K Topic analysis using a finite mixture model Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 13, (35-44)
  3448. Carvalho D and Freitas A A Genetic Algorithm-Based Solution for the Problem of Small Disjuncts Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, (345-352)
  3449. Schechner Y, Kiryati N and Basri R (2000). Separation of Transparent Layers using Focus, International Journal of Computer Vision, 39:1, (25-39), Online publication date: 31-Aug-2000.
  3450. Burgi P, Yuille A and Grzywacz N (2000). Probabilistic Motion Estimation Based on Temporal Coherence, Neural Computation, 12:8, (1839-1867), Online publication date: 1-Aug-2000.
  3451. ACM
    Becher J, Berkhin P and Freeman E Automating exploratory data analysis for efficient data mining Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, (424-429)
  3452. Gómez-Lopera J, Martínez-Aroza J, Robles-Pérez A and Román-Roldán R (2000). An Analysis of Edge Detection by Using the Jensen-Shannon Divergence, Journal of Mathematical Imaging and Vision, 13:1, (35-56), Online publication date: 1-Aug-2000.
  3453. Principe J, Xu D, Zhao Q and Fisher J (2000). Learning from Examples with Information Theoretic Criteria, Journal of VLSI Signal Processing Systems, 26:1-2, (61-77), Online publication date: 1-Aug-2000.
  3454. Lin C and Hovy E The automated acquisition of topic signatures for text summarization Proceedings of the 18th conference on Computational linguistics - Volume 1, (495-501)
  3455. Cemgil A, Kappen B and Desain P (2000). Rhythm Quantization for Transcription, Computer Music Journal, 24:2, (60-76), Online publication date: 1-Jul-2000.
  3456. ACM
    Dumais S and Chen H Hierarchical classification of Web content Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, (256-263)
  3457. ACM
    Slonim N and Tishby N Document clustering using word clusters via the information bottleneck method Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, (208-215)
  3458. Zhang B (2000). Bayesian Methods for Efficient Genetic Programming, Genetic Programming and Evolvable Machines, 1:3, (217-242), Online publication date: 1-Jul-2000.
  3459. Schuurmans D and Southey F Monte Carlo inference via greedy importance sampling Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (523-532)
  3460. Grünwald P Maximum entropy and the glasses you are looking through Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (238-246)
  3461. Bilmes J Dynamic Bayesian multinets Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (38-45)
  3462. Afrati F, Leiβ H and Michel de Rougemont Definability and Compression Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science
  3463. ACM
    Koksal C, Kassab H and Balakrishnan H An analysis of short-term fairness in wireless media access protocols (poster session) Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (118-119)
  3464. ACM
    Koksal C, Kassab H and Balakrishnan H (2000). An analysis of short-term fairness in wireless media access protocols (poster session), ACM SIGMETRICS Performance Evaluation Review, 28:1, (118-119), Online publication date: 1-Jun-2000.
  3465. Maurer U and Wolf S Information-theoretic key agreement Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (351-368)
  3466. Di Crescenzo G, Malkin T and Ostrovsky R Single database private information retrieval implies oblivious transfer Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (122-138)
  3467. ACM
    Dalkilic M and Roberston E Information dependencies Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (245-253)
  3468. Ibrahim N and Kaleh G (2000). Iterative Decoding and Soft Interference Cancellation for the Gaussian Multiple Access Channel, Wireless Personal Communications: An International Journal, 13:1-2, (15-25), Online publication date: 1-May-2000.
  3469. Nigam K, McCallum A, Thrun S and Mitchell T (2000). Text Classification from Labeled and Unlabeled Documents using EM, Machine Language, 39:2-3, (103-134), Online publication date: 1-May-2000.
  3470. Màrquez L, Padró L and Rodríguez H (2000). A Machine Learning Approach to POS Tagging, Machine Language, 39:1, (59-91), Online publication date: 1-Apr-2000.
  3471. Servetto S Lattice Quantization with Side Information Proceedings of the Conference on Data Compression
  3472. Pradhan S and Ramchandran K Distributed Source Coding Proceedings of the Conference on Data Compression
  3473. Reznik Y and Szpankowski W On the Average Redundancy Rate of the Lempel-Ziv Code with K-Error Protocol Proceedings of the Conference on Data Compression
  3474. Rajwan D and Feder M Universal Finite Memory Machines for Coding Binary Sequences Proceedings of the Conference on Data Compression
  3475. Kundur D Implications for High Capacity Data Hiding in Presence of Lossy Compression Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
  3476. ACM
    Sundararajan V and Parhi K Reducing bus transition activity by limited weight coding with codeword slimming Proceedings of the 10th Great Lakes symposium on VLSI, (13-16)
  3477. Yuille A and Coughlan J (2000). Fundamental Limits of Bayesian Inference, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22:2, (160-173), Online publication date: 1-Feb-2000.
  3478. ACM
    Sundararajan V and Parhi K Data transmission over a bus with peak-limited transition activity Proceedings of the 2000 Asia and South Pacific Design Automation Conference, (221-224)
  3479. ACM
    Chakrabarti S (2000). Data mining for hypertext, ACM SIGKDD Explorations Newsletter, 1:2, (1-11), Online publication date: 1-Jan-2000.
  3480. Bookstein A, Klein S and Raita T (2000). Simple Bayesian Model for Bitmap Compression, Information Retrieval, 1:4, (315-328), Online publication date: 1-Jan-2000.
  3481. Kontkanen P, Myllymäki P, Silander T, Tirri H and Grünwald P (2000). On predictive distributions and Bayesian networks, Statistics and Computing, 10:1, (39-54), Online publication date: 1-Jan-2000.
  3482. Smyth P (2000). Model selection for probabilistic clustering using cross-validatedlikelihood, Statistics and Computing, 10:1, (63-72), Online publication date: 1-Jan-2000.
  3483. Hsu W, Ray S and Wilkins D (2000). A Multistrategy Approach to Classifier Learning from Time Series, Machine Language, 38:1-2, (213-236), Online publication date: 1-Jan-2000.
  3484. Shpak M and Wagner G (1999). Asymmetry of configuration space induced by unequal crossover, Artificial Life, 6:1, (25-43), Online publication date: 1-Dec-1999.
  3485. Srivastava A, Su R and Weigend A (1999). Data Mining for Features Using Scale-Sensitive Gated Experts, IEEE Transactions on Pattern Analysis and Machine Intelligence, 21:12, (1268-1279), Online publication date: 1-Dec-1999.
  3486. Juntti M (1999). Performance of Multiuser Detection in Multirate CDMA Systems, Wireless Personal Communications: An International Journal, 11:3, (293-311), Online publication date: 1-Dec-1999.
  3487. Domingos P (1999). The Role of Occam‘s Razor in Knowledge Discovery, Data Mining and Knowledge Discovery, 3:4, (409-425), Online publication date: 1-Dec-1999.
  3488. Rayside D, Mamas E and Hons E Compact Java binaries for embedded systems Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research
  3489. Manwani A and Koch C (1999). Detecting and Estimating Signals in Noisy Cable Structures, II: Information Theoretical Analysis, Neural Computation, 11:8, (1831-1873), Online publication date: 1-Nov-1999.
  3490. Ferraro M, Boccignone G and Caelli T (1999). On the Representation of Image Structures via Scale Space Entropy Conditions, IEEE Transactions on Pattern Analysis and Machine Intelligence, 21:11, (1199-1203), Online publication date: 1-Nov-1999.
  3491. Martignon L and Schmitt M (1999). Simplicity and Robustness of Fast and Frugal Heuristics, Minds and Machines, 9:4, (565-593), Online publication date: 1-Nov-1999.
  3492. Jordan M, Ghahramani Z, Jaakkola T and Saul L (1999). An Introduction to Variational Methods for Graphical Models, Machine Language, 37:2, (183-233), Online publication date: 1-Nov-1999.
  3493. Nayak A Optimal Lower Bounds for Quantum Automata and Random Access Codes Proceedings of the 40th Annual Symposium on Foundations of Computer Science
  3494. ACM
    Raman S and McCanne S (1999). A model, analysis, and protocol framework for soft state-based communication, ACM SIGCOMM Computer Communication Review, 29:4, (15-25), Online publication date: 1-Oct-1999.
  3495. Lee H and Kim J (1999). An HMM-Based Threshold Model Approach for Gesture Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 21:10, (961-973), Online publication date: 1-Oct-1999.
  3496. Sarawagi S Explaining Differences in Multidimensional Aggregates Proceedings of the 25th International Conference on Very Large Data Bases, (42-53)
  3497. Cheung D and Xiao Y (1999). Effect of Data Distribution in Parallel Mining of Associations, Data Mining and Knowledge Discovery, 3:3, (291-314), Online publication date: 1-Sep-1999.
  3498. ACM
    Raman S and McCanne S A model, analysis, and protocol framework for soft state-based communication Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (15-25)
  3499. Jermyn I, Mayer A, Monrose F, Reiter M and Rubin A The design and analysis of graphical passwords Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (1-1)
  3500. ACM
    Bhattacharya A and Das S LeZi-update Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, (1-12)
  3501. ACM
    Cheng C, Fu A and Zhang Y Entropy-based subspace clustering for mining numerical data Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, (84-93)
  3502. Iyengar V, Chakrabarty K and Murray B (1999). Deterministic Built-in Pattern Generation for Sequential Circuits, Journal of Electronic Testing: Theory and Applications, 15:1-2, (97-114), Online publication date: 1-Aug-1999.
  3503. Pavlovic V, Frey B and Huang T Variational learning in mixed-state dynamic graphical models Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (522-530)
  3504. Monti S and Cooper G A Bayesian network classifier that combines a finite mixture model and a naïve bayes model Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (447-456)
  3505. McAllester D and Singh S Approximate planning for factored POMDPs using belief state simplification Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (409-416)
  3506. Koller D, Lerner U and Angelov D A general algorithm for approximate inference and its application to hybrid bayes nets Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (324-333)
  3507. Friedman N, Nachman I and Peér D Learning bayesian network structure from massive datasets Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (206-215)
  3508. Dasgupta S Learning polytrees Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (134-141)
  3509. ACM
    Allenberg C Individual sequence prediction—upper bounds and application for complexity Proceedings of the twelfth annual conference on Computational learning theory, (233-242)
  3510. ACM
    Grünwald P Viewing all models as “probabilistic” Proceedings of the twelfth annual conference on Computational learning theory, (171-182)
  3511. ACM
    Freund Y and Mansour Y Estimating a mixture of two product distributions Proceedings of the twelfth annual conference on Computational learning theory, (53-62)
  3512. Winter A and Nastar C Differential Feature Distribution Maps for Image Segmentation and Region Queries in Image Databases Proceedings of the IEEE Workshop on Content-Based Access of Image and Video Libraries
  3513. Feixas M, del Acebo E, Bekaerty P and Sbert M Information theory tools for scene discretization Proceedings of the 10th Eurographics conference on Rendering, (95-106)
  3514. Lee L Measures of distributional similarity Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, (25-32)
  3515. ACM
    Manku G, Rajagopalan S and Lindsay B Random sampling techniques for space efficient online computation of order statistics of large datasets Proceedings of the 1999 ACM SIGMOD international conference on Management of data, (251-262)
  3516. ACM
    Manku G, Rajagopalan S and Lindsay B (1999). Random sampling techniques for space efficient online computation of order statistics of large datasets, ACM SIGMOD Record, 28:2, (251-262), Online publication date: 1-Jun-1999.
  3517. Deco G and Schürmann B (1999). Spatiaotemporal coding in the cortex, Neural Computation, 11:4, (919-934), Online publication date: 15-May-1999.
  3518. Attias H (1999). Independent factor analysis, Neural Computation, 11:4, (803-851), Online publication date: 15-May-1999.
  3519. ACM
    Sudan M, Trevisan L and Vadhan S Pseudorandom generators without the XOR Lemma (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (537-546)
  3520. ACM
    Ambainis A, Nayak A, Ta-Shma A and Vazirani U Dense quantum coding and a lower bound for 1-way quantum automata Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (376-383)
  3521. ACM
    Schulman L and Vazirani U Molecular scale heat engines and scalable quantum computation Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (322-329)
  3522. ACM
    Schulman L and Vazirani V Majorizing estimators and the approximation of #P-complete problems Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (288-294)
  3523. ACM
    Beimel A, Ishai Y, Kushilevitz E and Malkin T One-way functions are essential for single-server private information retrieval Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (89-98)
  3524. Chi Z (1999). Statistical properties of probabilistic context-free grammars, Computational Linguistics, 25:1, (131-160), Online publication date: 1-Mar-1999.
  3525. Wang H, Bell D and Murtagh F (1999). Axiomatic Approach to Feature Subset Selection Based on Relevance, IEEE Transactions on Pattern Analysis and Machine Intelligence, 21:3, (271-277), Online publication date: 1-Mar-1999.
  3526. ACM
    Abadjev V, del Rosario M, Lebedev A, Migdal A and Paskhaver V MetaStream Proceedings of the fourth symposium on Virtual reality modeling language, (53-62)
  3527. Dagan I, Lee L and Pereira F (1999). Similarity-Based Models of Word Cooccurrence Probabilities, Machine Language, 34:1-3, (43-69), Online publication date: 1-Feb-1999.
  3528. Wolf S Unconditional Security in Cryptography Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, (217-250)
  3529. Dijk M, Jackson W and Martin K (1998). A General Decomposition Construction for Incomplete SecretSharing Schemes, Designs, Codes and Cryptography, 15:3, (301-321), Online publication date: 1-Dec-1998.
  3530. Miller G and Horn D (1998). Probability density estimation using entropy maximization, Neural Computation, 10:7, (1925-1938), Online publication date: 1-Oct-1998.
  3531. Horn D and Levanda S (1998). Fast temporal encoding and decoding with spiking neurons, Neural Computation, 10:7, (1705-1720), Online publication date: 1-Oct-1998.
  3532. Sarpeshkar R (1998). Analog versus digital, Neural Computation, 10:7, (1601-1638), Online publication date: 1-Oct-1998.
  3533. McMahon J and Smith F (1998). A Review of Statistical Language Processing Techniques, Artificial Intelligence Review, 12:5, (347-391), Online publication date: 1-Oct-1998.
  3534. Oliver J, Roush T, Gazis P, Buntine W, Baxter R and Waterhouse S Analysing rock samples for the mars lander Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, (299-303)
  3535. Kohavi R and Sommerfield D Targeting business users with decision table classifiers Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, (249-253)
  3536. Domingos P Occam's two razors Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, (37-43)
  3537. Lyon C and Hewitt J The value of minimal prosodic information in spoken language corpora Proceedings of the Workshop on Partially Automated Techniques for Transcribing Naturally Occurring Continuous Speech, (40-48)
  3538. Attias H and Schreiner C (1998). Blind source separation and deconvolution, Neural Computation, 10:6, (1373-1424), Online publication date: 15-Aug-1998.
  3539. ACM
    Baker L and McCallum A Distributional clustering of words for text classification Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval, (96-103)
  3540. Rovatti R, Borgatti M and Guerrieri R (1998). A Geometric Approach to Maximum-Speed n-Dimensional Continuous Linear Interpolation in Rectangular Grids, IEEE Transactions on Computers, 47:8, (894-899), Online publication date: 1-Aug-1998.
  3541. Herbster M and Warmuth M (1998). Tracking the Best Expert, Machine Language, 32:2, (151-178), Online publication date: 1-Aug-1998.
  3542. Singer Y Switching portfolios Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (488-495)
  3543. Kearns M and Saul L Large deviation methods for approximate probabilistic inference Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (311-319)
  3544. Grünwald P, Kontkanen P, Myllymäki P, Silander T and Tirri H Minimum encoding approaches for predictive modeling Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (183-192)
  3545. Boyen X and Koller D Tractable inference for complex stochastic processes Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (33-42)
  3546. ACM
    Gentile C and Helmbold D Improved lower bounds for learning from noisy examples Proceedings of the eleventh annual conference on Computational learning theory, (104-115)
  3547. Fine S, Singer Y and Tishby N (1998). The Hierarchical Hidden Markov Model, Machine Language, 32:1, (41-62), Online publication date: 1-Jul-1998.
  3548. ACM
    Sadakane K, Imai H, Onishi K, Inaba M, Takeuchi F and Imai K Voronoi diagrams by divergences with additive weights Proceedings of the fourteenth annual symposium on Computational geometry, (403-404)
  3549. Feldman R, Dagan I and Hirsh H (1998). Mining Text Using Keyword Distributions, Journal of Intelligent Information Systems, 10:3, (281-300), Online publication date: 1-Jun-1998.
  3550. Scharstein D and Szeliski R (1998). Stereo Matching with Nonlinear Diffusion, International Journal of Computer Vision, 28:2, (155-174), Online publication date: 1-Jun-1998.
  3551. ACM
    Sahami M, Yusufali S and Baldonaldo M SONIA Proceedings of the third ACM conference on Digital libraries, (200-209)
  3552. Wang Y, Adali T, Lau C and Kung S (1998). Quantitative Analysis of MR Brain Image Sequences by Adaptive Self-Organizing Finite Mixtures, Journal of VLSI Signal Processing Systems, 18:3, (219-239), Online publication date: 1-Apr-1998.
  3553. ACM
    Agarwal P and Bafna V Detecting non-adjoining correlations with signals in DNA Proceedings of the second annual international conference on Computational molecular biology, (2-8)
  3554. Ziv A and Bruck J (1997). Performance Optimization of Checkpointing Schemes with Task Duplication, IEEE Transactions on Computers, 46:12, (1381-1386), Online publication date: 1-Dec-1997.
  3555. Ramprasad S, Shanbhag N and Hajj I Achievable bounds on signal transition activity Proceedings of the 1997 IEEE/ACM international conference on Computer-aided design, (126-129)
  3556. Al Jabri A (1997). A symmetric version of the McEliece public-key cryptosystem, International Journal of Network Management, 7:6, (316-323), Online publication date: 1-Nov-1997.
  3557. ACM
    Eleftheriadis A Flavor Proceedings of the fifth ACM international conference on Multimedia, (1-9)
  3558. Friedman N, Geiger D and Goldszmidt M (1997). Bayesian Network Classifiers, Machine Language, 29:2-3, (131-163), Online publication date: 1-Nov-1997.
  3559. Ghahramani Z and Jordan M (1997). Factorial Hidden Markov Models, Machine Language, 29:2-3, (245-273), Online publication date: 1-Nov-1997.
  3560. Dasgupta S (1997). The Sample Complexity of Learning Fixed-Structure Bayesian Networks, Machine Language, 29:2-3, (165-180), Online publication date: 1-Nov-1997.
  3561. Chakrabarti S, Dom B, Agrawal R and Raghavan P Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases Proceedings of the 23rd International Conference on Very Large Data Bases, (446-455)
  3562. Kozlov A and Koller D Nonuniform dynamic discretization in hybrid networks Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence, (314-325)
  3563. Kearns M, Mansour Y and Ng A An information-theoretic analysis of hard and soft assignment methods for clustering Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence, (282-293)
  3564. Bauer E, Koller D and Singer Y Update rules for parameter estimation in Bayesian networks Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence, (3-13)
  3565. ACM
    Onishi K and Imai H Voronoi diagram in statistical parametric space by Kullback-Leibler divergence Proceedings of the thirteenth annual symposium on Computational geometry, (463-465)
  3566. Beeferman D, Berger A and Lafferty J A model of lexical attraction and repulsion Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (373-380)
  3567. Màrquez L and Padró L A flexible POS tagger using an automatically acquired language model Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (238-245)
  3568. Haruno M and Matsumoto Y Mistake-driven mixture of hierarchical tag context trees Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (230-237)
  3569. Lin D Using syntactic dependency as local context to resolve word sense ambiguity Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (64-71)
  3570. Dagan I, Lee L and Pereira F Similarity-based methods for word sense disambiguation Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (56-63)
  3571. ACM
    Angluin D and Csűrös M Learning Markov chains with variable memory length from noisy output Proceedings of the tenth annual conference on Computational learning theory, (298-308)
  3572. ACM
    Ergün F, Kumar S and Rubinfeld R Learning distributions from random walks Proceedings of the tenth annual conference on Computational learning theory, (243-249)
  3573. ACM
    Mansour Y and Schain M Learning with maximum-entropy distributions Proceedings of the tenth annual conference on Computational learning theory, (201-210)
  3574. ACM
    Cesa-Bianchi N Analysis of two gradient-based algorithms for on-line regression Proceedings of the tenth annual conference on Computational learning theory, (163-170)
  3575. ACM
    Kowalczyk A Dense shattering and teaching dimensions for differentiable families (extended abstract) Proceedings of the tenth annual conference on Computational learning theory, (143-151)
  3576. ACM
    Decatur S, Goldreich O and Ron D Computational sample complexity Proceedings of the tenth annual conference on Computational learning theory, (130-142)
  3577. ACM
    Long P On-line evaluation and prediction using linear functions Proceedings of the tenth annual conference on Computational learning theory, (21-31)
  3578. Blundo C, Gaggia A and Stinson D (1997). On the Dealer‘s Randomness Required in Secret Sharing Schemes, Designs, Codes and Cryptography, 11:3, (235-259), Online publication date: 1-Jul-1997.
  3579. Baxter J (1997). A Bayesian/Information Theoretic Model of Learning to Learn viaMultiple Task Sampling, Machine Language, 28:1, (7-39), Online publication date: 1-Jul-1997.
  3580. Cachin C Smooth entropy and Rényi entropy Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (193-208)
  3581. Blundo C, Santis A, Simone R and Vaccaro U (1997). Tight Bounds on the Information Rate of Secret SharingSchemes, Designs, Codes and Cryptography, 11:2, (107-110), Online publication date: 1-May-1997.
  3582. Tresp V, Hollatz J and Ahmad S (1997). Representing Probabilistic Rules with Networks of GaussianBasis Functions, Machine Language, 27:2, (173-200), Online publication date: 1-May-1997.
  3583. Golomb D, Hertz J, Panzeri S, Treves A and Richmond B (1997). How well can we estimate the information carried in neuronal responses from limited samples?, Neural Computation, 9:3, (649-665), Online publication date: 1-Apr-1997.
  3584. ACM
    Khuri S, Stern F and Chiu T Randomness of finite strings Proceedings of the 1997 ACM symposium on Applied computing, (527-531)
  3585. Raphaël F, Olivier B and Daniel C (1997). A Constrained Generative Model Applied to Face Detection, Neural Processing Letters, 5:2, (11-19), Online publication date: 1-Apr-1997.
  3586. Kearns M, Mansour Y, Ng A and Ron D (1997). An Experimental and Theoretical Comparison of Model SelectionMethods, Machine Language, 27:1, (7-50), Online publication date: 1-Apr-1997.
  3587. Utsuro T and Matsumoto Y Learning probabilistic subcategorization preference by identifying case dependencies and optimal noun class generalization level Proceedings of the fifth conference on Applied natural language processing, (364-371)
  3588. Bikel D, Miller S, Schwartz R and Weischedel R Nymble Proceedings of the fifth conference on Applied natural language processing, (194-201)
  3589. Voutilainen A and Padró L Developing a hybrid NP parser Proceedings of the fifth conference on Applied natural language processing, (80-87)
  3590. Surti P, Chao L and Tyagi A Low power FSM design using Huffman-style encoding Proceedings of the 1997 European conference on Design and Test
  3591. Cachin C and Maurer U (1997). Linking information reconciliation and privacy amplification, Journal of Cryptology, 10:2, (97-110), Online publication date: 1-Mar-1997.
  3592. Calvagno G and Rinaldo R (1997). Multiresolution Vector Quantization for Video Coding, Multidimensional Systems and Signal Processing, 8:1-2, (129-150), Online publication date: 14-Feb-1997.
  3593. Wettschereck D, Aha D and Mohri T (1997). A Review and Empirical Evaluation of Feature Weighting Methods for aClass of Lazy Learning Algorithms, Artificial Intelligence Review, 11:1-5, (273-314), Online publication date: 1-Feb-1997.
  3594. ACM
    Zarkesh A, Adibi J, Shahabi C, Sadri R and Shah V Analysis and design of server informative WWW-sites Proceedings of the sixth international conference on Information and knowledge management, (254-261)
  3595. Myung I, Ramamoorti S and Bailey A (1996). Maximum Entropy Aggregation of Expert Predictions, Management Science, 42:10, (1420-1436), Online publication date: 1-Oct-1996.
  3596. Li H and Abe N Clustering words with the MDL principle Proceedings of the 16th conference on Computational linguistics - Volume 1, (4-9)
  3597. Friedman N and Yakhini Z On the sample complexity of learning Bayesian networks Proceedings of the Twelfth international conference on Uncertainty in artificial intelligence, (274-282)
  3598. Friedman N and Goldszmidt M Learning Bayesian networks with local structure Proceedings of the Twelfth international conference on Uncertainty in artificial intelligence, (252-262)
  3599. ACM
    Naor M Evaluation may be easier than generation (extended abstract) Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, (74-83)
  3600. ACM
    Alon N, Matias Y and Szegedy M The space complexity of approximating the frequency moments Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, (20-29)
  3601. Beeferman D The rhythm of lexical stress in prose Proceedings of the 34th annual meeting on Association for Computational Linguistics, (302-309)
  3602. Maes F, Collignon A, Vandermeulen D, Marchal G and Suetens P Multi-Modality Image Registration Maximization of Mutual Information Proceedings of the 1996 Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA '96)
  3603. McMahon J and Smith F (1996). Improving statistical language model performance with automatically generated word hierarchies, Computational Linguistics, 22:2, (217-247), Online publication date: 1-Jun-1996.
  3604. D'haeseleer P An Immunological Approach to Change Detection Proceedings of the 9th IEEE workshop on Computer Security Foundations
  3605. Berger A, Pietra V and Pietra S (1996). A maximum entropy approach to natural language processing, Computational Linguistics, 22:1, (39-71), Online publication date: 1-Mar-1996.
  3606. Smadja F, McKeown K and Hatzivassiloglou V (1996). Translating collocations for bilingual lexicons, Computational Linguistics, 22:1, (1-38), Online publication date: 1-Mar-1996.
  3607. ACM
    Baxter J A Bayesian/information theoretic model of bias learning Proceedings of the ninth annual conference on Computational learning theory, (77-88)
  3608. Fuchs C and Caves C (1995). Mathematical techniques for quantum communication theory, Open Systems & Information Dynamics, 3:3, (345-356), Online publication date: 1-Oct-1995.
  3609. ACM
    Haussler D and Opper M General bounds on the mutual information between a parameter and n conditionally independent observations Proceedings of the eighth annual conference on Computational learning theory, (402-411)
  3610. ACM
    Freund Y and Ron D Learning to model sequences generated by switching distributions Proceedings of the eighth annual conference on Computational learning theory, (41-50)
  3611. ACM
    Kearns M, Mansour Y, Ng A and Ron D An experimental and theoretical comparison of model selection methods Proceedings of the eighth annual conference on Computational learning theory, (21-30)
  3612. Hafner J, Sawhney H, Equitz W, Flickner M and Niblack W (1995). Efficient Color Histogram Indexing for Quadratic Form Distance Functions, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:7, (729-736), Online publication date: 1-Jul-1995.
  3613. Lindenbaum M (1995). Bounds on Shape Recognition Performance, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:7, (666-680), Online publication date: 1-Jul-1995.
  3614. ACM
    Najm F Towards a high-level power estimation capability Proceedings of the 1995 international symposium on Low power design, (87-92)
  3615. Ribas F On learning more appropriate Selectional Restrictions Proceedings of the seventh conference on European chapter of the Association for Computational Linguistics, (112-118)
  3616. Magerman D (1995). Review of "Statistical language learning" by Eugene Charniak. The MIT Press 1993., Computational Linguistics, 21:1, (103-111), Online publication date: 1-Mar-1995.
  3617. ACM
    Danskin J, Albanese A, Davis G and Jensen P Multimedia backroads (panel) Proceedings of the third ACM international conference on Multimedia, (213-214)
  3618. ACM
    Zhang M, Tavares S and Campbell L Information leakage of boolean functions and its relationship to other cryptographic criteria Proceedings of the 2nd ACM Conference on Computer and communications security, (156-165)
  3619. ACM
    Fowler J and Yagel R Lossless compression of volume data Proceedings of the 1994 symposium on Volume visualization, (43-50)
  3620. Carter D Improving language models by clustering training sentences Proceedings of the fourth conference on Applied natural language processing, (59-64)
  3621. Hearst M (1994). A Review of Statistical Language Learning, AI Magazine, 15:3, (88-89), Online publication date: 1-Sep-1994.
  3622. ACM
    Ron D, Singer Y and Tishby N Learning probabilistic automata with variable memory length Proceedings of the seventh annual conference on Computational learning theory, (35-46)
  3623. ACM
    Rajagopalan S and Schulman L A coding theorem for distributed computation Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (790-799)
  3624. ACM
    Jacquet P and Szpankowski W A functional equation often arising in the analysis of algorithms (extended abstract) Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (780-789)
  3625. ACM
    Kearns M, Mansour Y, Ron D, Rubinfeld R, Schapire R and Sellie L On the learnability of discrete distributions Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (273-282)
  3626. Krishnan P and Vitter J Optimal prediction for prefetching in the worst case Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms, (392-401)
  3627. ACM
    Yamanishi K On polynomial-time probably almost discriminative learnability Proceedings of the sixth annual conference on Computational learning theory, (94-100)
  3628. Pereira F, Tishby N and Lee L Distributional clustering of English words Proceedings of the 31st annual meeting on Association for Computational Linguistics, (183-190)
  3629. Church K and Mercer R (1993). Introduction to the special issue on computational linguistics using large corpora, Computational Linguistics, 19:1, (1-24), Online publication date: 1-Mar-1993.
  3630. McIlroy P Optimistic sorting and information theoretic complexity Proceedings of the fourth annual ACM-SIAM symposium on Discrete algorithms, (467-474)
  3631. ACM
    Merhav N and Feder M Universal sequential learning and decision from individual data sequences Proceedings of the fifth annual workshop on Computational learning theory, (413-427)
  3632. ACM
    Yamanishi K Probably almost discriminative learning Proceedings of the fifth annual workshop on Computational learning theory, (164-171)
  3633. Brown P, Pietra V, Mercer R, Pietra S and Lai J (1992). An estimate of an upper bound for the entropy of English, Computational Linguistics, 18:1, (31-40), Online publication date: 1-Mar-1992.
  3634. Awan H and Chou C Demodulation of reaction shift keying signals in molecular communication network with protein kinase receiver circuit 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3635. Daniel Kim Y Properties of faster-than-Nyquist channel matrices and folded-spectrum, and their applications 2016 IEEE Wireless Communications and Networking Conference, (1-7)
  3636. Sezer A and Gezici S Optimal channel switching for average capacity maximization in the presence of switching delays 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3637. Yao L, Mei J, Long H, Zhao L and Zheng K A novel multi-user grouping scheme for downlink non-orthogonal multiple access systems 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3638. Liu J, Xu W, Jin S and Dong X RF-chain constrained multi-pair massive MIMO relaying using hybrid precoding and detection 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3639. Xu Y, Zhao X and Hu F Interference minimization based power allocation for cognitive radio networks with imperfect spectrum sensing 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3640. Banawan K, Ulukus S, Wang P and Henz B Multiband jamming strategies with minimum rate constraints 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  3641. Kan Z, Ton C, McCourt M, Curtis J, Doucette E and Mehta S Mutual Information Based Risk-Aware Active Sensing in an Urban Environment 2015 IEEE International Conference on Systems, Man, and Cybernetics, (1178-1183)
  3642. Zorgui M, Rezki Z and Alouini M On achievable rates of interference and cognitive channels with a relay 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (17-22)
  3643. Cataltepe Z, Ekmekci U, Cataltepe T and Kelebek I Online feature selected semi-supervised decision trees for network intrusion detection NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (1085-1088)
  3644. Camilo M, Moura D and Salles R Combined Interference and Communications Strategy as a Defense Mechanism in Cognitive Radio Military Networks MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (113-118)
  3645. Guan B and Goeckel D Achievable Information-Theoretic Secrecy in the Presence of a Radar MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (476-481)
  3646. Park J and Doherty J A steganographic approach for covert waveform design MILCOM 2016 - 2016 IEEE Military Communications Conference, (180-185)
  3647. Hannon M, Shaung Feng , Hyuck Kwon and Khanh Pham Jamming statistics-dependent frequency hopping MILCOM 2016 - 2016 IEEE Military Communications Conference, (138-143)
  3648. Elmahdy A, El-Keyi A, Mohasseb Y, ElBatt T, Nafie M and Seddik K Asymmetric degrees of freedom of the full-duplex MIMO 3-way channel 2016 IEEE Information Theory Workshop (ITW), (469-473)
  3649. de Kerret P, Gesbert D, Zhang J and Elia P Optimally bridging the gap from delayed to perfect CSIT in the K-user MISO BC 2016 IEEE Information Theory Workshop (ITW), (300-304)
  3650. Watanabe K Constant-width rate-distortion bounds for power distortion measures 2016 IEEE Information Theory Workshop (ITW), (106-110)
  3651. Palzer L and Timo R A lower bound for the rate-distortion function of spike sources that is asymptotically tight 2016 IEEE Information Theory Workshop (ITW), (101-105)
  3652. Spanakis C, Mathioudakis E, Kampanis N, Tsiknakis M and Marias K A new approach in image registration 2016 IEEE International Conference on Imaging Systems and Techniques (IST), (449-453)
  3653. Varasteh M, Simeone O and Gündüz D Joint source-channel coding with one-bit ADC front end 2016 IEEE International Symposium on Information Theory (ISIT), (3062-3066)
  3654. Goldfeld Z, Cuff P and Permuter H Semantic-security capacity for wiretap channels of type II 2016 IEEE International Symposium on Information Theory (ISIT), (2799-2803)
  3655. Li W, Bassi F and Kieffer M Sparse random linear network coding for data compression in WSNs 2016 IEEE International Symposium on Information Theory (ISIT), (2729-2733)
  3656. Tsiligkaridis T Asynchronous decentralized algorithms for the noisy 20 questions problem 2016 IEEE International Symposium on Information Theory (ISIT), (2699-2703)
  3657. Villacrés G and Koch T Wireless networks of bounded capacity 2016 IEEE International Symposium on Information Theory (ISIT), (2584-2588)
  3658. Tanaka T, Johansson K, Oechtering T, Sandberg H and Skoglund M Rate of prefix-free codes in LQG control systems 2016 IEEE International Symposium on Information Theory (ISIT), (2399-2403)
  3659. Yüksel S Stationarity and ergodicity of stochastic non-linear systems controlled over communication channels 2016 IEEE International Symposium on Information Theory (ISIT), (2394-2398)
  3660. Tripathy A and Ramamoorthy A On computation rates for arithmetic sum 2016 IEEE International Symposium on Information Theory (ISIT), (2354-2358)
  3661. Güler B, Gündüz D and Yener A On lossy transmission of correlated sources over a multiple access channel 2016 IEEE International Symposium on Information Theory (ISIT), (2009-2013)
  3662. Murin Y, Kaspi Y, Dabora R and Gündüz D Energy-distortion tradeoff for the gaussian broadcast channel with feedback 2016 IEEE International Symposium on Information Theory (ISIT), (1829-1833)
  3663. de Kerret P and Gesbert D Network MIMO: Transmitters with no CSI can still be very useful 2016 IEEE International Symposium on Information Theory (ISIT), (1466-1470)
  3664. Pichler G, Piantanida P and Matz G Distributed information-theoretic biclustering 2016 IEEE International Symposium on Information Theory (ISIT), (1083-1087)
  3665. Sima J and Chen W Polar codes for broadcast channels with receiver message side information and noncausal state available at the encoder 2016 IEEE International Symposium on Information Theory (ISIT), (993-997)
  3666. Li B, Wei S, Wang Y and Yuan J Chernoff information of bottleneck Gaussian trees 2016 IEEE International Symposium on Information Theory (ISIT), (970-974)
  3667. Huang P, Siegel P and Yaakobi E Performance of flash memories with different binary labelings: A multi-user perspective 2016 IEEE International Symposium on Information Theory (ISIT), (955-959)
  3668. Chen Z, Jaggi S and Langberg M The capacity of online (causal) q-ary error-erasure channels 2016 IEEE International Symposium on Information Theory (ISIT), (915-919)
  3669. Dey B, Jaggi S, Langberg M and Sarwate A A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures 2016 IEEE International Symposium on Information Theory (ISIT), (880-884)
  3670. Abbe E and Sandon C Crossing the KS threshold in the stochastic block model with information theory 2016 IEEE International Symposium on Information Theory (ISIT), (840-844)
  3671. Rioul O, Heuser A, Guilley S and Danger J Inter-class vs. mutual information as side-channel distinguishers 2016 IEEE International Symposium on Information Theory (ISIT), (805-809)
  3672. Koch T and Vazquez-Vilar G A general rate-distortion converse bound for entropy-constrained scalar quantization 2016 IEEE International Symposium on Information Theory (ISIT), (735-739)
  3673. Baccelli F and Woo J On the entropy and mutual information of point processes 2016 IEEE International Symposium on Information Theory (ISIT), (695-699)
  3674. Zhu J, Beirami A and Baron D Performance trade-offs in multi-processor approximate message passing 2016 IEEE International Symposium on Information Theory (ISIT), (680-684)
  3675. Reeves G and Pfister H The replica-symmetric prediction for compressed sensing with Gaussian matrices is exact 2016 IEEE International Symposium on Information Theory (ISIT), (665-669)
  3676. Weinberger N and Shayevitz O On the optimal boolean function for prediction under quadratic loss 2016 IEEE International Symposium on Information Theory (ISIT), (495-499)
  3677. Yang Q and Gündüz D Centralized coded caching for heterogeneous lossy requests 2016 IEEE International Symposium on Information Theory (ISIT), (405-409)
  3678. Magner A, Kihara D and Szpankowski W The Boltzmann sequence-structure channel 2016 IEEE International Symposium on Information Theory (ISIT), (255-259)
  3679. Abotabl A and Nosratinia A Bit-additive superposition coding for the bandwidth limited broadcast channel 2016 IEEE International Symposium on Information Theory (ISIT), (165-169)
  3680. Li H Data driven quickest change detection: An algorithmic complexity approach 2016 IEEE International Symposium on Information Theory (ISIT), (21-25)
  3681. Neopane O, Das S, Arias-Castro E and Kreutz-Delgado K A nonparametric framework for quantifying generative inference on neuromorphic systems 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (1346-1349)
  3682. Tabib W, Corah M, Michael N and Whittaker R Computationally efficient information-theoretic exploration of pits and caves 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3722-3727)
  3683. Viseras A, Wiedemann T, Manss C, Magel L, Mueller J, Shutin D and Merino L Decentralized multi-agent exploration with online-learning of Gaussian processes 2016 IEEE International Conference on Robotics and Automation (ICRA), (4222-4229)
  3684. Young S and Taubman D Rate-distortion optimized optical flow estimation 2015 IEEE International Conference on Image Processing (ICIP), (1677-1681)
  3685. Fang Q INS ground alignment through observable degree analysis based on information theory 2015 15th International Conference on Control, Automation and Systems (ICCAS), (1374-1379)
  3686. Bustamante G, Danés P, Forgue T and Podlubne A Towards information-based feedback control for binaural active localization 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6325-6329)
  3687. Han P, Zhu J, Niu R and Baron D Multi-processor approximate message passing using lossy compression 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6240-6244)
  3688. Li Y and Veeravalli V Outlying sequence detection in large datasets: Comparison of universal hypothesis testing and clustering 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6180-6184)
  3689. Dey S, Madikeri S and Motlicek P Information theoretic clustering for unsupervised domain-adaptation 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (5580-5584)
  3690. Ligo J, Moustakides G and Veeravalli V Rate analysis for detection of sparse mixtures 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4244-4248)
  3691. Üney M, Mulgrew B and Clark D Distributed estimation of latent parameters in state space models using separable likelihoods 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4129-4133)
  3692. Mallick A and Kumar A Bandlimited field reconstruction from samples obtained on a discrete grid with unknown random locations 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4014-4018)
  3693. Wang Z, Babu P and Palomar D Optimal design of constant-modulus channel training sequences 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3901-3905)
  3694. Calvo-Fullana M, Matamoros J, Antón-Haro C and Fosson S Sparsity-promoting sensor selection with energy harvesting constraints 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3766-3770)
  3695. Nissel R and Rupp M On pilot-symbol aided channel estimation in FBMC-OQAM 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3681-3685)
  3696. Spencer S and Srikant R Maximum likelihood rumor source detection in a star network 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2199-2203)
  3697. Kim J and Yoon J Honey chatting: A novel instant messaging system robust to eavesdropping over communication 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2184-2188)
  3698. Karimzadeh M and Vu M Short Blocklength Priority-Based Coding for Unequal Error Protection in the AWGN Channel 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3699. Vestergaard R, Zhang Q and Lucani D Lossless Compression of Time Series Data with Generalized Deduplication 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3700. Mitev M, Chorti A, Belmega E and Reed M Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3701. Hsieh H and Su C Data-Centric Scheduling for Minimizing Queue Length in Wireless Machine-to-Machine Networks 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3702. Zhang X, Wang J and Poor H Optimal QoS-Driven Power Allocation for Energy Harvesting Wireless Ad-Hoc Networks Using FBC 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3703. Cao W, Dytso A, Fauss M, Feng G and Poor H Robust Waterfilling for Approximately Gaussian Inputs 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  3704. Xu Q, Sanyang M and Kaban A Large scale continuous EDA using mutual information 2016 IEEE Congress on Evolutionary Computation (CEC), (3718-3725)
  3705. Zhou J, Ji Z, Zhu Z and He S Metabolomics biomarker discovery using multimodal memetic algorithm and multivariate mutual information based feature selection 2016 IEEE Congress on Evolutionary Computation (CEC), (3193-3199)
  3706. Haghi A, Mohammadizadeh N and Khandani A Delay in cooperative communications: Higher multiplexing gain in Gaussian interference channels with full-duplex transmitters 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1486-1493)
  3707. Kiamari M and Avestimehr A Are generalized cut-set bounds tight for the deterministic interference channel? 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1430-1437)
  3708. Chou R and Bloch M Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1380-1385)
  3709. Farthofer S and Matz G Linear superposition coding for the Gaussian MAC with quantized feedback 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1374-1379)
  3710. Chung H, Sadler B and Hero A Bounds on variance for symmetric unimodal distributions 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1235-1240)
  3711. Hassanzadeh P, Erkip E, Llorca J and Tulino A Distortion-memory tradeoffs in cache-aided wireless video delivery 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1150-1157)
  3712. Pokutta S Information theory and polyhedral combinatorics 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1119-1126)
  3713. Chan C and Liu T Clustering by multivariate mutual information under Chow-Liu tree approximation 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (993-999)
  3714. Kidambi R and Kannan S On Shannon capacity and causal estimation 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (988-992)
  3715. Dau S, Song W, Sprintson A and Yuen C Constructions of MDS codes via random Vandermonde and Cauchy matrices over small fields 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (949-955)
  3716. MolavianJazi E and Yener A Subset source coding 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (857-864)
  3717. Mousavi A and Baraniuk R An information-theoretic measure of dependency among variables in large datasets 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (650-657)
  3718. Pichler G, Piantanida P and Matz G Distributed information-theoretic biclustering of two memoryless sources 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (426-433)
  3719. Hsieh C and Barmish B On Kelly betting: Some limitations 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (165-172)
  3720. Lalitha A and Javidi T On the rate of learning in distributed hypothesis testing 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-8)
  3721. Nedich A and Minh Do Foreword 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-1)
  3722. Liu Y, Jiang L, Yang D, Liu Y, Zhao J and Liu H Analysis on the joint independence of hand and wrist 2016 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), (31-37)
  3723. Cuculo V, Lanzarotti R and Boccignone G The Color of Smiling: Computational Synaesthesia of Facial Expressions Image Analysis and Processing — ICIAP 2015, (203-214)
Contributors
  • Stanford University
  • IBM Research - Almaden

Recommendations

Prasanna Kumar Sahoo

Information theory originated in Claude Shannon's work in 1948. Shannon was motivated by problems in communication theory. Even today, many engineers and scientists erroneously consider information theory as synonymous with communication theory. Information theory can be considered as a branch of modern applied probability theory. During the last 25 years, several textbooks and monographs have appeared presenting topics that are at the forefront of the research, as well as being important to the theoretical development of information theory. Why do we need another book on information theory__?__ Generally, one does not write a new book on information theory unless one has something new to say, or at least has something to say in a new way, or provides applications of theoretical developments. This book contains many new topics not found in earlier books on information theory. Some of these topics are the relationship of information theory to gambling, the universality of the second law of thermodynamics in the context of Markov chains, the competitive optimality of Huffman codes, the Kolmogorov complexity theory, and the relationship between Fisher information and mutual information. The book comprises 16 chapters. Chapter 1 is an introduction describing the relationship of information theory to communication theory, Kolmogorov complexity theory, thermodynamics, probability theory and mathematical statistics, economics, and philosophy of science. In this chapter, the authors briefly preview the various topics covered in the book. Chapter 2 includes the algebraic relationships of entropy, relative entropy, and mutual information. In chapter<__?__Pub Fmt hardspace>3, the authors describe the asymptotic equipartition property. Using this property, the entropy rate of stochastic processes is studied in chapter 4. In chapter 5, the authors answer one of the two fundamental questions of information <__?__Pub Fmt nolinebreak>theory:<__?__Pub Fmt /nolinebreak> What is the ultimate data compression__?__ This chapter also covers Huffman codes and arithmetic codes. Chapter 6 describes the relationship of information theory to gambling. In chapter 7, the authors describe Kolmogorov complexity theory. This chapter is intellectually more demanding than the rest of the book. Chaitin's mystical and magical number W is investigated. This number, which is the binary expansion of the probability that a Turing machine will halt, reveals many of the secrets of mathematics. In chapter 8, the authors answer another important question of information theory: What is the ultimate transmission rate of communication__?__ The channel capacity is established in this chapter in detail. Differential entropy is developed in chapter 9. Chapter 10 investigates the capacity of the fundamental Gaussian channel. In chapter 11, the authors describe the application of maximum entropy to spectral estimation. Burg's maximum entropy theorem is presented. Chapter 12 explores the relationship between information theory and statistics. The problem of testing hypotheses is considered, and best possible error exponents for such tests are derived. The authors also treat the estimation of the parameters of a distribution and describe the role of Fisher information. Chapter 13 deals with rate distortion theory. In large communication networks such as computer networks, satellite networks, and the phone system, one of the general problems is the following: Given many senders and receivers and a channel transition matrix that describes the effects of the interference and noise in the network, decide whether the sources can be transmitted over the channel. Chapter 14 deals with various special cases of this general problem (which is yet unsolved). Many earlier introductory books on information theory did not deal with this topic. Chapters 15 and 16 deal with applications of information theory to stock markets and solving matrix inequalities, respectively. This book emphasizes theoretical aspects of information theory, and thus most of the results are stated as theorems and proofs. In this way, the elegance of the results speaks for itself. The presentation is lucid, and several examples illustrate the key concepts. At the end of each chapter are exercises and historical notes. This book has evolved from the authors' lecture notes on information theory. Their obvious interest and knowledge of the subject come through. This book is suitable for a beginning graduate course on information theory. Few typographical errors occur, but on page 511 the name Acze´l has been misspelled as Axze´l<__?__Pub Caret>. This book will be a useful and important addition to the resources of practitioners and many others engaged in information theory and related areas. Overall, it is an impressive book. The breadth and number of topics covered, the knowledge and understanding of the authors, and the extent of published materials reviewed combine to ensure that this book will be used frequently.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.