Automated trading: making it happen
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Two-phase routing, scheduling and power control for wireless mesh networks with variable traffic
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A markovian signature-based approach to IP traffic classification
Proceedings of the 3rd annual ACM workshop on Mining network data
Survival of the fittest: an active queue management technique for noisy packet flows
Advances in Multimedia
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Clustering for metric and non-metric distance measures
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
Computational Biology and Chemistry
SAIL: summation-based incremental learning for information-theoretic clustering
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Encoding and decoding spikes for dynamic stimuli
Neural Computation
Zero Knowledge and Soundness Are Symmetric
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Speeding Up Feature Subset Selection Through Mutual Information Relevance Filtering
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Information Geometry and Information Theory in Machine Learning
Neural Information Processing
An Information Theoretic Framework for Field Monitoring Using Autonomously Mobile Sensors
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Multidimensional Linear Cryptanalysis of Reduced Round Serpent
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Weighted Cluster Ensemble Using a Kernel Consensus Function
CIARP '08 Proceedings of the 13th Iberoamerican congress on Pattern Recognition: Progress in Pattern Recognition, Image Analysis and Applications
INFORMATION-THEORETIC CONCEPTS FOR THE ANALYSIS OF COMPLEX NETWORKS
Applied Artificial Intelligence
Towards optimal sampling for flow size estimation
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Towards an information model of consistency maintenance in distributed interactive applications
International Journal of Computer Games Technology - Networking for Computer Games
Blog site search using resource selection
Proceedings of the 17th ACM conference on Information and knowledge management
A NOVEL METHOD FOR MEASURING THE STRUCTURAL INFORMATION CONTENT OF NETWORKS
Cybernetics and Systems
A Real-Time Vision System for Traffic Signs Recognition Invariant to Translation, Rotation and Scale
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
Bit-Interleaved Coded Modulation
Foundations and Trends in Communications and Information Theory
On Autonomy and Emergence in Self-Organizing Systems
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
An Information-Theoretic Approach to Model Identification in Interactive Influence Diagrams
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
On modeling of self-organizing systems
Autonomics '08 Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems
Combinatorial algorithms for wireless information flow
SODA '09 Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms
On Channel Capacity and Error Compensation in Molecular Communication
Transactions on Computational Systems Biology X
A multidimensional linear distinguishing attack on the Shannon cipher
International Journal of Applied Cryptography
Guest Column: correlation bounds for polynomials over {0 1}
ACM SIGACT News
Game bot identification based on manifold learning
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
An overview of network coding for dynamically changing networks
International Journal of Autonomous and Adaptive Communications Systems
A Construction of Lossy Source Code Using LDPC Matrices
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A practical joint network-channel coding scheme for reliable communication in wireless networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Clustering Multivariate Normal Distributions
Emerging Trends in Visual Computing
Mining Interventions from Parallel Event Sequences
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
The Java Programmer's Phrase Book
Software Language Engineering
On the Foundations of Quantitative Information Flow
FOSSACS '09 Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
Towards address privacy in mobile ad hoc networks
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Bit-probe lower bounds for succinct data structures
Proceedings of the forty-first annual ACM symposium on Theory of computing
Introducing hierarchy in energy-efficient power control games
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Measuring of organization in traffic systems
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Artificial Intelligence in Medicine
Adapting the right measures for K-means clustering
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy in Distributed Meeting Scheduling
Proceedings of the 2008 conference on Artificial Intelligence Research and Development: Proceedings of the 11th International Conference of the Catalan Association for Artificial Intelligence
Development of tolerant features for characterization of masses in mammograms
Computers in Biology and Medicine
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
On the Value of Multiple Read/Write Streams for Data Compression
CPM '09 Proceedings of the 20th Annual Symposium on Combinatorial Pattern Matching
On the capacity of BICM with QAM constellations
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Efficient hybrid relaying schemes with limited feedback
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A Divergence Formula for Randomness and Dimension
CiE '09 Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice
Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Topic-Based Hard Clustering of Documents Using Generative Models
ISMIS '09 Proceedings of the 18th International Symposium on Foundations of Intelligent Systems
Mining Databases to Mine Queries Faster
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Minimum Free Energy Principle for Constraint-Based Learning Bayesian Networks
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part I
Characterizing commercial intent
Proceedings of the 18th ACM conference on Information and knowledge management
Effective, design-independent XML keyword search
Proceedings of the 18th ACM conference on Information and knowledge management
Hybrid digital-analog coding with bandwidth compression for Gaussian source-channel pairs
IEEE Transactions on Communications
Asymptotic achievability of the Cramér-Rao bound for noisy compressive sampling
IEEE Transactions on Signal Processing
Design guidelines for training-based MIMO systems with feedback
IEEE Transactions on Signal Processing
A probabilistic approach to hybrid role mining
Proceedings of the 16th ACM conference on Computer and communications security
Introducing hierarchy in energy games
IEEE Transactions on Wireless Communications
BodyNets '09 Proceedings of the Fourth International Conference on Body Area Networks
What level of estimating accuracy does TCP need and can TCP achieve
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
On the information content of knowledge
ASC '07 Proceedings of The Eleventh IASTED International Conference on Artificial Intelligence and Soft Computing
Parity forwarding for multiple-relay networks
IEEE Transactions on Information Theory
Universal simulation with fidelity criteria
IEEE Transactions on Information Theory
On the capacity of free-space optical intensity channels
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Nonlinear sparse-graph codes for lossy compression
IEEE Transactions on Information Theory
A formulation of the channel capacity of multiple-access channel
IEEE Transactions on Information Theory
Compound multiple-access channels with partial cooperation
IEEE Transactions on Information Theory
Logarithmic Sobolev inequalities for information measures
IEEE Transactions on Information Theory
Sided and symmetrized Bregman centroids
IEEE Transactions on Information Theory
Improvement of Gallager upper bound and its variations for discrete channels
IEEE Transactions on Information Theory
DS-RT '09 Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications
Separation of sensor control and data in closed-loop sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Measure-driven keyword-query expansion
Proceedings of the VLDB Endowment
On the use of compression algorithms for the classification of IP flows
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
Impact of correlation in node locations on the performance of distributed compression
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
An Anonymous Sequential Game Approach for Battery State Dependent Power Control
NET-COOP '09 Proceedings of the 3rd Euro-NF Conference on Network Control and Optimization
Quantitative Modeling of Self-organizing Properties
IWSOS '09 Proceedings of the 4th IFIP TC 6 International Workshop on Self-Organizing Systems
Auditory Temporal Assimilation: A Discriminant Analysis of Electrophysiological Evidence
ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
Transmission Rate Enhancement for Scalable H.264/AVC Video over MIMO Wireless Systems
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Finding representative workloads for computer system design
Finding representative workloads for computer system design
Information Sciences: an International Journal
Reliable and secure broadcast communication over resource constrained systems
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Modeling and analysis of content identification
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Semi-supervised semantic role labeling using the latent words language model
EMNLP '09 Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1
Saddle-point solution of the fingerprinting capacity game under the marking assumption
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Approximate capacity region of the two-pair bidirectional Gaussian relay network
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
A comparative study of quantized compressive sensing schemes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Two recursive versions of the Shannon code
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
A class of bi-directional multi-relay protocols
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Limited feedback for multi-carrier beamforming: a rate-distortion approach
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
A differential equation method to derive the formulas of the T-complexity and the LZ-complexity
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Reliable source transmission over relay networks with side information
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Hidden Markov models for non-well-mixed reaction networks
ACC'09 Proceedings of the 2009 conference on American Control Conference
Stabilization and performance over a Gaussian communication channel for a plant with time delay
ACC'09 Proceedings of the 2009 conference on American Control Conference
Integration of a prediction mechanism with a sensor model: an anticipatory Bayes filter
ICRA'09 Proceedings of the 2009 IEEE international conference on Robotics and Automation
On the Power of Small-Depth Computation
Foundations and Trends® in Theoretical Computer Science
Transmit beamforming and power allocation for downlink OFDMA systems
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Communications - Special issue on optical wireless communications
Wiretap channel with secure rate-limited feedback
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Monotonic convergence in an information-theoretic law of small numbers
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Distributed MIMO systems for nomadic applications over a symmetric interference channel
IEEE Transactions on Information Theory
New closed-form bounds on the performance of coding in correlated Rayleigh fading
IEEE Transactions on Communications
Linear LLR approximation for iterative decoding on wireless channels
IEEE Transactions on Communications
Compress-forward coding with BPSK modulation for the half-duplex Gaussian relay channel
IEEE Transactions on Signal Processing
Ranging energy optimization for robust sensor positioning based on semidefinite programming
IEEE Transactions on Signal Processing
User capacity scaling laws for fading multiple-access channels
IEEE Transactions on Wireless Communications
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Feature selection in simple neurons: How coding depends on spiking dynamics
Neural Computation
Bernoulli's principle of insufficient reason and conservation of information in computer search
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Multimodal word learning from infant directed speech
IROS'09 Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems
IEEE Transactions on Wireless Communications
On Address Privacy in Mobile Ad Hoc Networks
Mobile Networks and Applications
Compression-unimpaired batch-image encryption combining vector quantization and index compression
Information Sciences: an International Journal
Symmetric deformable image registration via optimization of information theoretic measures
Image and Vision Computing
Interactive optimization for steering machine classification
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capacity of a class of modulo-sum relay channels
IEEE Transactions on Information Theory
A coding algorithm for constant weight vectors: a geometric approach based on dissections
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
A useful lemma for capacity analysis of fading interference channels
IEEE Transactions on Communications
IEEE Transactions on Signal Processing
Network congestion control at the application layer
Proceedings of the 14th Conference on Pattern Languages of Programs
Optimization on the orthogonal group for independent component analysis
ICA'07 Proceedings of the 7th international conference on Independent component analysis and signal separation
ICA'07 Proceedings of the 7th international conference on Independent component analysis and signal separation
Information theoretic derivations for causality detection: application to human gait
ICANN'07 Proceedings of the 17th international conference on Artificial neural networks
Weighted partition consensus via kernels
Pattern Recognition
Cross-entropy optimization for sensor selection problems
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Information processing for live photo mosaic with a group of wireless image sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Parallel information theory based construction of gene regulatory networks
HiPC'08 Proceedings of the 15th international conference on High performance computing
On the multiple unicast network coding conjecture
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Performance analysis of support recovery with joint sparsity constraints
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Interference channel capacity region for randomized fixed-composition codes
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
How do the structure and the parameters of Gaussian tree models affect structure learning?
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Information complexity of black-box convex optimization: a new look via feedback information theory
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
On the sum capacity of the Gaussian multiple access channel with feedback
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Codes against online adversaries
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Distributed transmission of functions of correlated sources over a fading multiple access channel
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Interpretation and generalization of score matching
UAI '09 Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence
Measuring inconsistency in probabilistic knowledge bases
UAI '09 Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence
On the delay-energy tradeoff in multiuser fading channels
EURASIP Journal on Wireless Communications and Networking
Prequential randomness and probability
Theoretical Computer Science
NPAR '10 Proceedings of the 8th International Symposium on Non-Photorealistic Animation and Rendering
Distributed joint source-channel coding for functions over a multiple access channel
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Vector perturbation precoding for MIMO broadcast channel with quantized channel feedback
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the performance of bit-synchronizers in an ISI channel and a related lower bound
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Constellation constrained capacity of two-user broadcast channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The gap approximation for Gaussian multiple access channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Statistical modeling of co-channel interference
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative diversity can mitigate keyhole effects in wireless MIMO systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Impact of information on network performance - an information-theoretic perspective
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the secondary capacity of the communication protocols
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the performance of compressed interference forwarding for uplink base station cooperation
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On downlink network MIMO under a constrained backhaul and imperfect channel knowledge
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Rate optimization for IDMA systems with iterative multi-user decoding
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Average-case active learning with costs
ALT'09 Proceedings of the 20th international conference on Algorithmic learning theory
Cross-layer design of networked control systems
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information combining for relay networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A generalized two-way relay channel with private information for the relay
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Transmission capacity of two-way communication in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Rate allocation for the multi-source downlink channel with minimax optimization
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A mutual information approach for comparing LLR metrics for iterative decoders
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
A note on the estimation of string complexity for short strings
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Device temporal forensics: an information theoretic approach
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Copula-set measures on topographic maps for change detection
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Active learning and basis selection for kernel-based linear models: a Bayesian perspective
IEEE Transactions on Signal Processing
Learning Gaussian tree models: analysis of error exponents and extremal structures
IEEE Transactions on Signal Processing
OFDM MIMO radar with mutual-information waveform design for low-grazing angle tracking
IEEE Transactions on Signal Processing
Asymptotic performance analysis and successive selected mapping for PAR reduction in OFDM
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
A universal scheme for Wyner-Ziv coding of discrete sources
IEEE Transactions on Information Theory
Counterexamples to a proposed stam inequality on finite groups
IEEE Transactions on Information Theory
On the multimessage capacity region for undirected ring networks
IEEE Transactions on Information Theory
Optimized low-delay source-channel-relay mappings
IEEE Transactions on Communications
Lightweight probabilistic texture retrieval
IEEE Transactions on Image Processing
Feedback capacity of stationary Gaussian channels
IEEE Transactions on Information Theory
Shannon-theoretic limits on noisy compressive sampling
IEEE Transactions on Information Theory
Information theory and neural information processing
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Capacity analysis for integrate-and-fire neurons with descending action potential thresholds
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
A mathematical theory of energy efficient neural computation and communication
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Synergistic coding by cortical neural ensembles
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Anthropic correction of information estimates and its application to neural coding
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
A channel model for inferring the optimal number of electrodes for future cochlear implants
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Hash property and coding theorems for sparse matrices and maximum-likelihood coding
IEEE Transactions on Information Theory
Sharp bounds on the entropy of the poisson law and related quantities
IEEE Transactions on Information Theory
Outage exponents of block-fading channels with power allocation
IEEE Transactions on Information Theory
Stochastic resource allocation over fading multiple access and broadcast channels
IEEE Transactions on Information Theory
A joint symbol detection algorithm efficient at low SNR for a multi-device STBC-MIMO system
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Remote sampler: central brain architecture
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Clustering for metric and nonmetric distance measures
ACM Transactions on Algorithms (TALG)
Variable-rate channel capacity
IEEE Transactions on Information Theory
Novel bounds on the capacity of the binary deletion channel
IEEE Transactions on Information Theory
Two-way source coding with a helper
IEEE Transactions on Information Theory
An achievable rate for relay networks based on compress-and-forward strategy
IEEE Communications Letters
An optimal coding strategy for the binary multi-way relay channel
IEEE Communications Letters
Region merging techniques using information theory statistical measures
IEEE Transactions on Image Processing
Error recovery of variable length code over BSC with arbitrary crossover probability
IEEE Transactions on Communications
A Survey of Linear Predictive Coding: Part I of Linear Predictive Coding and the Internet Protocol
Foundations and Trends in Signal Processing
Throughput analysis of multiple access relay channel under collision model
INFOCOM'10 Proceedings of the 29th conference on Information communications
An interaction-based mobility model for dynamic hot spot analysis
INFOCOM'10 Proceedings of the 29th conference on Information communications
Inter-cell interference mitigation allocation for half-duplex relays based cooperation
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Unsupervised feature selection for multi-cluster data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
On the costs and benefits of stochasticity in stream processing
Proceedings of the 47th Design Automation Conference
Model identification in interactive influence diagrams using mutual information
Web Intelligence and Agent Systems
Generalizing capacity: new definitions and capacity theorems for composite channels
IEEE Transactions on Information Theory
Squeezing the Arimoto-Blahut algorithm for faster convergence
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Distributed node selection for sequential estimation over noisy communication channels
IEEE Transactions on Wireless Communications
Detection of selfish nodes in networks using CoopMAC protocol with ARQ
IEEE Transactions on Wireless Communications
Higher Coordination With Less Control-A Result of Information Maximization in the Sensorimotor Loop
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
Sensor Fusion for SLAM Based on Information Theory
Journal of Intelligent and Robotic Systems
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
On capacity computation for the two-user binary multiple-access channel: solutions by cooperation
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Properties and performance bounds of linear analog block codes
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
On the Duality of Probing and Fault Attacks
Journal of Electronic Testing: Theory and Applications
IEEE Transactions on Image Processing
Compressed sensing performance bounds under Poisson noise
IEEE Transactions on Signal Processing
Cognitive radios with multiple antennas exploiting spatial opportunities
IEEE Transactions on Signal Processing
Sequential detection of misbehaving nodes in cooperative networks with HARQ
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Learning patient-specific predictive models from clinical data
Journal of Biomedical Informatics
Unsupervised model adaptation using information-theoretic criterion
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions
IEEE Transactions on Information Theory
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Power control strategy for distributed multiple-hypothesis detection
IEEE Transactions on Signal Processing
QML-based joint diagonalization of positive-definite hermitian matrices
IEEE Transactions on Signal Processing
MIMO radar waveform design in colored noise based on information theory
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing
Journal of the ACM (JACM)
Capacity regions and sum-rate capacities of vector Gaussian interference channels
IEEE Transactions on Information Theory
Adaptive sensing and optimal power allocation for wireless video sensors with sigma-delta imager
IEEE Transactions on Image Processing - Special section on distributed camera networks: sensing, processing, communication, and implementation
A max-flow/min-cut algorithm for a class of wireless networks
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
On the moment-determinance and random mixture of Nakagami-m variates
IEEE Transactions on Communications
Performance analysis of bidirectional communication protocols based on decode-and-forward relaying
IEEE Transactions on Communications
MIMO radar detection and adaptive design under a phase synchronization mismatch
IEEE Transactions on Signal Processing
Detection of spatially correlated Gaussian time series
IEEE Transactions on Signal Processing
On the distortion exponents of layered broadcast transmission in multi-relay cooperative networks
IEEE Transactions on Signal Processing
Detecting algorithmically generated malicious domain names
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
The optimum leakage principle for analyzing multi-threaded programs
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Optimal trade-offs for succinct string indexes
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
A graph-based projection approach for semi-supervised clustering
PKAW'10 Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services
Entropy and software systems: towards an information-theoretic foundation of software testing
Proceedings of the FSE/SDP workshop on Future of software engineering research
A graph model for clustering based on mutual information
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
A novel metrics based on information bottleneck principle for face retrieval
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Information dynamics of evolved agents
SAB'10 Proceedings of the 11th international conference on Simulation of adaptive behavior: from animals to animats
Performance evaluation of constraints in graph-based semi-supervised clustering
AMT'10 Proceedings of the 6th international conference on Active media technology
A K-provers parallel repetition theorem for a version of no-signaling model
COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
Automatic classification of social tags
ECDL'10 Proceedings of the 14th European conference on Research and advanced technology for digital libraries
Summarising data by clustering items
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part II
A divergence formula for randomness and dimension
Theoretical Computer Science
International Journal of Speech Technology
An Entropy Optimization Strategy for Simultaneous Localization and Mapping
Journal of Intelligent and Robotic Systems
MIMO Gaussian channels with arbitrary inputs: optimal precoding and power allocation
IEEE Transactions on Information Theory
Capacity of channels with frequency-selective and time-selective fading
IEEE Transactions on Information Theory
Performance analysis for sparse support recovery
IEEE Transactions on Information Theory
Statistical physics of signal estimation in Gaussian noise: theory and examples of phase transitions
IEEE Transactions on Information Theory
IEEE Transactions on Communications
Lower bounds to the performance of bit synchronization for bandwidth efficient pulse-shaping
IEEE Transactions on Communications
Refining decisions after losing data: the unlucky broker problem
IEEE Transactions on Signal Processing
Learning graphical models for hypothesis testing and classification
IEEE Transactions on Signal Processing
Diversity order in ISI channels with single-carrier frequency-domain equalizers
IEEE Transactions on Wireless Communications
Bayesian active learning using arbitrary binary valued queries
ALT'10 Proceedings of the 21st international conference on Algorithmic learning theory
Toward a classification of finite partial-monitoring games
ALT'10 Proceedings of the 21st international conference on Algorithmic learning theory
A privacy-preserving architecture for the semantic web based on tag suppression
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
New Procedures for Testing Whether Stock Price Processes are Martingales
Computational Economics
Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the 26th Annual Computer Security Applications Conference
A linear discriminant analysis method based on mutual information maximization
Pattern Recognition
On information divergence measures and a unified typicality
IEEE Transactions on Information Theory
The interplay between entropy and variational distance
IEEE Transactions on Information Theory
Limited-rate channel state feedback for multicarrier block fading channels
IEEE Transactions on Information Theory
IEEE Transactions on Signal Processing
IEEE Transactions on Wireless Communications
Primary user enters the game: performance of dynamic spectrum leasing in cognitive radio networks
IEEE Transactions on Wireless Communications
Differential feedback of MIMO channel gram matrices based on geodesic curves
IEEE Transactions on Wireless Communications
Characterization and abatement of the reassociation overhead in vehicle to roadside networks
IEEE Transactions on Communications
Large Deviations of Max-Weight Scheduling Policies on Convex Rate Regions
Mathematics of Operations Research
Single-ballot risk-limiting audits using convex optimization
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Algorithmic trading strategy optimization based on mutual information entropy based clustering
ISICA'10 Proceedings of the 5th international conference on Advances in computation and intelligence
Vagueness is rational under uncertainty
Proceedings of the 17th Amsterdam colloquium conference on Logic, language and meaning
Information transfer among coupled random boolean networks
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Resource allocation for the multiband relay channel: a building block for hybrid wireless networks
EURASIP Journal on Wireless Communications and Networking
On the capacity of FSO links over gamma-gamma atmospheric turbulence channels using OOK signaling
EURASIP Journal on Wireless Communications and Networking
Security analysis of ISS watermarking using natural scene statistics
IH'10 Proceedings of the 12th international conference on Information hiding
Source Coding: Part I of Fundamentals of Source and Video Coding
Foundations and Trends in Signal Processing
The best-so-far selection in Artificial Bee Colony algorithm
Applied Soft Computing
Recovering cooperative multiplexing gain in wireless relay networks
IEEE Transactions on Communications
Model distribution dependant complexity estimation on textures
ISVC'10 Proceedings of the 6th international conference on Advances in visual computing - Volume Part III
Data Fusion with Entropic Priors
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
A unified context assessing model for object categorization
Computer Vision and Image Understanding
IEA/AIE'10 Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I
Genre classification and the invariance of MFCC features to key and tempo
MMM'11 Proceedings of the 17th international conference on Advances in multimedia modeling - Volume Part I
Learning Instance-Specific Predictive Models
The Journal of Machine Learning Research
Minimum Description Length Penalization for Group and Multi-Task Sparse Learning
The Journal of Machine Learning Research
Variable Sparsity Kernel Learning
The Journal of Machine Learning Research
Hardness Amplification Proofs Require Majority
SIAM Journal on Computing
Multiscale Photon-Limited Spectral Image Reconstruction
SIAM Journal on Imaging Sciences
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
Sampling strategies for epidemic-style information dissemination
IEEE/ACM Transactions on Networking (TON)
Journal of Computational Neuroscience
Hierarchical modulation with vector rotation for E-MBMS transmission in LTE systems
Journal of Electrical and Computer Engineering - Special issue on LTE/LTE-advanced cellular communication networks
Iterative processing for superposition mapping
Journal of Electrical and Computer Engineering - Special issue on iterative signal processing in communications
On the informativeness of cascade and intent-aware effectiveness measures
Proceedings of the 20th international conference on World wide web
Canonical method names for Java: using implementation semantics to identify synonymous verbs
SLE'10 Proceedings of the Third international conference on Software language engineering
Methods for approximations of quantitative measures in self-organizing systems
IWSOS'11 Proceedings of the 5th international conference on Self-organizing systems
Mitigating Near-field Interference in Laptop Embedded Wireless Transceivers
Journal of Signal Processing Systems
Krimp: mining itemsets that compress
Data Mining and Knowledge Discovery
The cognitive agent: Overcoming informational limits
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Channel capacity bounds in the presence of quantized channel state information
EURASIP Journal on Wireless Communications and Networking
On the effect of self-interference cancelation in multihop wireless networks
EURASIP Journal on Wireless Communications and Networking
A novel method for improving fairness over multiaccess channels
EURASIP Journal on Wireless Communications and Networking
Power allocation games in interference relay channels: existence analysis of nash equilibria
EURASIP Journal on Wireless Communications and Networking
Asymptotic information leakage under one-try attacks
FOSSACS'11/ETAPS'11 Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software
Automatic tagging and geotagging in video collections and communities
Proceedings of the 1st ACM International Conference on Multimedia Retrieval
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Journal of Signal Processing Systems
Fast computation methods for estimation of image spatial entropy
Journal of Real-Time Image Processing
Studying software evolution using artefacts' shared information content
Science of Computer Programming
CoUAV: a multi-UAV cooperative search path planning simulation environment
Proceedings of the 2010 Summer Computer Simulation Conference
An estimation of generalized bradley-terry models based on the em algorithm
Neural Computation
GIS enabled service site selection: Environmental analysis and beyond
Information Systems Frontiers
Common randomness and secret key capacities of two-way channels
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Model order selection for boolean matrix factorization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
An effective evaluation measure for clustering on evolving data streams
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Learning High-Dimensional Markov Forest Distributions: Analysis of Error Rates
The Journal of Machine Learning Research
Learning Latent Tree Graphical Models
The Journal of Machine Learning Research
Discriminative Learning of Bayesian Networks via Factorized Conditional Log-Likelihood
The Journal of Machine Learning Research
Dynamic ordering-based search algorithm for markov blanket discovery
PAKDD'11 Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part II
Frequent and dependent connectivities
ISMM'11 Proceedings of the 10th international conference on Mathematical morphology and its applications to image and signal processing
Topic graph based non-negative matrix factorization for transfer learning
ISMIS'11 Proceedings of the 19th international conference on Foundations of intelligent systems
Maximum causal entropy correlated equilibria for Markov games
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Low-cost mitigation of privacy loss due to radiometric identification
VANET '11 Proceedings of the Eighth ACM international workshop on Vehicular inter-networking
A truth serum for sharing rewards
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
GENCCS: a correlated group difference approach to contrast set mining
MLDM'11 Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition
Comparing apples and oranges: measuring differences between data mining results
ECML PKDD'11 Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part III
Poster: on capacity maximization in wireless relay networks
ACM SIGMETRICS Performance Evaluation Review - Special Issue on IFIP PERFORMANCE 2011- 29th International Symposium on Computer Performance, Modeling, Measurement and Evaluation
Early prediction of temporal sequences based on information transfer
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Information-based adaptive fast-forward for visual surveillance
Multimedia Tools and Applications
Grouping Algorithm for Partner Selection in Cooperative Transmission
Wireless Personal Communications: An International Journal
A graph model for mutual information based clustering
Journal of Intelligent Information Systems
Dynamic Resource Allocation for Scalable H.264/AVC Video Transmission over MIMO Wireless Systems
Journal of Signal Processing Systems
Quantitative information flow, with a view
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Predictive mitigation of timing channels in interactive systems
Proceedings of the 18th ACM conference on Computer and communications security
Link prediction: the power of maximal entropy random walk
Proceedings of the 20th ACM international conference on Information and knowledge management
A non-reference image fusion metric based on mutual information of image features
Computers and Electrical Engineering
Coverage-Directed Test Generation Automated by Machine Learning -- A Review
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Public security: simulations need to replace conventional wisdom
Proceedings of the 2011 workshop on New security paradigms workshop
SIAM Journal on Computing
Watch the Story Unfold with TextWheel: Visualization of Large-Scale News Streams
ACM Transactions on Intelligent Systems and Technology (TIST)
Find the intrinsic space for multiclass classification
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Transmitting multiple correlated gaussian sources over a Gaussian MAC using delay-free mappings
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Multimodal data fusion for video scene segmentation
VISUAL'05 Proceedings of the 8th international conference on Visual Information and Information Systems
Probabilistic flooding in stochastic networks: Analysis of global information outreach
Computer Networks: The International Journal of Computer and Telecommunications Networking
A multi-rate routing protocol with connection entropy for mobile ad hoc networks
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Journal of Discrete Algorithms
A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Utilizing assigned treatments as labels for supervised machine learning in clinical decision support
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Equality conditions for the quantum f-relative entropy and generalized data processing inequalities
Quantum Information Processing
Data Mining and Knowledge Discovery
Mining local and tail dependence structures based on pointwise mutual information
Data Mining and Knowledge Discovery
Mining diversity on social media networks
Multimedia Tools and Applications
Compressed Histogram of Gradients: A Low-Bitrate Descriptor
International Journal of Computer Vision
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
EvoApplicatons'10 Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part I
Maximum-information storage system: concept, implementation and application
Proceedings of the International Conference on Computer-Aided Design
ACM Transactions on Sensor Networks (TOSN)
Efficient web browsing with perfect anonymity using page prefetching
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Information distances over clusters
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part I
Efficiency analysis and derivation of enhanced deployment models for sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Network coding schemes for the multiple-access relay channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Dynamic power allocation games in parallel multiple access channels
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Secure distributed lossless compression with side information at the eavesdropper
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Achievable secrecy rates for wiretap OFDM with QAM constellations
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
On the optimization of bipartite secret sharing schemes
Designs, Codes and Cryptography
Synthetic on-line signature generation. Part II: Experimental validation
Pattern Recognition
Universal one-way hash functions via inaccessible entropy
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
On filtering the noise from the random parameters in Monte Carlo rendering
ACM Transactions on Graphics (TOG)
Comparison of predictive contract mechanisms from an information theory perspective
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
The implication problem for 'closest node' functional dependencies in complete XML documents
Journal of Computer and System Sciences
Vector space formulation of probabilistic finite state automata
Journal of Computer and System Sciences
Optimal state merging without decoupling
TQC'09 Proceedings of the 4th international conference on Theory of Quantum Computation, Communication, and Cryptography
Revisiting higher-order DPA attacks: multivariate mutual information analysis
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Dependent linear approximations: the algorithm of biryukov and others revisited
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Computing the leakage of information-hiding systems
TACAS'10 Proceedings of the 16th international conference on Tools and Algorithms for the Construction and Analysis of Systems
The quantum query complexity of learning multilinear polynomials
Information Processing Letters
Throughput and energy efficiency in wireless ad hoc networks with Gaussian channels
IEEE/ACM Transactions on Networking (TON)
AF or DF, and how to configure an optimal mixed AF-DF relay system?
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
SEMCCO'11 Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part I
On the capacity of rate-adaptive packetized wireless communication links under jamming
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Sensor fusion: from dependence analysis via matroid bases to online synthesis
ALGOSENSORS'11 Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities
Distributed graph pattern matching
Proceedings of the 21st international conference on World Wide Web
Mutual Information Optimization for Mass Spectra Data Alignment
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
Radar HRRP recognition based on discriminant information analysis
WSEAS Transactions on Information Science and Applications
Autonomous Agents and Multi-Agent Systems
An information-theoretic approach to estimate the capacity of processing units
Performance Evaluation
Distributed Video Coding: an overview of basics, research issues and solutions
International Journal of Ad Hoc and Ubiquitous Computing
Variability-aware, discrete optimization for analog circuits
Proceedings of the 49th Annual Design Automation Conference
Thought leaders during crises in massive social networks
Statistical Analysis and Data Mining
Quantum Information & Computation
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
An information-based dynamic extrapolation model for networked virtual environments
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
International Journal of Approximate Reasoning
Towards optimal error-estimating codes through the lens of Fisher information analysis
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
Learning the graph of epidemic cascades
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
DDoS flooding attack detection scheme based on F-divergence
Computer Communications
Active online classification via information maximization
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume Two
Operations Research Letters
Resource allocation for multiuser cognitive OFDM networks with proportional rate constraints
International Journal of Communication Systems
Rate-distortion optimized layered coding of high dynamic range videos
Journal of Visual Communication and Image Representation
Identifying Linux bug fixing patches
Proceedings of the 34th International Conference on Software Engineering
Statistical estimation with bounded memory
Statistics and Computing
The long and the short of it: summarising event sequences with serial episodes
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Suboptimal Solutions to Team Optimization Problems with Stochastic Information Structure
SIAM Journal on Optimization
The Complexity of Distributions
SIAM Journal on Computing
Discrete Eckart-Young Theorem for Integer Matrices
SIAM Journal on Matrix Analysis and Applications
On passive characterization of aggregated traffic in wireless networks
WWIC'12 Proceedings of the 10th international conference on Wired/Wireless Internet Communication
Why watching movie tweets won't tell the whole story?
Proceedings of the 2012 ACM workshop on Workshop on online social networks
AutoMAC: rateless wireless concurrent medium access
Proceedings of the 18th annual international conference on Mobile computing and networking
Detecting social spam campaigns on twitter
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fundamenta Informaticae - Theory that Counts: To Oscar Ibarra on His 70th Birthday
Proceedings of the sixth ACM conference on Recommender systems
Differential privacy: on the trade-off between utility and information leakage
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Min-Entropy leakage of channels in cascade
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Practical algorithms for generating a random ordering of the elements of a weighted set
FUN'12 Proceedings of the 6th international conference on Fun with Algorithms
Dynamic Pricing Under a General Parametric Choice Model
Operations Research
Shannon impossibility, revisited
ICITS'12 Proceedings of the 6th international conference on Information Theoretic Security
Inducing decision trees with an ant colony optimization algorithm
Applied Soft Computing
Jacobi iterations for Canonical Dependence Analysis
Signal Processing
Minimax trees in linear time with applications
European Journal of Combinatorics
Summarizing data succinctly with the most informative itemsets
ACM Transactions on Knowledge Discovery from Data (TKDD) - Special Issue on the Best of SIGKDD 2011
Knowledge discovery interestingness measures based on unexpectedness
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
Analog Integrated Circuits and Signal Processing
Measuring structural similarity of semistructured data based on information-theoretic approaches
The VLDB Journal — The International Journal on Very Large Data Bases
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
A completeness analysis of frequent weighted concept lattices and their algebraic properties
Data & Knowledge Engineering
Interleave-division multiple access (IDMA) using low-rate layered LDGM codes
Wireless Communications & Mobile Computing
Neural Computation
Recommendations using linked data
Proceedings of the 5th Ph.D. workshop on Information and knowledge
A systematic comparison of phrase table pruning techniques
EMNLP-CoNLL '12 Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning
Direct command generation for CNC machinery based on data compression techniques
Robotics and Computer-Integrated Manufacturing
Gender classification from unaligned facial images using support subspaces
Information Sciences: an International Journal
Weave analysis of paintings on canvas from radiographs
Signal Processing
Different dynamics of classical and quantum correlations under decoherence
Quantum Information Processing
Model-based clustering of high-dimensional data: Variable selection versus facet determination
International Journal of Approximate Reasoning
Discovering descriptive tile trees: by mining optimal geometric subtiles
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I
A bayesian approach for classification rule mining in quantitative databases
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Worst- and average-case privacy breaches in randomization mechanisms
TCS'12 Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
Abstract painting with interactive control of perceptual entropy
ACM Transactions on Applied Perception (TAP)
Quantum Information Processing
IDA'12 Proceedings of the 11th international conference on Advances in Intelligent Data Analysis
Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
IEEE/ACM Transactions on Networking (TON)
Objective priors from maximum entropy in data classification
Information Fusion
Summarizing categorical data by clustering attributes
Data Mining and Knowledge Discovery
Achievable complexity-performance tradeoffs in lossy compression
Problems of Information Transmission
Complexity-compression tradeoffs in lossy compression via efficient random codebooks and databases
Problems of Information Transmission
Two Informational Complexity Measures in Social Networks and Agent Communities
International Journal of Agent Technologies and Systems
Influence of erroneous pairwise constraints in semi-supervised clustering
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Bit rate optimization with MMSE detector for multicast LP-OFDM systems
Journal of Electrical and Computer Engineering - Special issue on Resource Allocation in Communications and Computing
Analyzing the quality of information solicited from targeted strangers on social media
Proceedings of the 2013 conference on Computer supported cooperative work
Optimized bi-dimensional data projection for clustering visualization
Information Sciences: an International Journal
Role Mining with Probabilistic Models
ACM Transactions on Information and System Security (TISSEC)
Ordinal regularized manifold feature extraction for image ranking
Signal Processing
Performances of Amplify-and-Forward Cooperative Relay Networks with Different Topologies
Wireless Personal Communications: An International Journal
Supervising random forest using attribute interaction networks
EvoBIO'13 Proceedings of the 11th European conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Unsupervised Feature Selection with Feature Clustering
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Power Analysis of Hardware Implementations Protected with Secret Sharing
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Toward finding hidden communities based on user profile
Journal of Intelligent Information Systems
The complexity of the graph access structures on six participants
Designs, Codes and Cryptography
Towards information-theoretic K-means clustering for image indexing
Signal Processing
Semi-supervised learning with density-ratio estimation
Machine Learning
MICAI'12 Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II
Boosting with side information
ACCV'12 Proceedings of the 11th Asian conference on Computer Vision - Volume Part I
Message transmission and key establishment: conditions for equality of weak and strong capacities
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Information-Theoretic foundations of differential privacy
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
An information-theoretically secure threshold distributed oblivious transfer protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Distance estimation in numerical data sets with missing values
Information Sciences: an International Journal
Model selection in markovian processes
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Connecting users across social media sites: a behavioral-modeling approach
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Boolean functions over nano-fabrics: improving resilience through coding
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Combinatorial neural codes from a mathematical coding theory perspective
Neural Computation
Bayesian inference using data flow analysis
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
On bottleneck analysis in stochastic stream processing
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Parallel globally optimal structure learning of Bayesian networks
Journal of Parallel and Distributed Computing
The Journal of Machine Learning Research
High-dimensional Gaussian graphical model selection: walk summability and local separation criterion
The Journal of Machine Learning Research
Adaptive quantizers for estimation
Signal Processing
Convergence of Price-Based Resource Allocation Algorithms in Multicellular Multicarrier Systems
Wireless Personal Communications: An International Journal
Turing patterns with Turing machines: emergence and low-level structure formation
Natural Computing: an international journal
A novel unsupervised approach for multilevel image clustering from unordered image collection
Frontiers of Computer Science: Selected Publications from Chinese Universities
SLNR-Based Transmit Beamforming for MIMO Wiretap Channel
Wireless Personal Communications: An International Journal
A Practical Liquidity-Sensitive Automated Market Maker
ACM Transactions on Economics and Computation
Learning Cycle Length Through Finite Automata
Mathematics of Operations Research
Proceedings of the 3rd international workshop on Trustworthy embedded devices
A maximal entropy stochastic process for a timed automaton,
ICALP'13 Proceedings of the 40th international conference on Automata, Languages, and Programming - Volume Part II
A pattern-oriented specification of gene network inference processes
Computers in Biology and Medicine
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Learning and designing stochastic processes from logical constraints
QEST'13 Proceedings of the 10th international conference on Quantitative Evaluation of Systems
Parallel deep learning with suggestive activation for object category recognition
ICVS'13 Proceedings of the 9th international conference on Computer Vision Systems
ACM Transactions on Applied Perception (TAP)
Testing blind separability of complex Gaussian mixtures
Signal Processing
Basic level in formal concept analysis: interesting concepts and psychological ramifications
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Active learning for level set estimation
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Hartigan's K-means versus Lloyd's K-means: is it time for a change?
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Achieving net feedback gain in the linear-deterministic butterfly network with a full-duplex relay
Information Theory, Combinatorics, and Search Theory
Multiple objects: error exponents in hypotheses testing and identification
Information Theory, Combinatorics, and Search Theory
Threshold functions for distinct parts: revisiting erdős---lehner
Information Theory, Combinatorics, and Search Theory
Information Theory, Combinatorics, and Search Theory
International Journal of Speech Technology
Statistical texture retrieval in noise using complex wavelets
Image Communication
A family of new complex number chaotic maps based image encryption algorithm
Image Communication
Studying software evolution using topic models
Science of Computer Programming
Interdependence and predictability of human mobility and social interactions
Pervasive and Mobile Computing
Journal of Visual Communication and Image Representation
Supervised feature selection in graphs with path coding penalties and network flows
The Journal of Machine Learning Research
Variational algorithms for marginal MAP
The Journal of Machine Learning Research
Supervised feature subset selection with ordinal optimization
Knowledge-Based Systems
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
A probabilistic PTAS for shortest common superstring
Theoretical Computer Science
Self-Organizing Map Formation with a Selectively Refractory Neighborhood
Neural Processing Letters
Interesting pattern mining in multi-relational data
Data Mining and Knowledge Discovery
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP)
Wireless Personal Communications: An International Journal
An overview of digital speech watermarking
International Journal of Speech Technology
Optimized dissimilarity space embedding for labeled graphs
Information Sciences: an International Journal
Quantitative information flow in interactive systems
Journal of Computer Security - ARSPA-WITS'10
Rectifying the representation learned by Non-negative Matrix Factorization
International Journal of Knowledge-based and Intelligent Engineering Systems
Synergy, redundancy, and multivariate information measures: an experimentalist's perspective
Journal of Computational Neuroscience
Wireless Personal Communications: An International Journal
An overview of bayesian methods for neural spike train analysis
Computational Intelligence and Neuroscience - Special issue on Modeling and Analysis of Neural Spike Trains
Hi-index | 2.96 |