2016 Index IEEE Transactions on Network Science and Engineering Vol. 3

Size: px
Start display at page:

Download "2016 Index IEEE Transactions on Network Science and Engineering Vol. 3"

Transcription

1 IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL. 4, NO. 1, JANUARY-MARCH Index IEEE Transactions on Network Science and Engineering Vol. 3 This index covers all technical items papers, correspondence, reviews, etc. that appeared in this periodical during 2016, and items from previous years that were commented upon or corrected in Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author s name. The primary entry includes the coauthors names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author s name, the publication abbreviation, month, and year, and inclusive pages. Note that the item title is found only under the primary entry in the Author Index. AUTHOR INDEX Bartolini, N., see Khamfroush, H., TNSE Oct.-Dec Bienstock, D., see Kim, T., TNSE July-Sept Blanchini, F., see Giordano, G., TNSE Oct.-Dec Bullo, F., see Jia, P., TNSE Oct.-Dec B C Chang, C., see Lee, D., TNSE July-Sept. Chang, C., Liao, W., Chen, Y., and Liou, L., A Mathematical Theory for Clustering in Metric Spaces; Chang, H., see Lee, D., TNSE July-Sept. Chen, Y., see Chang, C., Chen, Z., Zhu, K., and Ying, L., Detecting Multiple Information Sources in Networks under the SIR Model; TNSE Jan.-March Cucuringu, M., Sync-Rank: Robust Ranking, Constrained Ranking and Rank Aggregation via Eigenvector and SDP Synchronization; TNSE Cui, S., see Eslami, A., TNSE Oct.-Dec D Dhamal, S., Prabuchandran, K., and Narahari, Y., Information Diffusion in Social Networks in Two Phases; Dillman, J., see Khamfroush, H., TNSE Oct.-Dec E Eslami, A., Huang, C., Zhang, J., and Cui, S., Cascading Failures in Load- Dependent Finite-Size Random Geometric Networks; TNSE Oct.-Dec Ferragut, A., see Paganini, F., TNSE Oct.-Dec Franco, E., see Giordano, G., TNSE Oct.-Dec Friedkin, N.E., see Jia, P., TNSE Oct.-Dec F G Gao, J., Zhao, Q., and Swami, A., The Minimum Information Dominating Set for Opinion Sampling in Social Networks; TNSE Oct.-Dec Ghahramani, S.A.A.G., Hemmatyar, A.M.A., and Kavousi, K., A Network Model for Vehicular Ad Hoc Networks: An Introduction to Obligatory Attachment Rule; TNSE April-June Giordano, G., Blanchini, F., Franco, E., Mardanlou, V., and Montessoro, P.L., The Smallest Eigenvalue of the Generalized Laplacian Matrix, with Application to Network-Decentralized Estimation for Homogeneous Systems; TNSE Oct.-Dec Gross, T., see Silk, H., TNSE July-Sept Gushchin, A., Mallada, E., and Tang, A., Phase-Coupled Oscillators with Plastic Coupling: Synchronization and Stability; TNSE Oct.-Dec H Harnett, S., see Kim, T., TNSE July-Sept Hemmatyar, A.M.A., see Ghahramani, S.A.A.G., TNSE April-June Homer, M., see Silk, H., TNSE July-Sept Huang, C., see Eslami, A., TNSE Oct.-Dec Hulovatyy, Y., see Meng, L., TNSE J Jadbabaie, A., EIC Editorial; TNSE Jan.-March Jalili, M., and Yu, X., Enhancement of Synchronizability in Networks with Community Structure through Adding Efficient Inter-Community Links; TNSE Jia, P., Friedkin, N.E., and Bullo, F., The Coevolution of Appraisal and Influence Networks Leads to Structural Balance; TNSE Oct.-Dec K Kalogeratos, A., see Scaman, K., TNSE Oct.-Dec Kavousi, K., see Ghahramani, S.A.A.G., TNSE April-June Khamfroush, H., Bartolini, N., Porta, T.F.L., Swami, A., and Dillman, J., On Propagation of Phenomena in Interdependent Networks; TNSE Oct.-Dec Kim, T., Wright, S.J., Bienstock, D., and Harnett, S., Analyzing Vulnerability of Power Systems with Continuous Optimization Formulations; TNSE July-Sept L Lee, D., Chang, C., and Chang, H., Analyses of the Clustering Coefficient and the Pearson Degree Correlation Coefficient of Chung s Duplication Model; TNSE July-Sept. Liao, W., see Chang, C., Liou, L., see Chang, C., M Mallada, E., see Gushchin, A., TNSE Oct.-Dec Mardanlou, V., see Giordano, G., TNSE Oct.-Dec Meng, L., Hulovatyy, Y., Striegel, A., and Milenkovic, T., On the Interplay Between Individuals Evolving Interaction Patterns and Traits in Dynamic Multiplex Social Networks; TNSE Milenkovic, T., see Meng, L., TNSE Montessoro, P.L., see Giordano, G., TNSE Oct.-Dec Mucha, P.J., see Stanley, N., TNSE April-June Narahari, Y., see Dhamal, S., N

2 2 IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL. 4, NO. 1, JANUARY-MARCH 2017 O Ogura, M., and Preciado, V.M., Stability of Spreading Processes over Time-Varying Large-Scale Networks; TNSE Jan.-March P Paganini, F., Zubeldia, M., and Ferragut, A., Reciprocity and Efficiency in Peer Exchange of Wireless Nodes Through Convex Optimization; TNSE Oct.-Dec Porta, T.F.L., see Khamfroush, H., TNSE Oct.-Dec Prabuchandran, K., see Dhamal, S., Preciado, V.M., see Ogura, M., TNSE Jan.-March R Rhodes, D.L., Efficient Multistate Route Computation; TNSE July-Sept S Scaman, K., Kalogeratos, A., and Vayatis, N., Suppressing Epidemics in Networks Using Priority Planning; TNSE Oct.-Dec Shai, S., see Stanley, N., TNSE April-June Silk, H., Homer, M., and Gross, T., Design of Self-Organizing Networks: Creating Specified Degree Distributions; TNSE July-Sept Stanley, N., Shai, S., Taylor, D., and Mucha, P.J., Clustering Network Layers with the Strata Multilayer Stochastic Block Model; TNSE April-June Striegel, A., see Meng, L., TNSE Swami, A., see Gao, J., TNSE Oct.-Dec Swami, A., see Khamfroush, H., TNSE Oct.-Dec Tang, A., see Gushchin, A., TNSE Oct.-Dec Taylor, D., see Stanley, N., TNSE April-June Vayatis, N., see Scaman, K., TNSE Oct.-Dec Wright, S.J., see Kim, T., TNSE July-Sept Wu, J., see Zheng, H., TNSE July-Sept Yagan, O., see Zhuang, Y., Ying, L., see Chen, Z., TNSE Jan.-March Yu, X., see Jalili, M., TNSE T V W Y Z Zhang, J., see Eslami, A., TNSE Oct.-Dec Zhao, Q., see Gao, J., TNSE Oct.-Dec Zheng, H., and Wu, J., Effective Network Quarantine with Minimal Restrictions on Communication Activities; TNSE July-Sept Zhu, K., see Chen, Z., TNSE Jan.-March Zhuang, Y., and Yagan, O., Information Propagation in Clustered Multilayer Networks; Zubeldia, M., see Paganini, F., TNSE Oct.-Dec SUBJECT INDEX A Air transportation Algorithm design and analysis Analytical models Approximation algorithms Approximation theory Atmospheric modeling B Bandwidth allocation Biology C Clustering algorithms Complex networks Networks. Ogura, M., þ, TNSE Jan.-March Computational complexity Computational modeling Convergence Convex functions Correlation

3 IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL. 4, NO. 1, JANUARY-MARCH Couplings D Data analysis Data structures Differential equations Diffusion processes Directed graphs Diseases Dynamic programming Dynamic scheduling E Eigenvalues and eigenfunctions Electronic mail Epidemics Extraterrestrial measurements F Facebook G Genomics Graph theory Guidelines H Heuristic algorithms I Identification IEEE publishing 2015 Reviewers List. TNSE Jan.-March Inference mechanisms Information management Integrated circuit modeling L Laplace equations The Smallest Eigenvalue of the Generalized Laplacian Matrix, with Application to Network-Decentralized Estimation for Homogeneous Systems. Large-scale systems Least squares approximations Linear programming Load modeling M Market research Markov processes

4 4 IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL. 4, NO. 1, JANUARY-MARCH 2017 Mathematical model Mathematical programming Matrix algebra Networks. Ogura, M., þ, TNSE Jan.-March Measurement Method of moments Minimization Monte Carlo methods N Network theory (graphs) Network topology Nonhomogeneous media Numerical models O Optimization Oscillators Pattern clustering Peer-to-peer computing Power grids Power system faults Power system protection Power transmission lines Predictive models Probability Proteomics R Random processes Resource management Robustness S P Partitioning algorithms Sampling methods Set theory

5 IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL. 4, NO. 1, JANUARY-MARCH Silicon Simulated annealing Social network services Social sciences computing Sociology Stability analysis Statistics Stochastic processes Substrates Synchronization T Throughput Time complexity Time-varying networks Topology Twitter V Vehicular ad hoc networks A Network Model for Vehicular Ad Hoc Networks: An Introduction to Obligatory Attachment Rule. Ghahramani, S.A.A.G., þ, TNSE April-June W Wireless communication Wireless networks Wireless sensor networks

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Scale-Free Networks Generation Properties Analysis Dynamic

More information

Overview of SBSE. CS454, Autumn 2017 Shin Yoo

Overview of SBSE. CS454, Autumn 2017 Shin Yoo Overview of SBSE CS454, Autumn 2017 Shin Yoo Search-Based Software Engineering Application of all the optimisation techniques we have seen so far, to the various problems in software engineering. Not web

More information

Controllability of Complex Power Networks

Controllability of Complex Power Networks Network and Communication Technologies; Vol. 3, No. 1; 018 ISSN 197-064X E-ISSN 197-0658 Published by Canadian Center of Science and Education Controllability of Complex Power Networks Guohua Zhang 1,

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Subject Index. Journal of Discrete Algorithms 5 (2007)

Subject Index. Journal of Discrete Algorithms 5 (2007) Journal of Discrete Algorithms 5 (2007) 751 755 www.elsevier.com/locate/jda Subject Index Ad hoc and wireless networks Ad hoc networks Admission control Algorithm ; ; A simple fast hybrid pattern-matching

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Supplementary Information

Supplementary Information 1 2 3 4 5 6 7 8 9 10 11 12 Supplementary Information Competition-Based Benchmarking of Influence Ranking Methods in Social Networks Alexandru Topîrceanu Contents 1 Node overlapping correlation change as

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network

Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network Wanting Qin and Tongrang Fan (B) School of Information Science and Technology, Shijiazhuang Tiedao

More information

ME 555: Distributed Optimization

ME 555: Distributed Optimization ME 555: Distributed Optimization Duke University Spring 2015 1 Administrative Course: ME 555: Distributed Optimization (Spring 2015) Instructor: Time: Location: Office hours: Website: Soomin Lee (email:

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

Dynamically Motivated Models for Multiplex Networks 1

Dynamically Motivated Models for Multiplex Networks 1 Introduction Dynamically Motivated Models for Multiplex Networks 1 Daryl DeFord Dartmouth College Department of Mathematics Santa Fe institute Inference on Networks: Algorithms, Phase Transitions, New

More information

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

My favorite application using eigenvalues: partitioning and community detection in social networks

My favorite application using eigenvalues: partitioning and community detection in social networks My favorite application using eigenvalues: partitioning and community detection in social networks Will Hobbs February 17, 2013 Abstract Social networks are often organized into families, friendship groups,

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

A Novel Technique for Finding Influential Nodes

A Novel Technique for Finding Influential Nodes A Novel Technique for Finding Influential Nodes Mini Singh Ahuja Department of Computer science, Guru Nanak Dev University, Regional Campus, Gurdaspur Abstract In complex networks there is a big issue

More information

Greed Considered Harmful

Greed Considered Harmful Greed Considered Harmful Nonlinear (in)stabilities in network resource allocation Priya Ranjan Indo-US workshop 2009 Outline Background Model & Motivation Main results Fixed delays Single-user, single-link

More information

Optimizing the Deblocking Algorithm for. H.264 Decoder Implementation

Optimizing the Deblocking Algorithm for. H.264 Decoder Implementation Optimizing the Deblocking Algorithm for H.264 Decoder Implementation Ken Kin-Hung Lam Abstract In the emerging H.264 video coding standard, a deblocking/loop filter is required for improving the visual

More information

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE Nikita Chavan 1,Mehzabin Shaikh

More information

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Md. Imrul Hassan ihassan@swin.edu.au Centre for Advanced Internet Architecture (CAIA) Swinburne University of Technology

More information

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

Parallel Routing Method in Churn Tolerated Resource Discovery

Parallel Routing Method in Churn Tolerated Resource Discovery in Churn Tolerated Resource Discovery E-mail: emiao_beyond@163.com Xiancai Zhang E-mail: zhangxiancai12@sina.com Peiyi Yu E-mail: ypy02784@163.com Jiabao Wang E-mail: jiabao_1108@163.com Qianqian Zhang

More information

Latent Space Model for Road Networks to Predict Time-Varying Traffic. Presented by: Rob Fitzgerald Spring 2017

Latent Space Model for Road Networks to Predict Time-Varying Traffic. Presented by: Rob Fitzgerald Spring 2017 Latent Space Model for Road Networks to Predict Time-Varying Traffic Presented by: Rob Fitzgerald Spring 2017 Definition of Latent https://en.oxforddictionaries.com/definition/latent Latent Space Model?

More information

SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta

SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta SMALL WORLD NETWORK -Naveen Teja Vempati -Ravi Teja Mitta INTRODUCTION Every person in this world is some way or other connected by some means is the idea behind evolution of small world phenomenon. Later

More information

POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY

POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY Laxmi Subedi Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ School of Engineering Science Simon Fraser University Roadmap

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Methods of Technical Risk Assessment in a Regional Context

Methods of Technical Risk Assessment in a Regional Context Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance

More information

Spectral Compression of Mesh Geometry

Spectral Compression of Mesh Geometry Spectral Compression of Mesh Geometry Zachi Karni, Craig Gotsman SIGGRAPH 2000 1 Introduction Thus far, topology coding drove geometry coding. Geometric data contains far more information (15 vs. 3 bits/vertex).

More information

The Course Structure for the MCA Programme

The Course Structure for the MCA Programme The Course Structure for the MCA Programme SEMESTER - I MCA 1001 Problem Solving and Program Design with C 3 (3-0-0) MCA 1003 Numerical & Statistical Methods 4 (3-1-0) MCA 1007 Discrete Mathematics 3 (3-0-0)

More information

INTEGRATION of data communications services into wireless

INTEGRATION of data communications services into wireless 208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

The Immersed Interface Method

The Immersed Interface Method The Immersed Interface Method Numerical Solutions of PDEs Involving Interfaces and Irregular Domains Zhiiin Li Kazufumi Ito North Carolina State University Raleigh, North Carolina Society for Industrial

More information

Quasi-Monte Carlo Methods Combating Complexity in Cost Risk Analysis

Quasi-Monte Carlo Methods Combating Complexity in Cost Risk Analysis Quasi-Monte Carlo Methods Combating Complexity in Cost Risk Analysis Blake Boswell Booz Allen Hamilton ISPA / SCEA Conference Albuquerque, NM June 2011 1 Table Of Contents Introduction Monte Carlo Methods

More information

Temperature Calculation of Pellet Rotary Kiln Based on Texture

Temperature Calculation of Pellet Rotary Kiln Based on Texture Intelligent Control and Automation, 2017, 8, 67-74 http://www.scirp.org/journal/ica ISSN Online: 2153-0661 ISSN Print: 2153-0653 Temperature Calculation of Pellet Rotary Kiln Based on Texture Chunli Lin,

More information

Geographical Grid Based Clustering for WSN

Geographical Grid Based Clustering for WSN Geographical Grid Based Clustering for WSN Nancy Jain, Gunjan Jain and Brijesh Kumar Chaurasia ITM University Gwalior India Bkchaurasia.itm@gmail.com Abstract In this work, we have proposed a clustering

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

Distributed Optimization of Continuoustime Multi-agent Networks

Distributed Optimization of Continuoustime Multi-agent Networks University of Maryland, Dec 2016 Distributed Optimization of Continuoustime Multi-agent Networks Yiguang Hong Academy of Mathematics & Systems Science Chinese Academy of Sciences Outline 1. Background

More information

Learning based face hallucination techniques: A survey

Learning based face hallucination techniques: A survey Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

Introduction to Computational Mathematics

Introduction to Computational Mathematics Introduction to Computational Mathematics Introduction Computational Mathematics: Concerned with the design, analysis, and implementation of algorithms for the numerical solution of problems that have

More information

Self-Organization in Sensor and Actor Networks

Self-Organization in Sensor and Actor Networks Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Extracting Information from Complex Networks

Extracting Information from Complex Networks Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform

More information

Target Tracking in Wireless Sensor Network

Target Tracking in Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 643-648 International Research Publications House http://www. irphouse.com Target Tracking in

More information

Research on Mining Cloud Data Based on Correlation Dimension Feature

Research on Mining Cloud Data Based on Correlation Dimension Feature 2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Research on Mining Cloud Data Based on Correlation Dimension Feature Jingwen

More information

Spatially-Localized Compressed Sensing and Routing in Multi-Hop Sensor Networks 1

Spatially-Localized Compressed Sensing and Routing in Multi-Hop Sensor Networks 1 Spatially-Localized Compressed Sensing and Routing in Multi-Hop Sensor Networks 1 Sungwon Lee, Sundeep Pattem, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari and Antonio Ortega University of Southern

More information

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Gautam Bhat, Rajeev Kumar Singh Department of Computer Science and Engineering Shiv Nadar University Gautam Buddh Nagar,

More information

Clustering in Networks

Clustering in Networks Clustering in Networks (Spectral Clustering with the Graph Laplacian... a brief introduction) Tom Carter Computer Science CSU Stanislaus http://csustan.csustan.edu/ tom/clustering April 1, 2012 1 Our general

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Consensus and Synchronization of Multi-Agent Systems

Consensus and Synchronization of Multi-Agent Systems Consensus and Synchronization of Multi-Agent Systems (Combinatorial) optimization on matrix semigroups Raphaël Jungers UCLouvain L aquila, April 2016 Smart cities Consensus of multiagent systems Gossip

More information

Trends in Signal Processing - SPCOM

Trends in Signal Processing - SPCOM Trends in Signal Processing - SPCOM Moderator: Dr. Geert Leus, TU Delft Presenters: Dr. Robert Heath, UT Austin, WNCG Dr. Shuguang Cui, Texas A&M Univ. 1 New Dimensions of SPCOM Mathematical Tools Sparse

More information

Turing Workshop on Statistics of Network Analysis

Turing Workshop on Statistics of Network Analysis Turing Workshop on Statistics of Network Analysis Day 1: 29 May 9:30-10:00 Registration & Coffee 10:00-10:45 Eric Kolaczyk Title: On the Propagation of Uncertainty in Network Summaries Abstract: While

More information

IE598 Big Data Optimization Summary Nonconvex Optimization

IE598 Big Data Optimization Summary Nonconvex Optimization IE598 Big Data Optimization Summary Nonconvex Optimization Instructor: Niao He April 16, 2018 1 This Course Big Data Optimization Explore modern optimization theories, algorithms, and big data applications

More information

USING PRINCIPAL COMPONENTS ANALYSIS FOR AGGREGATING JUDGMENTS IN THE ANALYTIC HIERARCHY PROCESS

USING PRINCIPAL COMPONENTS ANALYSIS FOR AGGREGATING JUDGMENTS IN THE ANALYTIC HIERARCHY PROCESS Analytic Hierarchy To Be Submitted to the the Analytic Hierarchy 2014, Washington D.C., U.S.A. USING PRINCIPAL COMPONENTS ANALYSIS FOR AGGREGATING JUDGMENTS IN THE ANALYTIC HIERARCHY PROCESS Natalie M.

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Javad Lavaei. Department of Electrical Engineering Columbia University

Javad Lavaei. Department of Electrical Engineering Columbia University Graph Theoretic Algorithm for Nonlinear Power Optimization Problems Javad Lavaei Department of Electrical Engineering Columbia University Joint work with: Ramtin Madani, Ghazal Fazelnia and Abdulrahman

More information

An Introduction to Complex Systems Science

An Introduction to Complex Systems Science DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

Graph Exploitation Testbed

Graph Exploitation Testbed Graph Exploitation Testbed Peter Jones and Eric Robinson Graph Exploitation Symposium April 18, 2012 This work was sponsored by the Office of Naval Research under Air Force Contract FA8721-05-C-0002. Opinions,

More information

Enhancing Fairness in OBS Networks

Enhancing Fairness in OBS Networks Enhancing Fairness in OBS Networks Abstract Optical Burst Switching (OBS) is a promising solution for all optical Wavelength Division Multiplexing (WDM) networks. It combines the benefits of both Optical

More information

Phd. studies at Mälardalen University

Phd. studies at Mälardalen University Phd. studies at Mälardalen University Christopher Engström Mälardalen University, School of Education, Culture and Communication (UKK), Mathematics/Applied mathematics Contents What do you do as a Phd.

More information

Modeling and Reasoning with Bayesian Networks. Adnan Darwiche University of California Los Angeles, CA

Modeling and Reasoning with Bayesian Networks. Adnan Darwiche University of California Los Angeles, CA Modeling and Reasoning with Bayesian Networks Adnan Darwiche University of California Los Angeles, CA darwiche@cs.ucla.edu June 24, 2008 Contents Preface 1 1 Introduction 1 1.1 Automated Reasoning........................

More information

Comparison of Two Synchronization Protocol in Wireless Sensor Network

Comparison of Two Synchronization Protocol in Wireless Sensor Network Comparison of Two Synchronization Protocol in Wireless Sensor Network S.Rucksana 1, C. Babu 2, S.Saranyabharathi 3 P.G. Scholar, Department of ECE, Knowledge Institute of Technology, Salem, Tamil Nadu,

More information

Coflow. Recent Advances and What s Next? Mosharaf Chowdhury. University of Michigan

Coflow. Recent Advances and What s Next? Mosharaf Chowdhury. University of Michigan Coflow Recent Advances and What s Next? Mosharaf Chowdhury University of Michigan Rack-Scale Computing Datacenter-Scale Computing Geo-Distributed Computing Coflow Networking Open Source Apache Spark Open

More information

A New Algorithm for Black-start Zone Partitioning Based on Fuzzy Clustering Analysis

A New Algorithm for Black-start Zone Partitioning Based on Fuzzy Clustering Analysis Energy and Power Engineering, 2013, 5, 763-768 doi:10.4236/epe.2013.54b147 Published Online July 2013 (http://www.scirp.org/journal/epe) A New Algorithm for Black-start Zone Partitioning Based on Fuzzy

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

Toward a Flexible and Reconfigurable Broadband Satellite Network: Resource Management Architecture and Strategies

Toward a Flexible and Reconfigurable Broadband Satellite Network: Resource Management Architecture and Strategies Toward a Flexible and Reconfigurable Broadband Satellite Network: Resource Management Architecture and Strategies Yu Wang Xidian University October 21, 2016 Outline Introduction Background Knowledge Existing

More information

Blind Identification of Graph Filters with Multiple Sparse Inputs

Blind Identification of Graph Filters with Multiple Sparse Inputs Blind Identification of Graph Filters with Multiple Sparse Inputs Santiago Segarra, Antonio G. Marques, Gonzalo Mateos & Alejandro Ribeiro Dept. of Electrical and Systems Engineering University of Pennsylvania

More information

Introduction and Motivation Why delay performance is important?

Introduction and Motivation Why delay performance is important? Outline Introduction and Motivation Survey of Existing Approaches Example: Distributive Delay-Optimal Control for Uplink OFDMA via Localized Stochastic Learning and Auction Game Convergence Analysis Asymptotic

More information

Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure

Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure https://doi.org/10.3991/ijoe.v13i03.6863 Zhigang Zhao Zhejiang University of Media and Communications,

More information

Managing CAE Simulation Workloads in Cluster Environments

Managing CAE Simulation Workloads in Cluster Environments Managing CAE Simulation Workloads in Cluster Environments Michael Humphrey V.P. Enterprise Computing Altair Engineering humphrey@altair.com June 2003 Copyright 2003 Altair Engineering, Inc. All rights

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Expected to have Knowledge in these Undergraduate Level Core Courses

Expected to have Knowledge in these Undergraduate Level Core Courses Expected to have Knowledge in these Undergraduate Level Core Courses ECEN 3810 Intro to Probability ECEN 4242 Communication Theory ECEN 4632 Intro to Digital Filtering Graduate Level Core Courses in ECEE

More information

On Complex Dynamical Networks. G. Ron Chen Centre for Chaos Control and Synchronization City University of Hong Kong

On Complex Dynamical Networks. G. Ron Chen Centre for Chaos Control and Synchronization City University of Hong Kong On Complex Dynamical Networks G. Ron Chen Centre for Chaos Control and Synchronization City University of Hong Kong 1 Complex Networks: Some Typical Examples 2 Complex Network Example: Internet (William

More information

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis Yuqi Zhou, Jorge Cisneros-Saldana, Le Xie Department of Electrical and Computer Engineering Texas A&M University

More information

Optimal Topology Design for Overlay Networks

Optimal Topology Design for Overlay Networks Optimal Topology Design for Overlay Networks Mina Kamel 1, Caterina Scoglio 1, and Todd Easton 2 1 Electrical and computer Engineering Department 2 Industrial and Manufacturing Systems Engineering Department

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

Machine Learning (BSMC-GA 4439) Wenke Liu

Machine Learning (BSMC-GA 4439) Wenke Liu Machine Learning (BSMC-GA 4439) Wenke Liu 01-31-017 Outline Background Defining proximity Clustering methods Determining number of clusters Comparing two solutions Cluster analysis as unsupervised Learning

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)> RoboCup 2014 Rescue Simulation League Team Description Fu Jiang, Jun Peng, Xiaoyong Zhang, Tao Cao, Muhong Guo, Longlong Jing, Zhifeng Gao, Fangming Zheng School of Information Science

More information

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized

More information

Particle Filtering for Attitude Estimation Using a Minimal. Local-Error Representation: A Revisit

Particle Filtering for Attitude Estimation Using a Minimal. Local-Error Representation: A Revisit Particle Filtering for Attitude Estimation Using a Minimal Local-Error Representation: A Revisit Lubin Chang Department of navigation engineering, Naval University of Engineering, China For spacecraft

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

Social Behavior Prediction Through Reality Mining

Social Behavior Prediction Through Reality Mining Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Wei Ren and Randal W. Beard Springer ISBN: 978-1-84800-014-8 Tutorial Slides Prepared by Wei Ren Department of Electrical

More information

Monte Carlo Method for Solving Inverse Problems of Radiation Transfer

Monte Carlo Method for Solving Inverse Problems of Radiation Transfer INVERSE AND ILL-POSED PROBLEMS SERIES Monte Carlo Method for Solving Inverse Problems of Radiation Transfer V.S.Antyufeev. ///VSP/// UTRECHT BOSTON KÖLN TOKYO 2000 Contents Chapter 1. Monte Carlo modifications

More information

STATE SPACE MODELING OF 2-D RECURSIVE DIGITAL FILTERS

STATE SPACE MODELING OF 2-D RECURSIVE DIGITAL FILTERS STTE SPCE MODELING OF -D RECURSIVE DIGITL FILTERS Stela ngelova Stefanova Technology School Electronic System associated with the Technical University of Sofia, Mladost, 750 Sofia, Bulgaria, +359 8750040,

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information