Explore scholarly publications from the Department of Electrical, Computer, and Biomedical Engineering faculty at the University of Rhode Island.

Follow

Submissions from 2008

Software defined radio for HA-NDGPS performance improvements, Gregory W. Johnson, Ken Dykstra, Ruslan Shalaev, and Peter F. Swaszek

An evaluation of eloran as a backup navigation sensor for ADS-B, Gregory W. Johnson, Christian Oates, Mark Wiggins, James V. Carroll, Peter Swaszek, and Richard Hartnett

Temporal variation of Loran ASFs and their effects on HEA navigation, Gregory W. Johnson, Peter F. Swaszek, Richard J. Hartnett, Ken Dykstra, and Ruslan Shalaev

Link

A new nonstationarity detector, Steven Kay

Link

Noise enhanced detection as a special case of randomization, Steven Kay

Link

Rethinking biased estimation, Steven Kay and Yonina C. Eldar

Link

CRLB via the characteristic function with application to the K-distribution, Steven Kay and Cuichun Xu

Link

Chemical detection and-classification in Raman spectra, Steven Kay, Cuichun Xu, and Darren Emge

Link

Detection of collusion behaviors in online reputation systems, Yuhong Liu, Yafei Yang, and Yan Lindsay Sun

Link

Optimal implementation of Continuous Data Protection (CDP) in Linux Kernel, Xu Li, Changsheng Xie, and Qing Yang

Link

Low power/area branch prediction using complementary branch predictors, Resit Sendag, Joshua J. Yi, Peng Fei Chuang, and David Lilja

Link

Network-aware security for group communications, Yan Sun, K. J.R. Liu, and Wade Trappe

Link

Loran Phase Codes, Revisited, Peter F. Swaszek, Gregory Johnson, Ruslan Shalaev, and Richard Hartnett

Improved signal processing methodologies for the loran data channel, Peter F. Swaszek, Gregory W. Johnson, Ken Dykstra, Ruslan Shalaev, and Richard Hartnett

Link

An importance sampling maximum likelihood direction of arrival estimator, Huigang Wang, Steven Kay, and S. Saha

Link

Can we really recover data if storage subsystem fails?, Weijun Xiao and Qing Yang

Link

On centralized composite detection with distributed sensors, Cuichun Xu and Steven Kay

Link

Source enumeration via the EEF criterion, Cuichun Xu and Steven Kay

Link

RepTrap: A novel attack on feedback-based reputation systems, Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, and Yafei Dai

Link

Securing time-synchronization protocols in sensor networks: Attack detection and self-healing, Yafei Yang and Yan Sun

Submissions from 2007

Link

Estimation of the parameters of a bilinear model with applications to submarine detection and system identification, Richard Abrahamsson, Steven M. Kay, and Petre Stoica

Link

Deflection-optimal data forwarding over a Gaussian multiaccess channel, Christian R. Berger, Peter Willett, Shengli Zhou, and Peter F. Swaszek

Link

The effects of pH on the electrophysiological properties of the CNS of lymnaea stagnalis, Kristina Bruen, Whitney Capwell, Shaun Russell, John DiCecco, and Ying Sun

Link

Theory of the stochastic resonance effect in signal detection: Part I - Fixed detectors, Hao Chen, Pramod K. Varshney, Steven M. Kay, and James H. Michels

Link

The effect of gramicidin on the membrane potential of neurons in the CNS of L. stagnalis, John DiCecco, Michael Segala, Oleg Andreev, Yana Reshetnyak, and Ying Sun

Link

Inducing neuronal bursting activity in the CNS of L. stagnalis using dimethylformamide, John DiCecco, Michael Segala, and Ying Sun

Link

A novel approach to physiology education for biomedical engineering students, J. DiCecco, J. Wu, K. Kuwasawa, and Y. Sun

Link

Single-threaded vs. multithreaded: Where should we focus?, Joel Emer, Mark D. Hill, Yale N. Patt, Joshua J. Yi, Derek Chiou, and Resit Sendag

Link

A custom chip set for a frequency-agile high-resolution sonar array, Godi Fischer, Alan J. Davis, and Prasan Kasturi

Link

Reliability: Fallacy or reality?, Antonio González, Scott Mahlke, Shubu Mukherjee, Resit Sendag, Derek Chiou, and Joshua J. Yi

Link

Where does security stand? New vulnerabilities vs. trusted computing, Shay Gueron, Jean Pierre Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, and Joshua J. Yi

Link

Securing cooperative transmission in wireless communications, Zhu Han and Yan Lindsay Sun

Link

Self-learning cooperative transmission - Coping with unreliability due to mobility, channel estimation errors, and untrustworthy nodes, Zhu Han and Yan Lindsay Sun

Navigating harbors at high accuracy without GPS: ELoran proof-of-concept on the thames river, Gregory W. Johnson, Ken Dykstra, Christian Oates, Peter F. Swaszek, and Richard Hartnett

Beacon-Loran integrated navigation concept (BLINC): An integrated Medium Frequency ranging system, Gregory W. Johnson, Christian Oates, Mark Wiggins, Peter F. Swaszek, and Richard Hartnett

Link

An evaluation of eLoran as a backup to GPS, Gregory W. Johnson, Peter F. Swaszek, Richard J. Hartnett, Ruslan Shalaev, and Mark Wiggins

Link

Asymptotically optimal approximation of multidimensional pdf's by lower dimensional pdf's, Steven Kay

Link

Optimal signal design for detection of Gaussian point targets in stationary Gaussian clutter/reverberation, Steven Kay

Link

Optimum radar signal for detection in clutter, Steven Kay

Performance analysis and potential improvements of the loran data channel, Michael Kuhn, Gregory W. Johnson, Ken Dykstra, Peter F. Swaszek, and Richard Hartnett

Encoding bandpass signals using level crossings: A model-based approach, Ramdas Kumaresan and Nitesh Panchal

Link

Loran data modulation: Extensions and examples, Sherman C. Lo, Benjamin B. Peterson, Per K. Enge, and Peter Swaszek

Link

Microprocessor based algorithms for controlling electromyogram-driven devices, Nikola Mrvaljevic, Ryan Zaczynski, Eugene Chabot, and Ying Sun

Link

Model order estimation for adaptive radar clutter cancellation, Muralidhar Rangaswamy, Steven Kay, Cuichun Xu, and Freeman C. Lin

Link

External cardiac defibrillation during wet-surface cooling in pigs, Alexandra Schratter, Wolfgang Weihs, Michael Holzer, Andreas Janata, Wilhelm Behringer, Udo M. Losert, William J. Ohley, Robert B. Schock, and Fritz Sterz

Link

Branch misprediction prediction: Complementary branch predictors, Resit Sendag, Joshua J. Yi, and Peng Fei Chuang

Link

The impact of wrong-path memory references in cache-coherent multiprocessor systems, Resit Sendag, Ayse Yilmazer, Joshua J. Yi, and Augustus K. Uht

Link

Low-power design and temperature management, Kevin Skadron, Pradip Bose, Kanad Ghose, Resit Sendag, Joshua J. Yi, and Derek Chiou

Link

Analysis and protection of dynamic membership information for group key distribution schemes, Yan Lindsay Sun and K. J. Ray Liu

Link

Trust establishment in distributed networks: Analysis and modeling, Yan Lindsay Sun and Yafei Yang

Link

Hierarchical group access control for secure multicast communications, Yan Sun and K. J. Ray Liu

Link

Total least squares and errors-in-variables modeling, Sabine Van Huffel, Ivan Markovsky, Richard J. Vaccaro, and Torsten Söderström

Link

Building trust in online rating systems through signal modeling, Yafei Yang, Yan Lindsay Sun, Jin Ren, and Qing Yang

Link

Building trust in online rating systems through signal modeling, Yafei Yang, Yan Lindsay Sun, Jin Ren, and Qing Yang

Link

Speed versus accuracy trade-offs in microarchitectural simulations, Joshua J. Yi, Resit Sendag, David J. Lilja, and Douglas M. Hawkins

Link

Optimizing the rekeying cost for contributory group key agreement schemes, Wei Yu, Yan Sun, and K. J. Ray Liu

Submissions from 2006

Link

Displacements, damage measures and response spectra obtained from a synthetic accelerogram processed by causal and acausal Butterworth filters, Pelin Gundes Bakir and Richard J. Vaccaro

Time-frequency signal representations for biomedical signals, G. Faye Boudreaux-Bartels and Robin Murray

Link

Model based classification using multi-ping data, Christopher P. Carbone and Steven M. Kay

Hardware single-switch keyboard and mouse replacement for computer control, Eugene Chabot, John DiCecco, Nicole Baugh, and Sun Ying

Visual-to-tactile interface to detect motions in real-time for persons with visual impairments, Eugene Chabot and Ying Sun

Link

An indirect current sensing technique for IDDQ and IDDT tests, Chuen Song Chen, Jien Chung Lo, and Tian Xia

Link

Equivalent IDDQ tests for systems with regulated power supply, Chuen Song Chen, Jien Chung Lo, and Tian Xia

Link

Approaching near optimal detection performance via stochastic resonance, Hao Chen, Pramod K. Varshney, James H. Michels, and Steven Kay

Link

Can addition of noise improve distributed detection performance?, Hao Chen, Pramod K. Varshney, James H. Michels, and Steven M. Kay

Link

2006 International Workshop on Networking, Architecture, and Storages: Foreword, Dan Feng, Hong Jiang, Jie Wu, Changsheng Xie, and Qing Yang

Link

Tracking fishes with a microwatt acoustical receiver - An archival tag development, Godi Fischer, Sangmok Lee, Michael Obara, Prasan Kasturi, H. Thomas Rossby, and Conrad W. Recksiek

Link

Improving nonparametric detectors via stochastic resonance, Chen Hao, Pramod K. Varshney, Steven Kay, and James H. Michels

Performance of Loran-C 9th pulse modulation techniques, Lee Hartshorn, Peter F. Swaszek, Gregory Johnson, Mark Wiggins, and Richard Hartnett

BALOR model validity for the airport ASF mapping methodology, Gregory Johnson, Ruslan Shalaev, Christian Oates, Peter F. Swaszek, and Richard Hartnett

Link

Possible optimizations for the US Loran system, Gregory Johnson, Mark Wiggins, Peter F. Swaszek, Lee Hartshorn, and Richard Hartnett

A procedure for creating optimal ASF grids for harbor entrance & approach, Gregory W. Johnson, Ruslan Shalaev, Christian Oates, Peter F. Swaszek, Richard Hartnett, Dave Lown, and Kevin Shmihluk

Development of a design platform for CMOS amplifiers, Prasan Kasturi and Godi Fischer

Link

Intuitive probability and random processes using MATLAB®, Steven M. Kay

Link

Reducing probability of decision error using stochastic resonance, Steven Kay, James H. Michels, Hao Chen, and Pramod K. Varshney

Electrically modeled reciprocal inhibitory oscillator, Christoph Keseberg, Shannon Maio-Cannon, Christopher Mackenzie, Eugene Chabot, John DiCecco, Jiang Wu, and Ying Sun

Effective defibrillation in a wet environment: A preliminary study, J. C. Klock-Frézot, W. J. Ohley, R. B. Schock, M. Cote, R. Freeman, L. Schofield, and D. Serra

Link

Successful defibrillation in water: A preliminary study, J. C. Klock-Frézot, W. J. Ohley, R. B. Schock, M. Cote, and L. Schofield

Link

JET: Dynamic join-sexit-tree amortization and scheduling for contributory key management, Yinian Mao, Yan Sun, Min Wu, and K. J. Ray Liu

Link

Multiple-valued logic buses for reducing bus energy in low-power systems, E. Özer, R. Sendag, and D. Gregg

Link

Approximating noncausal IIR digital filters having arbitrary poles, including new hilbert transformer designs, via forward/backward block recursion, Charles M. Rader and Leland B. Jackson

Link

Quantifying and reducing the effects of wrong-path memory references in cache-coherent multiprocessor systems, Resit Sendag, Ayse Yilmazer, Joshua J. Yi, and Augustus K. Uht

Link

Guest editorial: Wireless network security, Xuemin Shen, Chuang Lin, Yan Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao

A warmer climate for women in engineering, Barb Silver, G. Boudreaux-Bartels, Helen Mederer, Lynn Pasquerella, Joan Peckham, Mercedes River-Hudec, and Karen Wishner

Link

Stochastic line search using UUVs, Maribir Sodhi, Peter Swaszek, and Edoardo Bovio

Link

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, Yan Lindsay Sun, Zhu Han, Wei Yu, and K. J. Ray Liu

Link

Attacks on trust evaluation in distributed networks, Yan Lindsay Sun, Zhu Han, Wei Yu, and K. J. Ray Liu

Link

Information theoretic framework of trust modeling and evaluation for ad hoc networks, Yan Lindsay Sun, Wei Yu, Zhu Han, and K. J. Ray Liu

Link

Real time decomposition of speech into modulated components, Yadong Wang and Ramdas Kumaresan

Link

Implementation and performance evaluation of two snapshot methods on iSCSI target storages, Weijun Xiao, Yinan Liu, Qing Yang, Jin Ren, and Changsheng Xie

Link

TEA: Transmission error approximation for distance estimation between two zigbee devices, Weijun Xiao, Yan Sun, Yinan Liu, and Qing Yang

Link

TEA: Transmission error approximation for distance estimation between two zigbee devices, Weijun Xiao, Yan Sun, Yinan Liu, and Qing Yang

Link

Message from MTUC-06 Workshop Chairs, Zhiyong Xu, Laurence T. Yang, Alex Zhaoyu Liu, Shu Ching Chen, Wasfi G. Al-Khatib, Ramazan S. Aygun, Liwu Chang, Han Chieh Chao, Ing Ray Chen, Shigang Chen, Xiaowen Chu, John Sum, Mieso Denko, Zongming Fei, Xubin He, Yiming Hu, Tao Jiang, James B.D. Joshi, Ismail Khalil Ibrahim, Yan Luo, Geyong Min, Aaron J. Quigley, Mei Ling Shyu, Sabin Tabirca, Tsutomu Terada, Guojun Wang, Jun Wang, Qing Yang, and Xiaochuan Yi

Link

On performance of parallel iSCSI protocol for networked storage systems, Qing Yang

Link

Continuous data protection in iSCSI storages, Qing Yang, Weijun Xiao, and Jin Ren

Link

PRINS: Optimizing performance of reliable internet storages, Qing Yang, Weijun Xiao, and Jin Ren

Link

TRAP-array: A disk array architecture providing timely recovery to any point-in-time, Qing Yang, Weijun Xiao, and Jin Ren

Link

Energy-efficient reliable transmission protocol with outsourcing in WSNs, Yafei Yang and Yan Sun

Analyzing the processor bottlenecks in SPEC CPU 2000, Joshua J. Yi, Ajay Joshi, Resit Sendag, Lieven Eeckhout, and David J. Lilja

Link

Evaluating benchmark subsetting approaches, Joshua J. Yi, Resit Sendag, Lieven Eeckhout, Ajay Joshi, David J. Lilja, and Lizy K. John