Submissions from 2008
Software defined radio for HA-NDGPS performance improvements, Gregory W. Johnson, Ken Dykstra, Ruslan Shalaev, and Peter F. Swaszek
An evaluation of eloran as a backup navigation sensor for ADS-B, Gregory W. Johnson, Christian Oates, Mark Wiggins, James V. Carroll, Peter Swaszek, and Richard Hartnett
Temporal variation of Loran ASFs and their effects on HEA navigation, Gregory W. Johnson, Peter F. Swaszek, Richard J. Hartnett, Ken Dykstra, and Ruslan Shalaev
A new nonstationarity detector, Steven Kay
Noise enhanced detection as a special case of randomization, Steven Kay
Rethinking biased estimation, Steven Kay and Yonina C. Eldar
CRLB via the characteristic function with application to the K-distribution, Steven Kay and Cuichun Xu
Chemical detection and-classification in Raman spectra, Steven Kay, Cuichun Xu, and Darren Emge
Detection of collusion behaviors in online reputation systems, Yuhong Liu, Yafei Yang, and Yan Lindsay Sun
Optimal implementation of Continuous Data Protection (CDP) in Linux Kernel, Xu Li, Changsheng Xie, and Qing Yang
Low power/area branch prediction using complementary branch predictors, Resit Sendag, Joshua J. Yi, Peng Fei Chuang, and David Lilja
Network-aware security for group communications, Yan Sun, K. J.R. Liu, and Wade Trappe
Loran Phase Codes, Revisited, Peter F. Swaszek, Gregory Johnson, Ruslan Shalaev, and Richard Hartnett
Improved signal processing methodologies for the loran data channel, Peter F. Swaszek, Gregory W. Johnson, Ken Dykstra, Ruslan Shalaev, and Richard Hartnett
An importance sampling maximum likelihood direction of arrival estimator, Huigang Wang, Steven Kay, and S. Saha
Can we really recover data if storage subsystem fails?, Weijun Xiao and Qing Yang
On centralized composite detection with distributed sensors, Cuichun Xu and Steven Kay
Source enumeration via the EEF criterion, Cuichun Xu and Steven Kay
RepTrap: A novel attack on feedback-based reputation systems, Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, and Yafei Dai
Securing time-synchronization protocols in sensor networks: Attack detection and self-healing, Yafei Yang and Yan Sun
Submissions from 2007
Estimation of the parameters of a bilinear model with applications to submarine detection and system identification, Richard Abrahamsson, Steven M. Kay, and Petre Stoica
Deflection-optimal data forwarding over a Gaussian multiaccess channel, Christian R. Berger, Peter Willett, Shengli Zhou, and Peter F. Swaszek
The effects of pH on the electrophysiological properties of the CNS of lymnaea stagnalis, Kristina Bruen, Whitney Capwell, Shaun Russell, John DiCecco, and Ying Sun
Theory of the stochastic resonance effect in signal detection: Part I - Fixed detectors, Hao Chen, Pramod K. Varshney, Steven M. Kay, and James H. Michels
The effect of gramicidin on the membrane potential of neurons in the CNS of L. stagnalis, John DiCecco, Michael Segala, Oleg Andreev, Yana Reshetnyak, and Ying Sun
Inducing neuronal bursting activity in the CNS of L. stagnalis using dimethylformamide, John DiCecco, Michael Segala, and Ying Sun
A novel approach to physiology education for biomedical engineering students, J. DiCecco, J. Wu, K. Kuwasawa, and Y. Sun
Single-threaded vs. multithreaded: Where should we focus?, Joel Emer, Mark D. Hill, Yale N. Patt, Joshua J. Yi, Derek Chiou, and Resit Sendag
A custom chip set for a frequency-agile high-resolution sonar array, Godi Fischer, Alan J. Davis, and Prasan Kasturi
Reliability: Fallacy or reality?, Antonio González, Scott Mahlke, Shubu Mukherjee, Resit Sendag, Derek Chiou, and Joshua J. Yi
Where does security stand? New vulnerabilities vs. trusted computing, Shay Gueron, Jean Pierre Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, and Joshua J. Yi
Securing cooperative transmission in wireless communications, Zhu Han and Yan Lindsay Sun
Self-learning cooperative transmission - Coping with unreliability due to mobility, channel estimation errors, and untrustworthy nodes, Zhu Han and Yan Lindsay Sun
Navigating harbors at high accuracy without GPS: ELoran proof-of-concept on the thames river, Gregory W. Johnson, Ken Dykstra, Christian Oates, Peter F. Swaszek, and Richard Hartnett
Beacon-Loran integrated navigation concept (BLINC): An integrated Medium Frequency ranging system, Gregory W. Johnson, Christian Oates, Mark Wiggins, Peter F. Swaszek, and Richard Hartnett
An evaluation of eLoran as a backup to GPS, Gregory W. Johnson, Peter F. Swaszek, Richard J. Hartnett, Ruslan Shalaev, and Mark Wiggins
Asymptotically optimal approximation of multidimensional pdf's by lower dimensional pdf's, Steven Kay
Optimal signal design for detection of Gaussian point targets in stationary Gaussian clutter/reverberation, Steven Kay
Optimum radar signal for detection in clutter, Steven Kay
Performance analysis and potential improvements of the loran data channel, Michael Kuhn, Gregory W. Johnson, Ken Dykstra, Peter F. Swaszek, and Richard Hartnett
Encoding bandpass signals using level crossings: A model-based approach, Ramdas Kumaresan and Nitesh Panchal
Loran data modulation: Extensions and examples, Sherman C. Lo, Benjamin B. Peterson, Per K. Enge, and Peter Swaszek
Microprocessor based algorithms for controlling electromyogram-driven devices, Nikola Mrvaljevic, Ryan Zaczynski, Eugene Chabot, and Ying Sun
Model order estimation for adaptive radar clutter cancellation, Muralidhar Rangaswamy, Steven Kay, Cuichun Xu, and Freeman C. Lin
External cardiac defibrillation during wet-surface cooling in pigs, Alexandra Schratter, Wolfgang Weihs, Michael Holzer, Andreas Janata, Wilhelm Behringer, Udo M. Losert, William J. Ohley, Robert B. Schock, and Fritz Sterz
Branch misprediction prediction: Complementary branch predictors, Resit Sendag, Joshua J. Yi, and Peng Fei Chuang
The impact of wrong-path memory references in cache-coherent multiprocessor systems, Resit Sendag, Ayse Yilmazer, Joshua J. Yi, and Augustus K. Uht
Low-power design and temperature management, Kevin Skadron, Pradip Bose, Kanad Ghose, Resit Sendag, Joshua J. Yi, and Derek Chiou
Analysis and protection of dynamic membership information for group key distribution schemes, Yan Lindsay Sun and K. J. Ray Liu
Trust establishment in distributed networks: Analysis and modeling, Yan Lindsay Sun and Yafei Yang
Hierarchical group access control for secure multicast communications, Yan Sun and K. J. Ray Liu
Total least squares and errors-in-variables modeling, Sabine Van Huffel, Ivan Markovsky, Richard J. Vaccaro, and Torsten Söderström
Building trust in online rating systems through signal modeling, Yafei Yang, Yan Lindsay Sun, Jin Ren, and Qing Yang
Building trust in online rating systems through signal modeling, Yafei Yang, Yan Lindsay Sun, Jin Ren, and Qing Yang
Speed versus accuracy trade-offs in microarchitectural simulations, Joshua J. Yi, Resit Sendag, David J. Lilja, and Douglas M. Hawkins
Optimizing the rekeying cost for contributory group key agreement schemes, Wei Yu, Yan Sun, and K. J. Ray Liu
Submissions from 2006
Displacements, damage measures and response spectra obtained from a synthetic accelerogram processed by causal and acausal Butterworth filters, Pelin Gundes Bakir and Richard J. Vaccaro
Time-frequency signal representations for biomedical signals, G. Faye Boudreaux-Bartels and Robin Murray
Model based classification using multi-ping data, Christopher P. Carbone and Steven M. Kay
Hardware single-switch keyboard and mouse replacement for computer control, Eugene Chabot, John DiCecco, Nicole Baugh, and Sun Ying
Visual-to-tactile interface to detect motions in real-time for persons with visual impairments, Eugene Chabot and Ying Sun
An indirect current sensing technique for IDDQ and IDDT tests, Chuen Song Chen, Jien Chung Lo, and Tian Xia
Equivalent IDDQ tests for systems with regulated power supply, Chuen Song Chen, Jien Chung Lo, and Tian Xia
Approaching near optimal detection performance via stochastic resonance, Hao Chen, Pramod K. Varshney, James H. Michels, and Steven Kay
Can addition of noise improve distributed detection performance?, Hao Chen, Pramod K. Varshney, James H. Michels, and Steven M. Kay
2006 International Workshop on Networking, Architecture, and Storages: Foreword, Dan Feng, Hong Jiang, Jie Wu, Changsheng Xie, and Qing Yang
Tracking fishes with a microwatt acoustical receiver - An archival tag development, Godi Fischer, Sangmok Lee, Michael Obara, Prasan Kasturi, H. Thomas Rossby, and Conrad W. Recksiek
Improving nonparametric detectors via stochastic resonance, Chen Hao, Pramod K. Varshney, Steven Kay, and James H. Michels
Performance of Loran-C 9th pulse modulation techniques, Lee Hartshorn, Peter F. Swaszek, Gregory Johnson, Mark Wiggins, and Richard Hartnett
BALOR model validity for the airport ASF mapping methodology, Gregory Johnson, Ruslan Shalaev, Christian Oates, Peter F. Swaszek, and Richard Hartnett
Possible optimizations for the US Loran system, Gregory Johnson, Mark Wiggins, Peter F. Swaszek, Lee Hartshorn, and Richard Hartnett
A procedure for creating optimal ASF grids for harbor entrance & approach, Gregory W. Johnson, Ruslan Shalaev, Christian Oates, Peter F. Swaszek, Richard Hartnett, Dave Lown, and Kevin Shmihluk
Development of a design platform for CMOS amplifiers, Prasan Kasturi and Godi Fischer
Intuitive probability and random processes using MATLAB®, Steven M. Kay
Reducing probability of decision error using stochastic resonance, Steven Kay, James H. Michels, Hao Chen, and Pramod K. Varshney
Electrically modeled reciprocal inhibitory oscillator, Christoph Keseberg, Shannon Maio-Cannon, Christopher Mackenzie, Eugene Chabot, John DiCecco, Jiang Wu, and Ying Sun
Effective defibrillation in a wet environment: A preliminary study, J. C. Klock-Frézot, W. J. Ohley, R. B. Schock, M. Cote, R. Freeman, L. Schofield, and D. Serra
Successful defibrillation in water: A preliminary study, J. C. Klock-Frézot, W. J. Ohley, R. B. Schock, M. Cote, and L. Schofield
JET: Dynamic join-sexit-tree amortization and scheduling for contributory key management, Yinian Mao, Yan Sun, Min Wu, and K. J. Ray Liu
Multiple-valued logic buses for reducing bus energy in low-power systems, E. Özer, R. Sendag, and D. Gregg
Approximating noncausal IIR digital filters having arbitrary poles, including new hilbert transformer designs, via forward/backward block recursion, Charles M. Rader and Leland B. Jackson
Quantifying and reducing the effects of wrong-path memory references in cache-coherent multiprocessor systems, Resit Sendag, Ayse Yilmazer, Joshua J. Yi, and Augustus K. Uht
Guest editorial: Wireless network security, Xuemin Shen, Chuang Lin, Yan Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao
A warmer climate for women in engineering, Barb Silver, G. Boudreaux-Bartels, Helen Mederer, Lynn Pasquerella, Joan Peckham, Mercedes River-Hudec, and Karen Wishner
Stochastic line search using UUVs, Maribir Sodhi, Peter Swaszek, and Edoardo Bovio
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, Yan Lindsay Sun, Zhu Han, Wei Yu, and K. J. Ray Liu
Attacks on trust evaluation in distributed networks, Yan Lindsay Sun, Zhu Han, Wei Yu, and K. J. Ray Liu
Information theoretic framework of trust modeling and evaluation for ad hoc networks, Yan Lindsay Sun, Wei Yu, Zhu Han, and K. J. Ray Liu
Real time decomposition of speech into modulated components, Yadong Wang and Ramdas Kumaresan
Implementation and performance evaluation of two snapshot methods on iSCSI target storages, Weijun Xiao, Yinan Liu, Qing Yang, Jin Ren, and Changsheng Xie
TEA: Transmission error approximation for distance estimation between two zigbee devices, Weijun Xiao, Yan Sun, Yinan Liu, and Qing Yang
TEA: Transmission error approximation for distance estimation between two zigbee devices, Weijun Xiao, Yan Sun, Yinan Liu, and Qing Yang
Message from MTUC-06 Workshop Chairs, Zhiyong Xu, Laurence T. Yang, Alex Zhaoyu Liu, Shu Ching Chen, Wasfi G. Al-Khatib, Ramazan S. Aygun, Liwu Chang, Han Chieh Chao, Ing Ray Chen, Shigang Chen, Xiaowen Chu, John Sum, Mieso Denko, Zongming Fei, Xubin He, Yiming Hu, Tao Jiang, James B.D. Joshi, Ismail Khalil Ibrahim, Yan Luo, Geyong Min, Aaron J. Quigley, Mei Ling Shyu, Sabin Tabirca, Tsutomu Terada, Guojun Wang, Jun Wang, Qing Yang, and Xiaochuan Yi
On performance of parallel iSCSI protocol for networked storage systems, Qing Yang
Continuous data protection in iSCSI storages, Qing Yang, Weijun Xiao, and Jin Ren
PRINS: Optimizing performance of reliable internet storages, Qing Yang, Weijun Xiao, and Jin Ren
TRAP-array: A disk array architecture providing timely recovery to any point-in-time, Qing Yang, Weijun Xiao, and Jin Ren
Energy-efficient reliable transmission protocol with outsourcing in WSNs, Yafei Yang and Yan Sun
Analyzing the processor bottlenecks in SPEC CPU 2000, Joshua J. Yi, Ajay Joshi, Resit Sendag, Lieven Eeckhout, and David J. Lilja
Evaluating benchmark subsetting approaches, Joshua J. Yi, Resit Sendag, Lieven Eeckhout, Ajay Joshi, David J. Lilja, and Lizy K. John