By Topic

IEEE Journal of Selected Topics in Signal Processing

Issue 5 • Date Oct. 2013

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • IEEE Journal of Selected Topics in Signal Processing publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):741 - 742
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Introduction to the Issue on Learning-Based Decision Making in Dynamic Systems Under Uncertainty

    Publication Year: 2013, Page(s):743 - 745
    Request permission for commercial reuse | PDF file iconPDF (1152 KB) | HTML iconHTML
    Freely Available from IEEE
  • Feature Search in the Grassmanian in Online Reinforcement Learning

    Publication Year: 2013, Page(s):746 - 758
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2856 KB) | HTML iconHTML

    We consider the problem of finding the best features for value function approximation in reinforcement learning and develop an online algorithm to optimize the mean square Bellman error objective. For any given feature value, our algorithm performs gradient search in the parameter space via a residual gradient scheme and, on a slower timescale, also performs gradient search in the Grassman manifol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems

    Publication Year: 2013, Page(s):759 - 767
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1665 KB) | HTML iconHTML

    In the Multi-Armed Bandit (MAB) problem, there is a given set of arms with unknown reward models. At each time, a player selects one arm to play, aiming to maximize the total expected reward over a horizon of length T. An approach based on a Deterministic Sequencing of Exploration and Exploitation (DSEE) is developed for constructing sequential arm selection policies. It is shown that for all ligh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequentiality and Adaptivity Gains in Active Hypothesis Testing

    Publication Year: 2013, Page(s):768 - 782
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4257 KB) | HTML iconHTML

    Consider a decision maker who is responsible to collect observations so as to enhance his information in a speedy manner about an underlying phenomena of interest. The policies under which the decision maker selects sensing actions can be categorized based on the following two factors: i) sequential versus non-sequential; ii) adaptive versus non-adaptive. Non-sequential policies collect a fixed nu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multistage Adaptive Estimation of Sparse Signals

    Publication Year: 2013, Page(s):783 - 796
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4343 KB) | HTML iconHTML

    This paper considers sequential adaptive estimation of sparse signals under a constraint on the total sensing effort. The advantage of adaptivity in this context is the ability to focus more resources on regions of space where signal components exist, thereby improving performance. A dynamic programming formulation is derived for the allocation of sensing effort to minimize the expected estimation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypothesis Testing in Feedforward Networks With Broadcast Failures

    Publication Year: 2013, Page(s):797 - 810
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3839 KB) | HTML iconHTML

    Consider a large number of nodes, which sequentially make decisions between two given hypotheses. Each node takes a measurement of the underlying truth, observes the decisions from some immediate predecessors, and makes a decision between the given hypotheses. We consider two classes of broadcast failures: 1) each node broadcasts a decision to the other nodes, subject to random erasure in the form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning-Based Constraint Satisfaction With Sensing Restrictions

    Publication Year: 2013, Page(s):811 - 820
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2483 KB) | HTML iconHTML

    In this paper we consider graph-coloring problems, an important subset of general constraint satisfaction problems that arise in wireless resource allocation. We constructively establish the existence of fully decentralized learning-based algorithms that are able to find a proper coloring even in the presence of strong sensing restrictions, in particular sensing asymmetry of the type encountered w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Energy-Aware Diffusion Least Mean Squares: Game-Theoretic Learning

    Publication Year: 2013, Page(s):821 - 836
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3842 KB) | HTML iconHTML

    This paper presents a game-theoretic approach to node activation control in parameter estimation via diffusion least mean squares (LMS). Nodes cooperate by exchanging estimates over links characterized by the connectivity graph of the network. The energy-aware activation control is formulated as a noncooperative repeated game where nodes autonomously decide when to activate based on a utility func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Learning and Multiaccess of On-Off Channels

    Publication Year: 2013, Page(s):837 - 845
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    The problem of distributed access of a set of N on-off channels by K ≤ N users is considered. The channels are slotted and modeled as independent but not necessarily identical alternating renewal processes. Each user decides to either observe or transmit at the beginning of every slot. A transmission is successful only if the channel is at the on state and there is only one user transmittin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Winning the Lottery: Learning Perfect Coordination With Minimal Feedback

    Publication Year: 2013, Page(s):846 - 857
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1977 KB) | HTML iconHTML

    Coordination is a central problem whenever stations (or nodes or users) share resources across a network. In the absence of coordination, there will be collision, congestion or interference, with concomitant loss of performance. This paper proposes new protocols, which we call perfect coordination (PC) protocols, that solve the coordination problem. PC protocols are completely distributed (requiri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiagent Reinforcement Learning Based Spectrum Sensing Policies for Cognitive Radio Networks

    Publication Year: 2013, Page(s):858 - 868
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2058 KB) | HTML iconHTML

    This paper proposes distributed multiuser multiband spectrum sensing policies for cognitive radio networks based on multiagent reinforcement learning. The spectrum sensing problem is formulated as a partially observable stochastic game and multiagent reinforcement learning is employed to find a solution. In the proposed reinforcement learning based sensing policies the secondary users (SUs) collab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Spectrum Access by Exploiting Primary User Feedbacks in Underlay Cognitive Radio Systems: An Optimality Analysis

    Publication Year: 2013, Page(s):869 - 882
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6223 KB) | HTML iconHTML

    We consider an underlay cognitive radio (CR) communication system in which a cognitive secondary user (SU) can access multiple primary spectrum channels only when its interference to the primary users (PU) is limited. To identify and exploit instantaneous transmission opportunities, the SU probes a subset of primary channels by overhearing the primary feedback signals so as to learn the primary re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximizing Quality of Information From Multiple Sensor Devices: The Exploration vs Exploitation Tradeoff

    Publication Year: 2013, Page(s):883 - 894
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3115 KB) | HTML iconHTML

    This paper investigates Quality of Information (QoI) aware adaptive sampling in a system where two sensor devices report information to an end user. The system carries out a sequence of tasks, where each task relates to a random event that must be observed. The accumulated information obtained from the sensor devices is reported once per task to a higher layer application at the end user. The util... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmit Power Control Policies for Energy Harvesting Sensors With Retransmissions

    Publication Year: 2013, Page(s):895 - 906
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2707 KB) | HTML iconHTML

    This paper addresses the problem of finding outage- optimal power control policies for wireless energy harvesting sensor (EHS) nodes with automatic repeat request (ARQ)-based packet transmissions. The power control policy of the EHS specifies the transmission power for each packet transmission attempt, based on all the information available at the EHS. In particular, the acknowledgement (ACK) or n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Reputation Protocol Design for Online Communities: A Stochastic Stability Analysis

    Publication Year: 2013, Page(s):907 - 920
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4122 KB) | HTML iconHTML

    This paper proposes a new class of incentive mechanisms aiming at compelling self-interested users in online communities to cooperate with each other by exchanging resources or services. Examples of such communities are social multimedia platforms, social networks, online labor markets, crowdsourcing platforms, etc. To optimize their individual long-term performance, users adapt their strategies b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Journal of Selected Topics in Signal Processing information for authors

    Publication Year: 2013, Page(s):921 - 922
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • J-STSP call for special issue proposals

    Publication Year: 2013, Page(s): 923
    Request permission for commercial reuse | PDF file iconPDF (765 KB)
    Freely Available from IEEE
  • Special issue on signal processing in smart electric power grid

    Publication Year: 2013, Page(s): 924
    Request permission for commercial reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE
  • Special issue on visual signal processing for wireless networks

    Publication Year: 2013, Page(s): 925
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • Special Issue on Signal Process for Situational Awareness from Networked Sensors and Social Media

    Publication Year: 2013, Page(s): 926
    Request permission for commercial reuse | PDF file iconPDF (913 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2013, Page(s): 927
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • myIEEE

    Publication Year: 2013, Page(s): 928
    Request permission for commercial reuse | PDF file iconPDF (771 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Selected Topics in Signal Processing (J-STSP) solicits special issues on topics that cover the entire scope of the IEEE Signal Processing Society including the theory and application of filtering, coding, transmitting, estimating, detecting, analyzing, recognizing, synthesizing, recording, and reproducing signals by digital or analog devices or techniques.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Shrikanth (Shri) S. Narayanan
Viterbi School of Engineering 
University of Southern California
Los Angeles, CA 90089 USA
shri@sipi.usc.edu