By Topic

IEEE Journal of Selected Topics in Signal Processing

Issue 4 • Date Aug. 2014

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (436 KB)
    Freely Available from IEEE
  • IEEE Journal of Selected Topics in Signal Processing publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):509 - 510
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Introduction to the Issue on Signal Processing for Social Networks [Guest editorial]

    Publication Year: 2014, Page(s):511 - 513
    Request permission for commercial reuse | PDF file iconPDF (576 KB) | HTML iconHTML
    Freely Available from IEEE
  • Multi-Layer Graph Analysis for Dynamic Social Networks

    Publication Year: 2014, Page(s):514 - 523
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2069 KB) | HTML iconHTML

    Modern social networks frequently encompass multiple distinct types of connectivity information; for instance, explicitly acknowledged friend relationships might complement behavioral measures that link users according to their actions or interests. One way to represent these networks is as multi-layer graphs, where each layer contains a unique set of edges over the same underlying vertices (users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graphical Evolutionary Game for Information Diffusion Over Social Networks

    Publication Year: 2014, Page(s):524 - 536
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2816 KB) | HTML iconHTML

    Social networks have become ubiquitous in our daily life, as such they have attracted great research interests recently. A key challenge is that it is of extremely large-scale with tremendous information flow, creating the phenomenon of “Big Data.” Under such a circumstance, understanding information diffusion over social networks has become an important research issue. Most of the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diffusion in Social Networks as SIS Epidemics: Beyond Full Mixing and Complete Graphs

    Publication Year: 2014, Page(s):537 - 551
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3600 KB) | HTML iconHTML

    Peer influence and interactions between agents in a population give rise to complex, nonlinear behaviors. This paper adopts the SIS (susceptible-infected-susceptible) framework from epidemiology to analytically study how network topology affects the diffusion of ideas/opinions/beliefs/innovations in social networks. We introduce the scaled SIS process, which models peer influence as neighbor-to-ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Stochastic Blockmodels for Time-Evolving Social Networks

    Publication Year: 2014, Page(s):552 - 562
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1980 KB) | HTML iconHTML

    Significant efforts have gone into the development of statistical models for analyzing data in the form of networks, such as social networks. Most existing work has focused on modeling static networks, which represent either a single time snapshot or an aggregate view over time. There has been recent interest in statistical modeling of dynamic networks, which are observed at multiple points in tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proximal-Gradient Algorithms for Tracking Cascades Over Social Networks

    Publication Year: 2014, Page(s):563 - 575
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3170 KB) | HTML iconHTML

    Many real-world processes evolve in cascades over complex networks, whose topologies are often unobservable and change over time. However, the so-termed adoption times when blogs mention popular news items, individuals in a community catch an infectious disease, or consumers adopt a trendy electronics product are typically known, and are implicitly dependent on the underlying network. To infer the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounded Confidence Opinion Dynamics in a Social Network of Bayesian Decision Makers

    Publication Year: 2014, Page(s):576 - 585
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1390 KB) | HTML iconHTML

    Bounded confidence opinion dynamics model the propagation of information in social networks. However, in the existing literature, opinions are only viewed as abstract quantities without semantics rather than as part of a decision-making system. In this work, opinion dynamics are examined when agents are Bayesian decision makers that perform hypothesis testing or signal detection, and the dynamics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Identify an Infection Source With Limited Observations

    Publication Year: 2014, Page(s):586 - 597
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2688 KB) | HTML iconHTML

    A rumor spreading in a social network or a disease propagating in a community can be modeled as an infection spreading in a network. Finding the infection source is a challenging problem, which is made more difficult in many applications where we have access only to a limited set of observations. We consider the problem of estimating an infection source for a Susceptible-Infected model, in which n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence Analysis of Iterated Belief Revision in Complex Fusion Environments

    Publication Year: 2014, Page(s):598 - 612
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4120 KB) | HTML iconHTML

    We study convergence of iterated belief revision in complex fusion environments, which may consist of a network of soft (i.e., human or human-based) and hard (i.e., conventional physics-based) sensors and where agent communications may be asynchronous and the link structure may be dynamic. In particular, we study the problem in which network agents exchange and revise belief functions (which gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph-Theoretic Distributed Inference in Social Networks

    Publication Year: 2014, Page(s):613 - 623
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2030 KB) | HTML iconHTML

    We consider distributed inference in social networks where a phenomenon of interest evolves over a given social interaction graph, referred to as the social digraph. We assume that a network of agents monitors certain nodes in the social digraph and the agents rely on inter-agent communication to perform inference. The key contributions include: (i) a novel construction of the distributed estimato... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provenance-Assisted Classification in Social Networks

    Publication Year: 2014, Page(s):624 - 637
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3577 KB) | HTML iconHTML

    Signal feature extraction and classification are two common tasks in the signal processing literature. This paper investigates the use of source identities as a common mechanism for enhancing the classification accuracy of social signals. We define social signals as outputs, such as microblog entries, geotags, or uploaded images, contributed by users in a social network. Many classification tasks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Online Learning in Social Recommender Systems

    Publication Year: 2014, Page(s):638 - 652
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3870 KB) | HTML iconHTML

    In this paper, we consider decentralized sequential decision making in distributed online recommender systems, where items are recommended to users based on their search query as well as their specific background including history of bought items, gender and age, all of which comprise the context information of the user. In contrast to centralized recommender systems, in which there is a single ce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quickest Attack Detection in Multi-Agent Reputation Systems

    Publication Year: 2014, Page(s):653 - 666
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2412 KB) | HTML iconHTML

    This paper considers the security issue of the reputation systems, which make great use of social networks, to form the reputation scores of a certain participant in the network by collecting ratings from others. To prevent the damage caused by the intentional injection of dishonest ratings, termed as reputation attack, we aim to detect such attack as soon as possible after its occurrence by seque... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Crowdsourcing for Multi-Class Labeling Using Coding Theory

    Publication Year: 2014, Page(s):667 - 679
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2847 KB) | HTML iconHTML

    Crowdsourcing systems often have crowd workers that perform unreliable work on the task they are assigned. In this paper, we propose the use of error-control codes and decoding algorithms to design crowdsourcing systems for reliable classification despite unreliable crowd workers. Coding theory based techniques also allow us to pose easy-to-answer binary questions to the crowd workers. We consider... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Collaborative Retrieval

    Publication Year: 2014, Page(s):680 - 689
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1837 KB) | HTML iconHTML

    Socially-based recommendation systems have recently attracted significant interest, and a number of studies have shown that social information can dramatically improve a system's predictions of user interests. Meanwhile, there are now many potential applications that involve aspects of both recommendation and information retrieval, and the task of collaborative retrieval-a combination of these two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Subsidies for Shared Small Cell Networks —A Social Network Perspective

    Publication Year: 2014, Page(s):690 - 702
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3397 KB) | HTML iconHTML

    In this paper, we study the optimal differentiated subsidies from a mobile network operator (MNO) to form a shared small cell network using social network information. It is a win-win strategy for the MNO to offload data and for small cell users (SUs) to receive enhanced QoS. We formulate the problem as a Stackelberg Game: in Stage I, the MNO sets differentiated subsidies and maximizes a subsidy e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous Gossip for Averaging and Spectral Ranking

    Publication Year: 2014, Page(s):703 - 716
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3787 KB) | HTML iconHTML

    We consider two variants of the classical gossip algorithm. The first variant is a version of asynchronous stochastic approximation. We highlight a fundamental difficulty associated with the classical asynchronous gossip scheme, viz., that it may not converge to a desired average, and suggest an alternative scheme based on reinforcement learning that has guaranteed convergence to the desired avera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing in Networks of Strategic Agents

    Publication Year: 2014, Page(s):717 - 731
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3541 KB) | HTML iconHTML

    In social, economic and engineering networks, connected agents need to cooperate by repeatedly sharing information and/or goods. Typically, sharing is costly and there are no immediate benefits for agents who share. Hence, agents who strategically aim to maximize their own individual utilities will “free-ride” because they lack incentives to cooperate/share, thereby leading to ineffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Journal of Selected Topics in Signal Processing information for authors

    Publication Year: 2014, Page(s):732 - 733
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Special issue on advances in hyperspectral data processing and analysis

    Publication Year: 2014, Page(s): 734
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2014, Page(s): 735
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE xplore digital library

    Publication Year: 2014, Page(s): 736
    Request permission for commercial reuse | PDF file iconPDF (1586 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Selected Topics in Signal Processing (J-STSP) solicits special issues on topics that cover the entire scope of the IEEE Signal Processing Society including the theory and application of filtering, coding, transmitting, estimating, detecting, analyzing, recognizing, synthesizing, recording, and reproducing signals by digital or analog devices or techniques.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Shrikanth (Shri) S. Narayanan
Viterbi School of Engineering 
University of Southern California
Los Angeles, CA 90089 USA
shri@sipi.usc.edu