{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:51Z","timestamp":1755993711661,"version":"3.44.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/ieeeconf44664.2019.9048657","type":"proceedings-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T01:10:33Z","timestamp":1585617033000},"page":"1086-1090","source":"Crossref","is-referenced-by-count":2,"title":["Reducing the Complexity of Fingerprinting-Based Positioning using Locality-Sensitive Hashing"],"prefix":"10.1109","author":[{"given":"Larry","family":"Tang","sequence":"first","affiliation":[{"name":"Cornell University,School of Electrical and Computer Engineering,Ithaca,NY"}]},{"given":"Ramina","family":"Ghods","sequence":"additional","affiliation":[{"name":"Cornell University,School of Electrical and Computer Engineering,Ithaca,NY"}]},{"given":"Christoph","family":"Studer","sequence":"additional","affiliation":[{"name":"Cornell University,School of Electrical and Computer Engineering,Ithaca,NY"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1666","article-title":"DeepFi: Deep learning for indoor fingerprinting using channel state information","author":"wang","year":"2015","journal-title":"IEEE Wireless Commun and Networking Conf (WCNC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.214"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.07.002"},{"key":"ref13","article-title":"Determining user location for context aware computing through the use of a wireless LAN infrastructure","volume":"15213","author":"smailagic","year":"2000"},{"key":"ref14","first-page":"18","article-title":"A probabilistic room location service for wireless networked environments","author":"castro","year":"2001","journal-title":"Int&#x2019;l Conf Ubiquitous Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2558659"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292280"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8446013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919897"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866979"},{"key":"ref28","article-title":"QuaDRiGa - Quasi Deterministic Radio Channel Generator User Manual and Documentation","author":"jaeckel","year":"2017","journal-title":"Fraunhofer Heinrich Hertz Institute Tech Rep v2 0 0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2666779"},{"key":"ref27","article-title":"PPAC: A versatile in-memory accelerator for matrix-vector product-like tasks","author":"casta\u00f1eda","year":"2019","journal-title":"IEEE Intl Conf on Application-Specific Systems Architectures and Processors (ASAP)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639142"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356988"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2030504"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331706"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2173771"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458284"},{"key":"ref20","first-page":"518","article-title":"Similarity search in high dimensions via hashing","volume":"99","author":"gionis","year":"1999","journal-title":"The International Journal on Very Large Data Bases (VLDB)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2474697"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2012.v008a014"},{"key":"ref26","first-page":"2101","article-title":"How to fake multiply by a Gaussian matrix","author":"kapralov","year":"2016","journal-title":"Intl Conf on Machine Learning (ICML)"},{"key":"ref25","first-page":"1225","article-title":"Practical and optimal LSH for angular distance","author":"andoni","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"}],"event":{"name":"2019 53rd Asilomar Conference on Signals, Systems, and Computers","start":{"date-parts":[[2019,11,3]]},"location":"Pacific Grove, CA, USA","end":{"date-parts":[[2019,11,6]]}},"container-title":["2019 53rd Asilomar Conference on Signals, Systems, and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9034466\/9048648\/09048657.pdf?arnumber=9048657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:48:22Z","timestamp":1755910102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9048657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ieeeconf44664.2019.9048657","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}