We focus on the class of regular models defined by Várady et al. for reverse engineering purposes. Given a 3D surface M represented through a dense set of points, we present a n...
Unequal loss protection with systematic Reed-Solomon codes allows reliable transmission of embedded multimedia over packet erasure channels. The design of a fast algorithm with lo...
— In this paper a new protocol for IP mobility management is described, which follows a network-based approach and fulfils the requirements of optimized usage of radio spectrum a...
Ivano Guardini, Gerardo Giaretta, Francesco Miconi
—In this paper, we propose a new control method to cover “holes” in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are dis...
Abstract—A novel microarray value imputation method, HICCUP1 , is presented. HICCUP improves upon existing value imputation methods in the several ways. (1) By judiciously integr...