Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
This paper deals with ranking and selection problem via simulation. We present an optimal computing budget allocation technique which can select the best of k simulated designs. T...
This paper reports the results of a preliminary experiment on the detection of semantic variants of terms in a French technical document. The general goal of our work is to help t...
We introduce a new wavelet image coder which is the forward-adaptive counterpart of the state-of-the-art backward-adaptive Estimation-Quantization coder. The variance field associ...
Anthony F. Docimo, Kannan Ramchandran, Mehmet Kiva...