Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Perfect Secrecy by pdf-Bandlimited Jamming., and . IEEE Signal Process. Lett., 21 (1): 83-87 (2014)Nonparametric Obstruction Detection for UWB Localization., , , and . GLOBECOM, page 1-6. IEEE, (2009)Research advances in cognitive ultra wide band radio and their application to sensor networks., , , and . Mob. Networks Appl., 11 (4): 487-499 (2006)Pansharpening: Context-Based Generalized Laplacian Pyramids by Robust Regression., , and . IEEE Trans. Geosci. Remote. Sens., 58 (9): 6152-6167 (2020)Quickest Detection and Forecast of Pandemic Outbreaks: Analysis of COVID-19 Waves., , , , , , , and . IEEE Commun. Mag., 59 (9): 16-22 (2021)Distributed Detection Over Adaptive Networks: Refined Asymptotics and the Role of Connectivity., , , and . IEEE Trans. Signal Inf. Process. over Networks, 2 (4): 442-460 (2016)Single-Pulse Simultaneous Target Detection and Angle Estimation in a Multichannel Phased Array Radar., , , and . IEEE Trans. Signal Process., (2020)Refining decisions after losing data: the unlucky broker problem., , and . IEEE Trans. Signal Process., 58 (4): 1980-1990 (2010)Risk maps from landscape images for fire hazard management., , , and . IGARSS, page 1796-1799. IEEE, (2005)A study of the relationships between the real scene statistics and those of the backscattered signal., , and . IGARSS, page 5659-5662. IEEE, (2005)