Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Note on "The Sequential Maximization Technique".. Operations Research, 15 (5): 828-829 (1967)Letter to the Editor - On Suboptimization: An Example.. Operations Research, 16 (3): 680-681 (1968)Multimedia Backroads: Low Bandwidth Implementations (Panel Abstract)., , , and . ACM Multimedia, page 213-214. ACM Press, (1995)A Codebook Generation Algorithm for Document Image Compression., , and . Data Compression Conference, page 300-309. IEEE Computer Society, (1997)Fast Lossy Internet Image Transmission., , and . ACM Multimedia, page 321-332. ACM Press, (1995)Profiling the X Protocol., and . SIGMETRICS, page 272-273. ACM, (1994)Fast Higher Bandwidth X., , and . MMNET, page 192-199. (1995)Better PostScript than PostScript: portable self-extracting PostScript representation of scanned document images., and . Document Recognition, volume 3027 of SPIE Proceedings, page 219-. SPIE, (1997)A Codebook Generation Algorithm for Document Image Compression, , and . CoRR, (2002)On the Cookie-Cutter Game: Search and Evasion on a Disc.. Math. Oper. Res., 15 (4): 573-596 (1990)