Author of the publication

A Bayesian Packet Sharing Approach for Noisy IoT Scenarios.

, , , and . IoTDI, page 305-308. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sum-rank product codes and bounds on the minimum distance., , , and . CoRR, (2021)Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical Systems., , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 67-76. Springer, (2020)Optimal detection and estimation of straight patterns.. IEEE Trans. Image Process., 5 (5): 787-792 (1996)Modified Q-functions and their use in detection analysis., and . IEEE Trans. Inf. Theory, 37 (4): 1123-1142 (1991)Vector quantization-based automatic shot boundary detection., , , and . IEEE Workshop on Multimedia Signal Processing, page 216-219. IEEE, (2002)An Analysis based Perceptually Lossless Texture Compression Method., , and . ICIP (3), page 423-427. IEEE Computer Society, (1998)Template Protection for On-Line Signature-Based Recognition Systems., , and . BIOID, volume 5372 of Lecture Notes in Computer Science, page 170-180. Springer, (2008)A federated architecture approach for Internet of Things security., , , and . EMTC, page 1-5. IEEE, (2014)The business requirements and technical fabric for the Smart City., , and . EMTC, page 1-6. IEEE, (2014)A comparison between space-time video descriptors., , and . Image Processing: Algorithms and Systems, volume 8655 of SPIE Proceedings, page 865513. SPIE, (2013)