This paper introduces monitoring applications, which we will show differ substantially from conventional business data processing. The fact that a software system must process and...
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
How does one repeatedly choose actions so as to be fairest to the multiple beneficiaries of those actions? We examine approaches to discovering sequences of actions for which the...
We present a two-step method for identifying SISO Hammerstein systems. First, using a persistent input with retrospective cost optimization, we estimate a parametric model of the l...
Anthony M. D'Amato, Kenny S. Mitchell, Bruno Ot&aa...
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...