We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Growing on-chip wire delays are motivating architectural features that expose on-chip communication to the compiler. EDGE architectures are one example of communication-exposed mi...
Katherine E. Coons, Xia Chen, Doug Burger, Kathryn...
—Carrier Sense Multiple Access (CSMA) protocols in Multi-hop Wireless Networks (MHWN) are known to suffer from different forms of the hidden and exposed terminal problems, leadin...
In many tracking scenarios, the amplitude of target returns are stronger than those coming from false alarms. This information can be used to improve the multi-target state estimat...
Daniel Clark, Branko Ristic, Ba-Ngu Vo, Ba-Tuong V...
Background: The development of software tools that analyze microarray data in the context of genetic knowledgebases is being pursued by multiple research groups using different me...