The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...
We consider opportunistic spectrum access for secondary users over multiple channels whose occupancy by primary users is modeled as discrete-time Markov processes. Due to hardware...
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Abstract--This paper presents a method for supporting wireless media streaming using a cache that is distributed across the mobile devices in the network. The performance of this s...
Hazem Gomaa, Geoffrey G. Messier, Robert J. Davies...
In a sequential Bayesian ranking and selection problem with independent normal populations and common known variance, we study a previously introduced measurement policy which we ...