skip to main content
Skip header Section
An introduction to signal detection and estimation (2nd ed.)April 1994
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-94173-8
Published:01 April 1994
Pages:
398
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Liang M and Meyer F (2024). Neural Enhanced Belief Propagation for Multiobject Tracking, IEEE Transactions on Signal Processing, 72, (15-30), Online publication date: 1-Jan-2024.
  2. An J, Li H, Ng D and Yuen C (2023). Fundamental Detection Probability vs. Achievable Rate Tradeoff in Integrated Sensing and Communication Systems, IEEE Transactions on Wireless Communications, 22:12, (9835-9853), Online publication date: 1-Dec-2023.
  3. Cui W and Yu W (2023). Uncertainty Injection: A Deep Learning Method for Robust Optimization, IEEE Transactions on Wireless Communications, 22:11, (7201-7213), Online publication date: 1-Nov-2023.
  4. Herrero R (2023). Integrating cloud and mist computing to lower latency in IoT topologies, Transactions on Emerging Telecommunications Technologies, 34:10, Online publication date: 12-Oct-2023.
  5. Dehkordi S, Gaudio L, Kobayashi M, Caire G and Colavolpe G (2023). Beam-Space MIMO Radar for Joint Communication and Sensing With OTFS Modulation, IEEE Transactions on Wireless Communications, 22:10, (6737-6749), Online publication date: 1-Oct-2023.
  6. Çatalbaş B and Morgül Ö (2023). Deep learning with ExtendeD Exponential Linear Unit (DELU), Neural Computing and Applications, 35:30, (22705-22724), Online publication date: 1-Oct-2023.
  7. Bozorgi A, Bahramali A, Rezaei F, Ghafari A, Houmansadr A, Soltani R, Goeckel D and Towsley D (2023). I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, 20:5, (4135-4153), Online publication date: 1-Sep-2023.
  8. Sridhar A and Poor H (2023). Quickest Inference of Network Cascades With Noisy Information, IEEE Transactions on Information Theory, 69:4, (2494-2522), Online publication date: 1-Apr-2023.
  9. Gao J, Wu Y, Shao S, Yang W and Poor H (2023). Energy Efficiency of Massive Random Access in MIMO Quasi-Static Rayleigh Fading Channels With Finite Blocklength, IEEE Transactions on Information Theory, 69:3, (1618-1657), Online publication date: 1-Mar-2023.
  10. Pan J, Bedewy A, Sun Y and Shroff N (2022). Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay, IEEE/ACM Transactions on Networking, 31:1, (408-420), Online publication date: 1-Feb-2023.
  11. Leitinger E, Venus A, Teague B and Meyer F (2023). Data Fusion for Multipath-Based SLAM: Combining Information From Multiple Propagation Paths, IEEE Transactions on Signal Processing, 71, (4011-4028), Online publication date: 1-Jan-2023.
  12. Jiang Y and Zhang J (2023). Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks, IEEE Transactions on Information Forensics and Security, 18, (3445-3460), Online publication date: 1-Jan-2023.
  13. Wei R, Yin H, Jia J, Benson A and Li P Understanding non-linearity in graph neural networks from the perspective of Bayesian inference Proceedings of the 36th International Conference on Neural Information Processing Systems, (34024-34038)
  14. Gorantla B and Mehta N (2022). Interplay Between Interference-Aware Resource Allocation Algorithm Design, CSI, and Feedback in Underlay D2D Networks, IEEE Transactions on Wireless Communications, 21:5, (3452-3463), Online publication date: 1-May-2022.
  15. Marano S and Sayed A (2022). Decision-making algorithms for learning and adaptation with application to COVID-19 data, Signal Processing, 194:C, Online publication date: 1-May-2022.
  16. Yazar O and Gezici S (2022). Optimal pulse design for visible light positioning systems, Signal Processing, 191:C, Online publication date: 1-Feb-2022.
  17. Wei Z, Liu F, Masouros C and Poor H (2022). Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding, IEEE Transactions on Wireless Communications, 21:1, (64-79), Online publication date: 1-Jan-2022.
  18. Abadi E, Goken C, Ozturk C and Gezici S (2022). Optimal Power Allocation and Optimal Linear Encoding for Parameter Estimation in the Presence of a Smart Eavesdropper, IEEE Transactions on Signal Processing, 70, (4093-4108), Online publication date: 1-Jan-2022.
  19. Egea-Roca D, Guépié B, López-Salcedo J, Seco-Granados G and Nikiforov I (2022). Two Strategies in Transient Change Detection, IEEE Transactions on Signal Processing, 70, (1418-1433), Online publication date: 1-Jan-2022.
  20. Gaglione D, Braca P, Soldi G, Meyer F, Hlawatsch F and Win M (2022). Fusion of Sensor Measurements and Target-Provided Information in Multitarget Tracking, IEEE Transactions on Signal Processing, 70, (322-336), Online publication date: 1-Jan-2022.
  21. Kaza K, Ny J and Mahajan A Decision Referrals in Human-Automation Teams 2021 60th IEEE Conference on Decision and Control (CDC), (2842-2847)
  22. Pang S and Zhang W Generalized Nearest Neighbor Decoding for MIMO Channels with Imperfect Channel State Information 2021 IEEE Information Theory Workshop (ITW), (1-6)
  23. Ornee T and Sun Y (2021). Sampling and Remote Estimation for the Ornstein-Uhlenbeck Process Through Queues: Age of Information and Beyond, IEEE/ACM Transactions on Networking, 29:5, (1962-1975), Online publication date: 1-Oct-2021.
  24. Schlüter M, Dörpinghaus M and Fettweis G NDA Timing Estimation with 1-bit Quantization and Oversampling at the Receiver GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  25. Liu J, Zhou W, Zaimbashi A and Li H (2020). Persymmetric Adaptive Array Detection of Spread Spectrum Signals, IEEE Transactions on Information Theory, 66:12, (7828-7834), Online publication date: 1-Dec-2020.
  26. Kazıklı E, Gezici S and Yuksel S Quadratic Privacy-Signaling Games and Payoff Dominant Equilibria 2020 IEEE International Symposium on Information Theory (ISIT), (1367-1372)
  27. Jinan R, Parag P and Tyagi H Tracking an Auto-Regressive Process with Limited Communication 2020 IEEE International Symposium on Information Theory (ISIT), (2462-2467)
  28. Xu A and Coleman T Minimax Lower Bounds for Circular Source Localization 2020 IEEE International Symposium on Information Theory (ISIT), (1242-1247)
  29. ACM
    Rasheed Z, Xiong W, Cong G, Niu H, Wan J, Wang Y and Li L Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data Centers Proceedings of the 2020 5th International Conference on Machine Learning Technologies, (32-38)
  30. Hou S, Tang X, Cao L, Cui Z, Sun H and Yan Y (2019). Research on End-force Output of 8-cable Driven Parallel Manipulator, International Journal of Automation and Computing, 17:3, (378-389), Online publication date: 1-Jun-2020.
  31. Herrero R (2020). Supervised classification for dynamic CoAP mode selection in real time wireless IoT networks, Telecommunications Systems, 74:2, (145-156), Online publication date: 1-Jun-2020.
  32. Sun Y, Polyanskiy Y and Uysal E (2020). Sampling of the Wiener Process for Remote Estimation Over a Channel With Random Delay, IEEE Transactions on Information Theory, 66:2, (1118-1135), Online publication date: 1-Feb-2020.
  33. Sun M and Tay W (2019). On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks, IEEE Transactions on Information Forensics and Security, 15, (852-866), Online publication date: 1-Jan-2020.
  34. Yasodharan S and Loiseau P Nonzero-sum adversarial hypothesis testing games Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7312-7322)
  35. Goken C and Gezici S (2019). Estimation Theoretic Secure Communication via Encoder Randomization, IEEE Transactions on Signal Processing, 67:23, (6105-6120), Online publication date: 1-Dec-2019.
  36. Zhu J, Han L, Blum R and Xu Z (2019). Multi-snapshot Newtonized orthogonal matching pursuit for line spectrum estimation with multiple measurement vectors, Signal Processing, 165:C, (175-185), Online publication date: 1-Dec-2019.
  37. Zhang W, Wang Y, Shen C and Liang N (2019). A Regression Approach to Certain Information Transmission Problems, IEEE Journal on Selected Areas in Communications, 37:11, (2517-2531), Online publication date: 1-Nov-2019.
  38. Høst-Madsen A, Sabeti E and Walton C (2019). Data Discovery and Anomaly Detection Using Atypicality: Theory, IEEE Transactions on Information Theory, 65:9, (5302-5322), Online publication date: 1-Sep-2019.
  39. Su P and Wang Y (2019). Channel Estimation in Massive MIMO Systems Using a Modified Bayes-GMM Method, Wireless Personal Communications: An International Journal, 107:4, (1521-1536), Online publication date: 1-Aug-2019.
  40. Salehkalaibar S, Wigger M and Wang L (2019). Hypothesis Testing Over the Two-Hop Relay Network, IEEE Transactions on Information Theory, 65:7, (4411-4433), Online publication date: 1-Jul-2019.
  41. Kuskonmaz B, Ozkan H and Gurbuz O (2019). Machine learning based smart steering for wireless mesh networks, Ad Hoc Networks, 88:C, (98-111), Online publication date: 15-May-2019.
  42. Kazikli E, Dulek B and Gezici S (2019). Optimal Joint Modulation Classification and Symbol Decoding, IEEE Transactions on Wireless Communications, 18:5, (2623-2638), Online publication date: 1-May-2019.
  43. Li Y and Yang G (2022). Optimal stealthy false data injection attacks in cyber-physical systems, Information Sciences: an International Journal, 481:C, (474-490), Online publication date: 1-May-2019.
  44. Nguyen G, Kompella S, Kam C and Wieselthier J (2019). Information freshness over a Markov channel, Ad Hoc Networks, 86:C, (63-71), Online publication date: 1-Apr-2019.
  45. ACM
    Bellil M and Xu X A Novel Single Target Auto-annotation Algorithm for SAR Images Based on Pre-trained CNN Classifier Proceedings of the 2019 11th International Conference on Machine Learning and Computing, (253-257)
  46. Heydari J and Tajer A (2018). Quickest Search and Learning Over Correlated Sequences: Theory and Application, IEEE Transactions on Signal Processing, 67:3, (638-651), Online publication date: 1-Feb-2019.
  47. Chopra S, Gupta A, Jha R and Reggiani L (2019). Performance Analysis of Grouped Multilevel Space-Time Trellis Coding Technique Using Cognitive Radio in Different Deployment Models, Wireless Communications & Mobile Computing, 2019, Online publication date: 1-Jan-2019.
  48. Saritas S, Gezici S and Yüksel S Binary Signaling under Subjective Priors and Costs as a Game 2018 IEEE Conference on Decision and Control (CDC), (1130-1135)
  49. Sen Gupta S and Mehta N Revisiting Censoring in Energy Harvesting Wireless Sensor Networks 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  50. Mazuelas S, Shen Y and Win M (2018). Spatiotemporal Information Coupling in Network Navigation, IEEE Transactions on Information Theory, 64:12, (7759-7779), Online publication date: 1-Dec-2018.
  51. Suliman M, Ballal T and Al-Naffouri T (2018). Perturbation-based regularization for signal estimation in linear discrete ill-posed problems, Signal Processing, 152:C, (35-46), Online publication date: 1-Nov-2018.
  52. ACM
    Liu Y, Li J, Sun Y and Zhou S Joint Beam and Channel Tracking for Two-Dimensional Phased Antenna Arrays Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, (15-20)
  53. Kari D, Mirza A, Khan F, Ozkan H and Kozat S (2018). Boosted adaptive filters, Digital Signal Processing, 81:C, (61-78), Online publication date: 1-Oct-2018.
  54. Traganitis P, Pages-Zamora A and Giannakis G (2018). Blind Multiclass Ensemble Classification, IEEE Transactions on Signal Processing, 66:18, (4737-4752), Online publication date: 1-Sep-2018.
  55. Zhang J, Blum R, Kaplan L and Lu X (2018). A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data, IEEE Transactions on Information Theory, 64:9, (6180-6195), Online publication date: 1-Sep-2018.
  56. Sanyal A, Kumar P, Kar P, Chawla S and Sebastiani F (2018). Optimizing non-decomposable measures with deep networks, Machine Language, 107:8-10, (1597-1620), Online publication date: 1-Sep-2018.
  57. Keating R and Guo D (2018). Multiuser Simultaneous Two-Way Ranging, IEEE Transactions on Wireless Communications, 17:8, (5107-5119), Online publication date: 1-Aug-2018.
  58. ACM
    Qian K, Wu C, Zhang Y, Zhang G, Yang Z and Liu Y Widar2.0 Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, (350-361)
  59. Chen H and Vun C (2018). A Feature-Based Compressive Spectrum Sensing Technique for Cognitive Radio Operation, Circuits, Systems, and Signal Processing, 37:3, (1287-1314), Online publication date: 1-Mar-2018.
  60. Dai W, Shen Y and Win M (2018). A Computational Geometry Framework for Efficient Network Localization, IEEE Transactions on Information Theory, 64:2, (1317-1339), Online publication date: 1-Feb-2018.
  61. Nagananda K and Murthy C A Hypothesis Test for Topology Change Detection in Wireless Sensor Networks GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  62. Rahimzadeh F, Shahtalebi K and Parvaresh F (2017). Using NLMS Algorithms in Cyclostationary-Based Spectrum Sensing for Cognitive Radio Networks, Wireless Personal Communications: An International Journal, 97:2, (2781-2797), Online publication date: 1-Nov-2017.
  63. ACM
    Nasr M, Houmansadr A and Mazumdar A Compressive Traffic Analysis Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (2053-2069)
  64. Weinberger N and Merhav N (2017). Channel Detection in Coded Communication, IEEE Transactions on Information Theory, 63:10, (6364-6392), Online publication date: 1-Oct-2017.
  65. Dulek B (2017). Online Hybrid Likelihood Based Modulation Classification Using Multiple Sensors, IEEE Transactions on Wireless Communications, 16:8, (4984-5000), Online publication date: 1-Aug-2017.
  66. Zhang R and Venkitasubramaniam P (2017). Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems, IEEE Transactions on Information Forensics and Security, 12:7, (1555-1570), Online publication date: 1-Jul-2017.
  67. Ligo J, Moustakides G and Veeravalli V Sparse Gaussian mixture detection: Low complexity, high performance tests via quantization 2017 IEEE International Symposium on Information Theory (ISIT), (1277-1281)
  68. Zhang J, Chen Z, Blum R, Lu X and Xu W (2017). Ordering for Reduced Transmission Energy Detection in Sensor Networks Testing a Shift in the Mean of a Gaussian Graphical Model, IEEE Transactions on Signal Processing, 65:8, (2178-2189), Online publication date: 1-Apr-2017.
  69. Eedara P, Li H, Janakiraman N, Tungala N, Chamberland J and Huff G (2017). Occupancy Estimation With Wireless Monitoring Devices and Application-Specific Antennas, IEEE Transactions on Signal Processing, 65:8, (2123-2135), Online publication date: 1-Apr-2017.
  70. Wang L, Wang L, Zeng Y and Wang M (2017). Radar and Jammer Power Allocation Strategy Based on Matrix Game, Procedia Computer Science, 107:C, (478-483), Online publication date: 1-Apr-2017.
  71. Ban Y, Xu M, Zhao Z, Li Y and Ding Z Cluster Formation with Data-Assisted Channel Estimation in Cloud-Radio Access Networks 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  72. Kibria S, Kim J and Raich R Sparse error correction with multiple measurement vectors: Observability-aware approach 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4351-4355)
  73. Dong L, Yan Q, Lv Y and Deng S (2017). Full band watermarking in DCT domain with Weibull model, Multimedia Tools and Applications, 76:2, (1983-2000), Online publication date: 1-Jan-2017.
  74. Ali A, Masood M, Sohail M, Al-Ghadhban S and Al-Naffouri T (2016). Narrowband Interference Mitigation in SC-FDMA Using Bayesian Sparse Recovery, IEEE Transactions on Signal Processing, 64:24, (6471-6484), Online publication date: 1-Dec-2016.
  75. Bays M, Shende A and Stilwell D (2016). Multi-agent motion planning using Bayes risk, Robotics and Autonomous Systems, 86:C, (1-12), Online publication date: 1-Dec-2016.
  76. ACM
    Nasiriani N, Wang C, Kesidis G, Urgaonkar B, Chen L and Birke R (2016). On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 2:1, (1-28), Online publication date: 18-Nov-2016.
  77. Malik H, Subbalakshmi K and Chandramouli R (2016). Joint-channel modeling to attack QIM steganography, Multimedia Tools and Applications, 75:21, (13585-13611), Online publication date: 1-Nov-2016.
  78. Sabeti E and Høst-Madsen A Atypicality for the class of exponential family 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (641-648)
  79. Wen C, Zhang J, Wong K, Chen J and Yuen C (2016). On Sparse Vector Recovery Performance in Structurally Orthogonal Matrices via LASSO, IEEE Transactions on Signal Processing, 64:17, (4519-4533), Online publication date: 1-Sep-2016.
  80. Gezici S, Bayram S, Kurt M and Gholami M (2016). Optimal Jammer Placement in Wireless Localization Systems, IEEE Transactions on Signal Processing, 64:17, (4534-4549), Online publication date: 1-Sep-2016.
  81. Razavi A, Valkama M and Cabric D (2016). Compressive Detection of Random Subspace Signals, IEEE Transactions on Signal Processing, 64:16, (4166-4179), Online publication date: 15-Aug-2016.
  82. Geng Y and Pahlavan K (2016). Design, Implementation, and Fundamental Limits of Image and RF Based Wireless Capsule Endoscopy Hybrid Localization, IEEE Transactions on Mobile Computing, 15:8, (1951-1964), Online publication date: 1-Aug-2016.
  83. Lin G, Chang M, Chang Y and Yeh C (2016). A gender classification scheme based on multi-region feature extraction and information fusion for unconstrained images, Multimedia Tools and Applications, 75:16, (9775-9795), Online publication date: 1-Aug-2016.
  84. Hu Q, Peng M, Mao Z, Xie X and Poor H (2016). Training Design for Channel Estimation in Uplink Cloud Radio Access Networks, IEEE Transactions on Signal Processing, 64:13, (3324-3337), Online publication date: 1-Jul-2016.
  85. Chen K and Natarajan B (2016). Evaluating Node Reliability in Cooperative MIMO Networks, IEEE Transactions on Information Forensics and Security, 11:7, (1453-1460), Online publication date: 1-Jul-2016.
  86. Francis J, Mehta N and Ananya S (2016). Best-M Feedback in OFDM: Base-Station-Side Estimation and System Implications, IEEE Transactions on Wireless Communications, 15:5, (3616-3627), Online publication date: 1-May-2016.
  87. Granstrom K, Willett P and Bar-Shalom Y (2016). Asymmetric Threat Modeling Using HMMs, IEEE Transactions on Signal Processing, 64:10, (2587-2601), Online publication date: 1-May-2016.
  88. Elkhalil K, Kammoun A, Al-Naffouri T and Alouini M (2016). Analytical Derivation of the Inverse Moments of One-Sided Correlated Gram Matrices With Applications, IEEE Transactions on Signal Processing, 64:10, (2624-2635), Online publication date: 1-May-2016.
  89. Wen C, Wang C, Jin S, Wong K and Ting P (2016). Bayes-Optimal Joint Channel-and-Data Estimation for Massive MIMO With Low-Precision ADCs, IEEE Transactions on Signal Processing, 64:10, (2541-2556), Online publication date: 1-May-2016.
  90. Garnaev A, Baykal-Gursoy M and Poor H (2016). A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes, IEEE Transactions on Wireless Communications, 15:3, (2155-2163), Online publication date: 1-Mar-2016.
  91. He X, Dai H, Shen W, Ning P and Dutta R (2016). Toward Proper Guard Zones for Link Signature, IEEE Transactions on Wireless Communications, 15:3, (2104-2117), Online publication date: 1-Mar-2016.
  92. Ghobadzadeh A, Gazor S, Naderpour M and Tadaion A (2016). Asymptotically Optimal CFAR Detectors, IEEE Transactions on Signal Processing, 64:4, (897-909), Online publication date: 1-Feb-2016.
  93. Sadreazami H, Ahmad M and Swamy M (2016). Multiplicative Watermark Decoder in Contourlet Domain Using the Normal Inverse Gaussian Distribution, IEEE Transactions on Multimedia, 18:2, (196-207), Online publication date: 1-Feb-2016.
  94. Manton J and Amblard P (2015). A Primer on Reproducing Kernel Hilbert Spaces, Foundations and Trends in Signal Processing, 8:1–2, (1-126), Online publication date: 1-Dec-2015.
  95. Im S, Jeon H, Choi J and Ha J (2015). Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack, IEEE Transactions on Wireless Communications, 14:12, (6579-6594), Online publication date: 1-Dec-2015.
  96. Ewert W, Dembski W and Marks R (2015). Measuring meaningful information in images, IET Computer Vision, 9:6, (884-894), Online publication date: 1-Dec-2015.
  97. Ozdemir O, Wimalajeewa T, Dulek B, Varshney P and Wei Su (2015). Asynchronous Linear Modulation Classification With Multiple Sensors via Generalized EM Algorithm, IEEE Transactions on Wireless Communications, 14:11, (6389-6400), Online publication date: 1-Nov-2015.
  98. Soganci H, Gezici S and Arikan O (2015). Optimal Signal Design for Multi-Parameter Estimation Problems, IEEE Transactions on Signal Processing, 63:22, (6074-6085), Online publication date: 1-Nov-2015.
  99. Margoosian A, Abouei J and Plataniotis K (2015). An Accurate Kernelized Energy Detection in Gaussian and non-Gaussian/Impulsive Noises, IEEE Transactions on Signal Processing, 63:21, (5621-5636), Online publication date: 1-Nov-2015.
  100. Momeni H, Abutalebi H and Tadaion A (2015). Joint detection and estimation of speech spectral amplitude using noncontinuous gain functions, IEEE/ACM Transactions on Audio, Speech and Language Processing, 23:8, (1249-1258), Online publication date: 1-Aug-2015.
  101. ACM
    He T, Liu C, Swami A, Towsley D, Salonidis T, Bejan A and Yu P (2015). Fisher Information-based Experiment Design for Network Tomography, ACM SIGMETRICS Performance Evaluation Review, 43:1, (389-402), Online publication date: 24-Jun-2015.
  102. ACM
    He T, Liu C, Swami A, Towsley D, Salonidis T, Bejan A and Yu P Fisher Information-based Experiment Design for Network Tomography Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, (389-402)
  103. Song D and Zhao H (2015). Stochastic Formulation of (a,b,c,d)-Bandlimited Signal Reconstruction, Circuits, Systems, and Signal Processing, 34:6, (2053-2064), Online publication date: 1-Jun-2015.
  104. Dikmese S, Sofotasios P, Ihalainen T, Renfors M and Valkama M (2015). Efficient Energy Detection Methods for Spectrum Sensing Under Non-Flat Spectral Characteristics, IEEE Journal on Selected Areas in Communications, 33:5, (755-770), Online publication date: 1-May-2015.
  105. Chao-Kai Wen , Shi Jin , Kai-Kit Wong , Jung-Chieh Chen and Pangan Ting (2015). Channel Estimation for Massive MIMO Using Gaussian-Mixture Bayesian Learning, IEEE Transactions on Wireless Communications, 14:3, (1356-1368), Online publication date: 1-Mar-2015.
  106. Whipps G, Ertin E and Moses R (2015). Distributed Detection of Binary Decisions with Collisions in a Large, Random Network, IEEE Transactions on Signal Processing, 63:6, (1477-1489), Online publication date: 1-Mar-2015.
  107. Dulek B, Ozdemir O, Varshney P and Wei Su (2015). Distributed Maximum Likelihood Classification of Linear Modulations Over Nonidentical Flat Block-Fading Gaussian Channels, IEEE Transactions on Wireless Communications, 14:2, (724-737), Online publication date: 1-Feb-2015.
  108. Xiong H, Chen Z, An W and Yang B (2015). Robust TDOA localization algorithm for asynchronous wireless sensor networks, International Journal of Distributed Sensor Networks, 2015, (10-10), Online publication date: 1-Jan-2015.
  109. Wenhan Dai , Yuan Shen and Win M (2015). Distributed Power Allocation for Cooperative Wireless Network Localization, IEEE Journal on Selected Areas in Communications, 33:1, (28-40), Online publication date: 1-Jan-2015.
  110. Lian F, Liu J, Mallick M and Han C (2015). Joint detection and estimation error bounds for an unresolved target-group using single or multiple sensors, Digital Signal Processing, 36:C, (26-38), Online publication date: 1-Jan-2015.
  111. Lin C, Horng G, Wang C and Yang J (2015). Using Direction of Arrival to Detect Cognitive Traffic Sign in City Environments, Wireless Personal Communications: An International Journal, 80:2, (693-708), Online publication date: 1-Jan-2015.
  112. Pahlajani C, Sun J, Poulakakis I and Tanner H (2014). Error probability bounds for nuclear detection, Automatica (Journal of IFAC), 50:10, (2470-2481), Online publication date: 1-Oct-2014.
  113. ACM
    Celik G and Celebi H CRLB Analysis of Time Delay Based Location Estimation for UWB Cooperative Relay Networks in Multipath Environments Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (146-151)
  114. ACM
    Zhao H, Chen Y, Wang R and Malik H Audio source authentication and splicing detection using acoustic environmental signature Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (159-164)
  115. Bayram S, Gultekin S and Gezici S (2014). Noise enhanced hypothesis-testing according to restricted Neyman-Pearson criterion, Digital Signal Processing, 25:C, (17-27), Online publication date: 1-Feb-2014.
  116. ACM
    Kim J and Tiwari S (2014). Inexact computing using probabilistic circuits, ACM Journal on Emerging Technologies in Computing Systems, 10:2, (1-23), Online publication date: 1-Feb-2014.
  117. Hügel M, Rauhut H and Strohmer T (2014). Remote Sensing via ℓ1-Minimization, Foundations of Computational Mathematics, 14:1, (115-150), Online publication date: 1-Feb-2014.
  118. ACM
    Kutzner S, Poschmann A and Stöttinger M Hardware trojan design and detection Proceedings of the Workshop on Embedded Systems Security, (1-9)
  119. ACM
    Klein D, Venkateswaran S, Isaacs J, Burman J, Pham T, Hespanha J and Madhow U (2013). Localization with sparse acoustic sensor network using UAVs as information-seeking data mules, ACM Transactions on Sensor Networks, 9:3, (1-29), Online publication date: 1-May-2013.
  120. Shang F, Champagne B and Psaromiligkos I (2013). Time of arrival and power delay profile estimation for IR-UWB systems, Signal Processing, 93:5, (1317-1327), Online publication date: 1-May-2013.
  121. ACM
    Zhang Z, Trinkle M, Li H and Dimitrovski A Combating time synchronization attack Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, (141-149)
  122. Bouabdallah F, Bouabdallah N and Boutaba R (2013). Reliable and energy efficient cooperative detection in wireless sensor networks, Computer Communications, 36:5, (520-532), Online publication date: 1-Mar-2013.
  123. Soto M, Pezoa J and Torres S Thermal noise estimation and removal in MRI Proceedings of the 16th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, (47-54)
  124. Jaeyoon Kim and Tiwari S Inexact computing for ultra low-power nanometer digital circuit design Proceedings of the 2011 IEEE/ACM International Symposium on Nanoscale Architectures, (24-31)
  125. Nguyen N, Jones D, Yang Y and Liu C (2011). Flow vision for autonomous underwater vehicles via an artificial lateral line, EURASIP Journal on Advances in Signal Processing, 2011, (1-11), Online publication date: 1-Jan-2011.
  126. Dalkilic O, Ekrem E, Varlik S and Mihcak M (2010). A detection theoretic approach to digital fingerprinting with focused receivers under uniform linear averaging Gaussian attacks, IEEE Transactions on Information Forensics and Security, 5:4, (658-669), Online publication date: 1-Dec-2010.
  127. Vicen-Bueno R, Jarabo-Amores M, Rosa-Zurera M, Sanz-González J and Maldonado-Bascón S (2010). Importance Sampling for Objective Function Estimations in Neural Detector Training Driven by Genetic Algorithms, Neural Processing Letters, 32:3, (249-268), Online publication date: 1-Dec-2010.
  128. Yang Y, Song M, Li N, Bu J and Chen C what is the chance of happening Proceedings of the 11th European conference on Computer vision: Part V, (631-643)
  129. ACM
    Chin J, Rao N, Yau D, Shankar M, Yang Y, Hou J, Srivathsan S and Iyengar S (2010). Identification of low-level point radioactive sources using a sensor network, ACM Transactions on Sensor Networks, 7:3, (1-35), Online publication date: 1-Sep-2010.
  130. Panayirci E, Şenol H and Poor H (2010). Joint channel estimation, equalization, and data detection for OFDM systems in the presence of very high mobility, IEEE Transactions on Signal Processing, 58:8, (4225-4238), Online publication date: 1-Aug-2010.
  131. Bayram S, Gezici S and Poor H (2010). Noise enhanced hypothesis-testing in the restricted Bayesian framework, IEEE Transactions on Signal Processing, 58:8, (3972-3989), Online publication date: 1-Aug-2010.
  132. Hazan A, Verleysen M, Cottrell M and Lacaille J Trajectory clustering for vibration detection in aircraft engines Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (362-375)
  133. Chen Y, Lin W and Liu K (2010). Risk-distortion analysis for video collusion attacks, IEEE Transactions on Image Processing, 19:7, (1798-1807), Online publication date: 1-Jul-2010.
  134. ACM
    Shanbhag N, Abdallah R, Kumar R and Jones D Stochastic computation Proceedings of the 47th Design Automation Conference, (859-864)
  135. Caire G, Jindal N, Kobayashi M and Ravindran N (2010). Multiuser MIMO achievable rates with downlink training and channel state, IEEE Transactions on Information Theory, 56:6, (2845-2866), Online publication date: 1-Jun-2010.
  136. Comesaña P, Merhav N and Barni M (2010). Asymptotically optimum universal watermark embedding and detection in the high-SNR regime, IEEE Transactions on Information Theory, 56:6, (2804-2815), Online publication date: 1-Jun-2010.
  137. ACM
    Zhang Y, Srivastava A and Zahran M (2010). On-chip sensor-driven efficient thermal profile estimation algorithms, ACM Transactions on Design Automation of Electronic Systems, 15:3, (1-27), Online publication date: 1-May-2010.
  138. Polyanskiy Y, Poor H and Verdú S (2010). Channel coding rate in the finite blocklength regime, IEEE Transactions on Information Theory, 56:5, (2307-2359), Online publication date: 1-May-2010.
  139. Khan Z, Lehtomäki J, Codreanu M, Latva-aho M and DaSilva L (2010). Throughput-efficient dynamic coalition formation in distributed cognitive radio networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  140. Le Nir V and Scheers B (2010). Distributed power allocation for parallel broadcast channels with only common information in cognitive tactical radio networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-10), Online publication date: 1-Apr-2010.
  141. Marano S, Matta V and Mazzarella F (2010). Refining decisions after losing data, IEEE Transactions on Signal Processing, 58:4, (1980-1990), Online publication date: 1-Apr-2010.
  142. ACM
    Zhang Y, Shi B and Srivastava A A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems Proceedings of the 19th international symposium on Physical design, (169-176)
  143. Rezaeian M and Vo B (2010). Error bounds for joint detection and estimation of a single object with random finite set observation, IEEE Transactions on Signal Processing, 58:3, (1493-1506), Online publication date: 1-Mar-2010.
  144. Zhang W, Poor H and Quan Z (2010). Frequency-domain correlation, IEEE Transactions on Signal Processing, 58:3, (969-979), Online publication date: 1-Mar-2010.
  145. Wimalajeewa T and Jayaweera S (2010). Distributed detection of randomly located targets in mobility-assisted sensor networks with node mobility management, EURASIP Journal on Advances in Signal Processing, 2010, (1-18), Online publication date: 1-Feb-2010.
  146. Chang C, Jiao X, Wu C, Du Y and Chang M (2010). A review of unsupervised spectral target analysis for hyperspectral imagery, EURASIP Journal on Advances in Signal Processing, 2010, (1-26), Online publication date: 1-Feb-2010.
  147. Kocak F, Celebi H, Gezici S, Qaraqe K, Arslan H and Poor H (2010). Time-Delay estimation in dispersed spectrum cognitive radio systems, EURASIP Journal on Advances in Signal Processing, 2010, (2-2), Online publication date: 1-Jan-2010.
  148. Durisi G, Schuster U, Bölcskei H and Shamai S (2010). Noncoherent capacity of underspread fading channels, IEEE Transactions on Information Theory, 56:1, (367-395), Online publication date: 1-Jan-2010.
  149. ACM
    Orjuela-Parra J, Carrillo-Ramos A, Martínez M and Flórez-Valencia L Custom services platform for mobile commerce in nomadic environments Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, (154-161)
  150. Sankar L, Mandayam N and Poor H (2009). On the sum-capacity of degraded Gaussian multiple-access relay channels, IEEE Transactions on Information Theory, 55:12, (5394-5411), Online publication date: 1-Dec-2009.
  151. Lin W, Zhao H and Liu K (2009). Behavior forensics with side information for multimedia fingerprinting social networks, IEEE Transactions on Information Forensics and Security, 4:4, (911-927), Online publication date: 1-Dec-2009.
  152. Brandenburg J and Liu J (2009). Optical signal detection in the turbulent atmosphere using p-i-n photodiodes, IEEE Journal on Selected Areas in Communications, 27:9, (1564-1571), Online publication date: 1-Dec-2009.
  153. Quan Z, Shellhammer S, Zhang W and Sayed A Spectrum sensing by cognitive radios at very low SNR Proceedings of the 28th IEEE conference on Global telecommunications, (6322-6327)
  154. Shen B, Kwak K and Bai Z Optimal linear soft fusion schemes for cooperative sensing in cognitive radio networks Proceedings of the 28th IEEE conference on Global telecommunications, (5949-5954)
  155. Akin S and Gursoy M Effective capacity analysis of cognitive radio channels for quality of service provisioning Proceedings of the 28th IEEE conference on Global telecommunications, (4964-4969)
  156. Seol D, Lim H and Im G Cooperative spectrum sensing with dynamic threshold adaptation Proceedings of the 28th IEEE conference on Global telecommunications, (4368-4373)
  157. Moghimi F, Nasri A and Schober R Lp-norm spectrum sensing for cognitive radio networks impaired by non-Gaussian noise Proceedings of the 28th IEEE conference on Global telecommunications, (901-906)
  158. Zujovic J and Guleryuz O Complexity regularized pattern matching Proceedings of the 16th IEEE international conference on Image processing, (1869-1872)
  159. Tajer A, Jajamovich G, Wang X and Moustakides G Finite-sample optimal joint target detection and parameter estimation by MIMO radars Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (1176-1180)
  160. Zhang S, Wu T and Lau V (2009). A low-overhead energy detection based cooperative sensing protocol for cognitive radio systems, IEEE Transactions on Wireless Communications, 8:11, (5575-5581), Online publication date: 1-Nov-2009.
  161. Wu M and Wen C The design of wireless sleep EEG measurement system with asynchronous pervasive sensing Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (714-721)
  162. Shafiee S and Ulukus S (2009). Mutual information games in multiuser channels with correlated jamming, IEEE Transactions on Information Theory, 55:10, (4598-4607), Online publication date: 1-Oct-2009.
  163. ACM
    Geirhofer S, Sun J, Tong L and Sadler B (2009). Cognitive frequency hopping based on interference prediction, ACM SIGMOBILE Mobile Computing and Communications Review, 13:2, (49-61), Online publication date: 25-Sep-2009.
  164. Song J, Cai H and Feng Z A novel cooperative spectrum sensing scheme based on channel-usage in cognitive radio networks Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (1556-1559)
  165. ACM
    Min A and Shin K Impact of mobility on spectrum sensing in cognitive radio networks Proceedings of the 2009 ACM workshop on Cognitive radio networks, (13-18)
  166. Kiyavash N and Moulin P (2009). Performance of orthogonal fingerprinting codes under worst-case noise, IEEE Transactions on Information Forensics and Security, 4:3, (293-301), Online publication date: 1-Sep-2009.
  167. Sadasivam S and Moulin P (2009). On estimation accuracy of desynchronization attack channel parameters, IEEE Transactions on Information Forensics and Security, 4:3, (284-292), Online publication date: 1-Sep-2009.
  168. Cha B and Kuo C (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks, IEEE Transactions on Information Forensics and Security, 4:3, (302-317), Online publication date: 1-Sep-2009.
  169. El Choubassi M and Moulin P (2009). On reliability and security of randomized detectors against sensitivity analysis attacks, IEEE Transactions on Information Forensics and Security, 4:3, (273-283), Online publication date: 1-Sep-2009.
  170. Anandkumar A, Yukich J, Tong L and Swami A (2009). Energy scaling laws for distributed inference in random fusion networks, IEEE Journal on Selected Areas in Communications, 27:7, (1203-1217), Online publication date: 1-Sep-2009.
  171. Aggarwal R, Schniter P and Koksal C (2009). Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel, IEEE Transactions on Wireless Communications, 8:8, (4276-4285), Online publication date: 1-Aug-2009.
  172. Rahman S, Ahmad M and Swamy M (2009). A new statistical detector for DWT-based additive image watermarking using the Gauss-Hermite expansion, IEEE Transactions on Image Processing, 18:8, (1782-1796), Online publication date: 1-Aug-2009.
  173. Ping L, Tong J, Yuan X and Guo Q (2009). Superposition coded modulation and iterative linear MMSE detection, IEEE Journal on Selected Areas in Communications, 27:6, (995-1004), Online publication date: 1-Aug-2009.
  174. Furon T, Jégourel C, Guyader A and Cérou F Estimating the probability of false alarm for a zero-bit watermarking technique Proceedings of the 16th international conference on Digital Signal Processing, (136-143)
  175. Heidari M, Alsindi N and Pahlavan K (2009). UDP identification and error mitigation in ToA-based indoor localization systems using neural network architecture, IEEE Transactions on Wireless Communications, 8:7, (3597-3607), Online publication date: 1-Jul-2009.
  176. Guerriero M, Willett P and Glaz J (2009). Distributed target detection in sensor networks using scan statistics, IEEE Transactions on Signal Processing, 57:7, (2629-2639), Online publication date: 1-Jul-2009.
  177. ACM
    Wang K, Walker T and Zheng Z PSkip Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1355-1364)
  178. ACM
    Kim A, Cho H and Lee Y Adaptive power allocation in spatially correlated dual-hop MIMO relay channels Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (869-873)
  179. Baidas M, Ibrahim A, Seddik K and Liu K On the impact of correlation on distributed detection in wireless sensor networks with relays deployment Proceedings of the 2009 IEEE international conference on Communications, (4406-4411)
  180. Biswas A, Aysal T, Kandeepan S, Kliazovich D and Piesiewicz R Cooperative shared spectrum sensing for dynamic cognitive radio networks Proceedings of the 2009 IEEE international conference on Communications, (2825-2829)
  181. Aysal T, Kandeepan S and Piesiewicz R Cooperative spectrum sensing with noisy hard decision transmissions Proceedings of the 2009 IEEE international conference on Communications, (2738-2742)
  182. Dabeer O Optimal transmitters for hypothesis testing over a Rayleigh fading MAC Proceedings of the 2009 IEEE international conference on Communications, (1986-1990)
  183. Song B and Haardt M Effects of imperfect channel state information on achievable rates of precoded multi-user MIMO broadcast channels with limited feedback Proceedings of the 2009 IEEE international conference on Communications, (1806-1810)
  184. Candido S and Hutchinson S Detecting intrusion faults in remotely controlled systems Proceedings of the 2009 conference on American Control Conference, (4968-4973)
  185. Li Z, Dehaene W and Gielen G (2009). A 3-tier UWB-based indoor localization system for ultra-low-power sensor networks, IEEE Transactions on Wireless Communications, 8:6, (2813-2818), Online publication date: 1-Jun-2009.
  186. Yang Y, Blum R and Sadler B (2009). Energy-efficient routing for signal detection in wireless sensor networks, IEEE Transactions on Signal Processing, 57:6, (2050-2063), Online publication date: 1-Jun-2009.
  187. Navarro-Moreno J, Estudillo-Martínez M, Fernández-Alcalá R and Ruiz-Molina J (2009). Estimation of improper complex-valued random signals in colored noise by using the Hilbert space theory, IEEE Transactions on Information Theory, 55:6, (2859-2867), Online publication date: 1-Jun-2009.
  188. Oya A, Navarro-Moreno J and Ruiz-Molina J (2009). A numerical solution for multichannel detection, IEEE Transactions on Communications, 57:6, (1734-1742), Online publication date: 1-Jun-2009.
  189. ACM
    Maierbacher G and Barros J (2009). Low-complexity coding and source-optimized clustering for large-scale sensor networks, ACM Transactions on Sensor Networks, 5:3, (1-32), Online publication date: 1-May-2009.
  190. Marano S, Matta V and Willett P (2009). Distributed detection with censoring sensors under physical layer secrecy, IEEE Transactions on Signal Processing, 57:5, (1976-1986), Online publication date: 1-May-2009.
  191. Sieskul B, Zheng F and Kaiser T A hybrid SS-ToA wireless NLoS geolocation based on path attenuation Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2744-2749)
  192. Duan D, Yang L and Principe J Cooperative diversity of spectrum sensing in cognitive radio networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (745-750)
  193. Shen B, Cui T, Kwak K, Zhao C and Zhou Z An optimal soft fusion scheme for cooperative spectrum sensing in cognitive radio network Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (493-497)
  194. Lázaro M, Sánchez-Fernández M and Artés-Rodríguez A (2009). Optimal sensor selection in binary heterogeneous sensor networks, IEEE Transactions on Signal Processing, 57:4, (1577-1587), Online publication date: 1-Apr-2009.
  195. Kim T and Caire G (2009). Diversity gains of power control with noisy CSIT in MIMO channels, IEEE Transactions on Information Theory, 55:4, (1618-1626), Online publication date: 1-Apr-2009.
  196. Predd J, Kulkarni S and Poor H (2009). A collaborative training algorithm for distributed learning, IEEE Transactions on Information Theory, 55:4, (1856-1871), Online publication date: 1-Apr-2009.
  197. Kobayashi M, Debbah M and Shamai S (2009). Secured communication over frequency-selective fading channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-19), Online publication date: 1-Mar-2009.
  198. Oya A, Navarro-Moreno J and Ruiz-Molina J (2009). Numerical evaluation of reproducing Kernel Hilbert space inner products, IEEE Transactions on Signal Processing, 57:3, (1227-1233), Online publication date: 1-Mar-2009.
  199. Ding M and Blostein S (2009). MIMO minimum total MSE transceiver design with imperfect CSI at both ends, IEEE Transactions on Signal Processing, 57:3, (1141-1150), Online publication date: 1-Mar-2009.
  200. Quan Z, Cui S, Sayed A and Poor H (2009). Optimal multiband joint detection for spectrum sensing in cognitive radio networks, IEEE Transactions on Signal Processing, 57:3, (1128-1140), Online publication date: 1-Mar-2009.
  201. Briassouli A, Tsiminaki V and Kompatsiaris I (2009). Human motion analysis via statistical motion processing and sequential change detection, Journal on Image and Video Processing, 2009, (1-1), Online publication date: 1-Jan-2009.
  202. Zhu J, Zou Y and Zheng B (2009). Cooperative detection for primary user in cognitive radio networks, EURASIP Journal on Wireless Communications and Networking, 2009, (1-9), Online publication date: 1-Jan-2009.
  203. Gezici S, Celebi H, Poor H and Arslan H (2009). Fundamental limits on time delay estimation in dispersed spectrum cognitive radio systems, IEEE Transactions on Wireless Communications, 8:1, (78-83), Online publication date: 1-Jan-2009.
  204. ACM
    Briassouli A and Kompatsiaris I Human activity localization via sequential change detection Proceedings of the 1st ACM international conference on Multimedia information retrieval, (260-267)
  205. ACM
    Varna A, Swaminathan A and Wu M A decision theoretic framework for analyzing binary hash-based content identification systems Proceedings of the 8th ACM workshop on Digital rights management, (67-76)
  206. ACM
    Ananthasubramaniam B and Madhow U Cooperative localization using angle of arrival measurements in non-line-of-sight environments Proceedings of the first ACM international workshop on Mobile entity localization and tracking in GPS-less environments, (117-122)
  207. Djurovic Z, Kovacevic I and Kovacevic B A new approach to robustified adaptive estimation of channels parameters Proceedings of the 12th WSEAS international conference on Systems, (136-142)
  208. El Ayadi M, Kamel M and Karray F (2008). Toward a tight upper bound for the error probability of the binary Gaussian classification problem, Pattern Recognition, 41:6, (2120-2132), Online publication date: 1-Jun-2008.
  209. Briassouli A, Mezaris V and Kompatsiaris I (2008). Combination of accumulated motion and color segmentation for human activity analysis, Journal on Image and Video Processing, 2008, (1-20), Online publication date: 1-Apr-2008.
  210. ACM
    Rohloff K and Bacşar T (2008). Deterministic and stochastic models for the detection of random constant scanning worms, ACM Transactions on Modeling and Computer Simulation, 18:2, (1-24), Online publication date: 1-Apr-2008.
  211. Xiao Z, Poursoltanmohammadi A and Sorell M Video motion detection beyond reasonable doubt Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, (1-6)
  212. Korzhik V, Imai H, Shikata J, Morales-Luna G and Gerling E On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems Transactions on data hiding and multimedia security III, (23-32)
  213. Rondeau P and Yahampath P (2008). Robust transmission of speech LSFs using hidden Markov model-based multiple description index assignments, EURASIP Journal on Audio, Speech, and Music Processing, 2008, (1-13), Online publication date: 1-Jan-2008.
  214. Mailaender L (2008). On the geolocation bounds for round-trip time-of-arrival and all non-line-of-sight channels, EURASIP Journal on Advances in Signal Processing, 2008, (37), Online publication date: 1-Jan-2008.
  215. Wen C, Chen J and Sethares W (2008). Asynchronous two-way ranging using Tomlinson-Harashima precoding and UWB signaling, EURASIP Journal on Wireless Communications and Networking, 2008, (1-13), Online publication date: 1-Jan-2008.
  216. Barton R, Zheng R, Gezici S and Veeravalli V (2008). Editorial, EURASIP Journal on Advances in Signal Processing, 2008, (1-3), Online publication date: 1-Jan-2008.
  217. Barton R and Rao D (2008). Performance capabilities of long-range UWB-IR TDOA localization systems, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
  218. ACM
    Nakamura E, Loureiro A and Frery A (2007). Information fusion for wireless sensor networks, ACM Computing Surveys, 39:3, (9-es), Online publication date: 3-Sep-2007.
  219. Kashyap A, Başar T and Srikant R (2007). Quantized consensus, Automatica (Journal of IFAC), 43:7, (1192-1203), Online publication date: 1-Jul-2007.
  220. Wang C, Ni J, Huang J, Zhang R and Huang M Robust and high capacity image watermarking based on jointly coding and embedding optimization Proceedings of the 9th international conference on Information hiding, (65-79)
  221. ACM
    Yang Y and Blum R Energy-efficient routing for signal detection under the Neyman-Pearson criterion in wireless sensor networks Proceedings of the 6th international conference on Information processing in sensor networks, (303-312)
  222. ACM
    Ash J and Potter L Robust system multiangulation using subspace methods Proceedings of the 6th international conference on Information processing in sensor networks, (61-68)
  223. Yuan Shen , Wymeersch H and Win M Fundamental Limits of Wideband Cooperative Localization via Fisher Information Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3951-3955)
  224. Yuan Shen and Win M Fundamental Limits of Wideband Localization Accuracy via Fisher Information Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3046-3051)
  225. Junsheng Liu , Ghavami M, Xiaoli Chu , Allen B and Malik W Diversity Analysis of Multi-Antenna UWB Impulse Radio Systems with Correlated Propagation Channels Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1593-1598)
  226. Cheng Z, Devarajan D and Radke R (2007). Determining vision graphs for distributed camera networks using feature digests, EURASIP Journal on Advances in Signal Processing, 2007:1, (220-220), Online publication date: 1-Jan-2007.
  227. Huang X and Zhang B Statistical robustness in multiplicative watermark detection Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing, (477-484)
  228. ACM
    Furon T Hermite polynomials as provably good functions to watermark white gaussian hosts Proceedings of the 8th workshop on Multimedia and security, (224-229)
  229. ACM
    Koval O, Voloshynovskiy S, Holotyak T and Pun T Information-theoretic analysis of steganalysis in real images Proceedings of the 8th workshop on Multimedia and security, (11-16)
  230. ACM
    Geirhofer S, Tong L and Sadler B Dynamic spectrum access in WLAN channels Proceedings of the first international workshop on Technology and policy for accessing spectrum, (14-es)
  231. Cárdenas A and Baras J B-ROC curves for the assessment of classifiers over imbalanced data sets proceedings of the 21st national conference on Artificial intelligence - Volume 2, (1581-1584)
  232. Das A, Folland R, Stocks N and Hines E (2006). Stimulus reconstruction from neural spike trains, Signal Processing, 86:7, (1720-1727), Online publication date: 1-Jul-2006.
  233. ACM
    Yu L, Yuan L, Qu G and Ephremides A Energy-driven detection scheme with guaranteed accuracy Proceedings of the 5th international conference on Information processing in sensor networks, (284-291)
  234. Lorch M, Kafura D, Fisk I, Keahey K, Carcassi G, Freeman T, Peremutov T and Rana A Authorization and Account Management in the Open Science Grid Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (17-24)
  235. ACM
    Rohloff K and Başar T The detection of RCS worm epidemics Proceedings of the 2005 ACM workshop on Rapid malcode, (81-86)
  236. Summerville D, Skormin V, Volynkin A and Moronski J Prevention of information attacks by run-time detection of self-replication in computer codes Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (54-75)
  237. Kiyavash N and Moulin P Regular simplex fingerprints and their optimality properties Proceedings of the 4th international conference on Digital Watermarking, (97-109)
  238. Furon T A survey of watermarking security Proceedings of the 4th international conference on Digital Watermarking, (201-215)
  239. Huang X and Zhang B Robust detection of transform domain additive watermarks Proceedings of the 4th international conference on Digital Watermarking, (124-138)
  240. Kyasanur P and Vaidya N (2005). Selfish MAC Layer Misbehavior in Wireless Networks, IEEE Transactions on Mobile Computing, 4:5, (502-516), Online publication date: 1-Sep-2005.
  241. ACM
    Huang Z, Du W and Chen B Deriving private information from randomized data Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (37-48)
  242. Xu P and Abshire P (2005). 2005 Special issue, Neural Networks, 18:5-6, (479-487), Online publication date: 1-Jun-2005.
  243. ACM
    Xu W, Trappe W, Zhang Y and Wood T The feasibility of launching and detecting jamming attacks in wireless networks Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (46-57)
  244. Subhadrabandhu D, Sarkar S and Anjum F RIDA Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1069-1082)
  245. Sung Y, Tong L and Poor H Sensor configuration and activation for field detection in large sensor arrays Proceedings of the 4th international symposium on Information processing in sensor networks, (22-es)
  246. Zaidi Z and Mark B Distributed mobility tracking for ad hoc networks based on an autoregressive model Proceedings of the 6th international conference on Distributed Computing, (447-458)
  247. Ramezani V, Marcus S and Fu M Risk and information in the estimation of hidden Markov models Proceedings of the 36th conference on Winter simulation, (1596-1601)
  248. Sun Z, Xue R and Feng D Optimum detection of multiplicative watermarks for digital images in the DWT domain Proceedings of the Seventh Eurographics conference on Multimedia, (173-179)
  249. ACM
    Xu W, Wood T, Trappe W and Zhang Y Channel surfing and spatial retreats Proceedings of the 3rd ACM workshop on Wireless security, (80-89)
  250. Simitopoulos D, Tsaftaris S, Boulgouris N, Briassouli A and Strintzis M (2004). Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector, EURASIP Journal on Advances in Signal Processing, 2004, (1088-1106), Online publication date: 1-Jan-2004.
  251. Chowdhury A and Chellappa R (2003). Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation, International Journal of Computer Vision, 55:1, (27-53), Online publication date: 1-Oct-2003.
  252. ACM
    Hu A and Servetto S Asymptotically optimal time synchronization in dense sensor networks Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (1-10)
  253. Velivelli A, Ngo C and Huang T Detection of documentary scene changes by audio-visual fusion Proceedings of the 2nd international conference on Image and video retrieval, (227-238)
  254. Chowdhury A and Chellappa R (2003). Face reconstruction from monocular video using uncertainty analysis and a generic model, Computer Vision and Image Understanding, 91:1-2, (188-213), Online publication date: 1-Jul-2003.
  255. Ishwar P, Puri R, Pradhan S and Ramchandran K On rate-constrained estimation in unreliable sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (178-192)
  256. Liu J, Liu J, Reich J, Cheung P and Zhao F Distributed group management for track initiation and maintenance in target localization applications Proceedings of the 2nd international conference on Information processing in sensor networks, (113-128)
  257. Liu J, Reich J and Zhao F (2003). Collaborative in-network processing for target tracking, EURASIP Journal on Advances in Signal Processing, 2003, (378-391), Online publication date: 1-Jan-2003.
  258. Sanz-González J, Andina D and Seijas J (2002). Importance Sampling and Mean-Square Error in Neural Detector Training, Neural Processing Letters, 16:3, (259-276), Online publication date: 1-Dec-2002.
  259. Poor H (2002). Dynamic Programming in Digital Communications, Journal of Optimization Theory and Applications, 115:3, (629-657), Online publication date: 1-Dec-2002.
  260. Jain A, Moulin P, Miller M and Ramchandran K (2002). Information-Theoretic Bounds on Target Recognition Performance Based on Degraded Image Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:9, (1153-1166), Online publication date: 1-Sep-2002.
  261. Gunatilaka A and Baertlein B (2001). Feature-Level and Decision-Level Fusion of Noncoincidently Sampled Sensors for Land Mine Detection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:6, (577-589), Online publication date: 1-Jun-2001.
  262. ACM
    Chandramouli R and Memon N A distributed detection framework for Steganalysis Proceedings of the 2000 ACM workshops on Multimedia, (123-126)
  263. Buzzi S, Lops M and Tulino A (2000). MMSE RAKE Reception for Asynchronous DS/CDMA Overlay Systems and Frequency-Selective Fading Channels, Wireless Personal Communications: An International Journal, 13:3, (295-318), Online publication date: 1-Jun-2000.
  264. Manwani A and Koch C (1999). Detecting and Estimating Signals in Noisy Cable Structures, II: Information Theoretical Analysis, Neural Computation, 11:8, (1831-1873), Online publication date: 1-Nov-1999.
  265. Dahlhaus D, Fleury B and Radović A (1998). A Sequential Algorithm for Joint Parameter Estimation and Multiuser Detection in DS/CDMA Systems with Multipath Propagation, Wireless Personal Communications: An International Journal, 6:1-2, (161-178), Online publication date: 1-Jan-1998.
  266. ACM
    Shepard T (1996). A channel access scheme for large dense packet radio networks, ACM SIGCOMM Computer Communication Review, 26:4, (219-230), Online publication date: 1-Oct-1996.
  267. ACM
    Shepard T A channel access scheme for large dense packet radio networks Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (219-230)
  268. Hou C and Shin K (1994). Incorporation of Optimal Timeouts into Distributed Real-Time Load Sharing, IEEE Transactions on Computers, 43:5, (528-547), Online publication date: 1-May-1994.
  269. ACM
    Posner S and Kulkarni S On-line learning of functions of bounded variation under various sampling schemes Proceedings of the sixth annual conference on Computational learning theory, (439-445)
  270. Dabak A and Johnson D Signal constellations for non-Gaussian communication problems Proceedings of the 1993 IEEE international conference on Acoustics, speech, and signal processing: digital speech processing - Volume III, (33-36)
  271. Kim S, Choi J and Dietrich C Coexistence between OFDM and pulsed radars in the 3.5 GHz band with imperfect sensing 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  272. Halaseh R and Dahlhaus D Continuous hidden Markov model based interference-aware cognitive radio spectrum occupancy prediction 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  273. Sarıtaş S, Yüksel S and Gezici S Dynamic signaling games under Nash and Stackelberg equilibria 2016 IEEE International Symposium on Information Theory (ISIT), (1631-1635)
  274. Hajiyani P, Lev-Ari H and Stanković A Mitigating bad data and measurement delay in nonlinear dynamic state estimation 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (678-681)
  275. Granström K, Willett P and Bar-Shalom Y Detectability prediction of hidden Markov models with cluttered observation sequences 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4269-4273)
  276. Ligo J, Moustakides G and Veeravalli V Rate analysis for detection of sparse mixtures 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4244-4248)
  277. Zhang X, Zhu Q and Poor H Neyman-Pearson Criterion Based Optimal Hierarchical Caching over D2D Wireless Ad-Hoc Networks 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  278. Zhang X, Zhu Q and Poor H Scaling Law Based D2D Wireless Ad-Hoc Networks in the Finite Blocklength Regime 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Contributors
  • Princeton University

Recommendations

Reviews

Vladimir Botchev

Although this book is meant for an introductory course on the basic theory of signal detection and estimation, this text, like the topic, is highly complicated. As stated in the preface, a mastery of applied probability is required, and the text does not contain tutorial appendices to make it more self-contained. Therefore, this textbook will be profitable only to those with a solid graduate-level background in probability and statistics, and systems and signals theory. The book has seven chapters. The first chapter is an introduction with a brief overview of the contents and some remarks about the notation. Each of the remaining chapters deals with a major topic in the theory of signal detection and estimation. Chapter 2 introduces hypothesis testing; the classical Bayesian, minimax, and Neyman-Pearson formulations are considered. Worked examples illustrate the theory, and several end-of-chapter exercises are provided here and in all the later chapters. Chapter 3 discusses signal detection or, in other words, procedures for detecting signals embedded in noise. Only the discrete time case is considered. The author uses numerous examples to analyze all major topics, including observation models and detector structures; performance evaluation of detection procedures; and robust detection. Estimation theory is the theme of the next two chapters. Static parameter estimation is covered in chapter 4, and time-varying (or dynamic) parameter estimation, more widely known as signal estimation, is addressed in chapter 5. Bayesian and maximum-likelihood estimation form the core of chapter 4, while Kalman and Wiener filtering are central to chapter 5. The last two chapters discuss signal detection and estimation from the more classical point of view of observations modeled as a continuous time random process. Here the author acknowledges the mathematical complexity of the material and has included some pages discussing some of the essential definitions and theorems needed to gain a deeper understanding of subsequent material. The classical pathway is then followed, covering coherent detection and Wiener processes in chapter 6. Chapter 7, on estimation, presents continuous-time Kalman filtering and the advanced topic of nonlinear filtering. This text can be recommended as a good—although complex—introductory treatment of essential background theory for the detection and estimation of signals, for both the discrete-time and the continuous-time models.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.