Author of the publication

Double Generalized Threshold Models with constraint on the dispersion by the mean.

, and . Computational Statistics & Data Analysis, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double Generalized Threshold Models with constraint on the dispersion by the mean., and . Computational Statistics & Data Analysis, (2015)On a dispersion model with Pearson residual responses., and . Computational Statistics & Data Analysis, (2016)A simple, unified approach to nearly optimal multiuser detection and space-time coding., , , and . ITW, page 53-56. IEEE, (2002)Efficient Access Protocols for High Storage RFID., and . SECON, page 1-3. IEEE, (2010)Power allocation for OFDM-based cooperative relay systems., , , , and . Journal of Communications and Networks, 10 (2): 156-162 (2008)Exploiting Space-Time Correlations in an RFID Tag Field for Localization and Tracking., and . GLOBECOM, page 1-5. IEEE, (2010)3D Audio Interface for Rich Mobile Web Experiences., and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-16. Springer, (2010)Efficient real-time similarity detection for video caching and streaming., and . ICIP, page 2249-2252. IEEE, (2012)RFID Trees: A Distributed RFID Tag Storage Infrastructure for Forest Search and Rescue., and . SECON, page 253-260. IEEE, (2010)Password Streaming for RFID Privacy., and . OTM Workshops, volume 5333 of Lecture Notes in Computer Science, page 883-892. Springer, (2008)