Author image not provided
 Gaetano Giunta

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.09
Citation Count12
Publication count11
Publication years2007-2018
Available for download1
Average downloads per article563.00
Downloads (cumulative)563
Downloads (12 Months)15
Downloads (6 Weeks)4
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


11 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 11 of 11
Sort by:

February 2018 Signal Processing: Volume 143 Issue C, February 2018
Publisher: Elsevier North-Holland, Inc.
Citation Count: 0

In this work, we derive the optimum equalizer according to the General Maximum Likelihood (GML) principle and show the optimality of the constant-modulus algorithm (CMA) according to the GML principle. This reported discussion illustrates why CMA works well and hence is so popular. Moreover, we show that the minimization of ...
Keywords: Blind equalization, Optimality, Wireless communications, Maximum likelihood principle, Constant-modulus algorithm

November 2015 Digital Signal Processing: Volume 46 Issue C, November 2015
Publisher: Academic Press, Inc.
Citation Count: 1

A novel signal processing method for the analysis of financial and commodity price time series is here introduced to assess the predictability of financial markets. Our technique, exploiting the maximum entropy method (MEM), predicts the entropy of the next future time interval of the time series under investigation by a ...
Keywords: Autocovariance function, Optimum linear prediction, Signal processing algorithms for financial engineering, Maximum entropy theory, Time series analysis

August 2015 FICLOUD '15: Proceedings of the 2015 3rd International Conference on Future Internet of Things and Cloud
Publisher: IEEE Computer Society
Citation Count: 0

Many contexts dealing with sensitive data are constantly looking for high assurance security solutions. The Multilevel Security represents one of the toughest unresolved problems faced over many years. Information and Communications systems need to exchange data, their software needs to be patched and updated hence, they need a connection to ...
Keywords: MILS, Multilevel Security, Information Flow Control, Common Criteria, Cross Domain

October 2012 International Journal of Interdisciplinary Telecommunications and Networking: Volume 4 Issue 4, October 2012
Publisher: IGI Global
Citation Count: 1

This paper presents an interdisciplinary application of information & communication methodology to financial economics. The empirical case study reported in this contribution consists of a preliminary example of binary options stock trading. The authors have investigated the performance of a simple algorithm which includes one buy/sell order per week. They ...
Keywords: Financial Engineering, Network Platforms for Internet Banking, Statistical Analysis, Emerging Telecommunications Applications, Financial Data Extrapolation, Binary Options Stock Trading

July 2011 Computer Communications: Volume 34 Issue 11, July, 2011
Publisher: Elsevier Science Publishers B. V.
Citation Count: 1

Multicast video streaming in heterogeneous networks undergoes to very different physical constraints, in fact, such networks are characterized by different QoS parameters, involving one or more transcoding process between the sender and the receivers. Video streaming authentication algorithms must be robust to transcoding processes and must guarantee the copyright of ...
Keywords: Watermarking, Wireless networks, Authentication, Video streaming

6 published by ACM
June 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 1, May 2011
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 15,   Downloads (Overall): 563

Full text available: PDFPDF
We present a novel video stream authentication scheme which combines signature amortization by means of hash chains and an advanced watermarking technique. We propose a new hash chain construction, the Duplex Hash Chain, which allows us to achieve bit-by-bit authentication that is robust to low bit error rates. This construction ...
Keywords: Watermarking, video streaming

February 2010 IEEE Transactions on Communications: Volume 58 Issue 2, February 2010
Publisher: IEEE Press
Citation Count: 0

This letter presents an efficient method for optical code division multiple access (OCDMA) code acquisition based on unipolar optical orthogonal codes. We propose a two-dwell acquisition procedure and provide closed form expressions to analyze the system's error probabilities. Our results match the Multiple Shift (MS) algorithm, recently introduced in the ...
Keywords: code acquisition and synchronization, code-division multiple access (CDMA), optical CDMA, optical orthogonal codes (OOCs)

August 2009 IEEE Transactions on Communications: Volume 57 Issue 8, August 2009
Citation Count: 0

This paper addresses the problem of initial synchronization of pseudo-noise code. A new code acquisition technique for spread-spectrum communication systems using band-limited chip waveforms is presented. Unlike conventional power detector based on testing the estimated maximum of the ambiguity function, the devised detector exploits a fast parabolic interpolation, running on ...
Keywords: code acquisition, spread-spectrum communications, fast methods, hypothesis testing, performance analysis

June 2009 ICC'09: Proceedings of the 2009 IEEE international conference on Communications
Publisher: IEEE Press
Citation Count: 6

Localization systems based on Received Signal Strength Indicator (RSSI) exploit fingerprinting (based on extensive signal strength measurements) to calibrate the system parameters. This procedure is very expensive in terms of time as it relies on human operators. In this paper we propose a virtual calibration procedure which only exploits the ...

June 2009 ICC'09: Proceedings of the 2009 IEEE international conference on Communications
Publisher: IEEE Press
Citation Count: 0

In this work, we derive a blind equalizer that pursues the maximization of an objective function, consisting of the ratio between the square of the mean signal power and the variance of the signal power. The performance of the addressed equalizers is then investigated by focusing on DS/CDMA communication environments ...
Keywords: blind equalization, DS/CDMA communications, constant-modulus algorithm, higher-order moments

August 2007 IEEE Transactions on Signal Processing: Volume 55 Issue 8, August 2007
Publisher: IEEE Press
Citation Count: 1

Pre-Post-Rake is a known technique in spread-spectrum communications that uses one rake filter at the transmitter side (to partially precompensate for the wireless channel dispersion) and one rake filter at the receiver side (matched to the entire transmitter plus channel chain). A novel scheme based on transmitter all-pass filtering has ...
Keywords: spread-spectrum communications, signal processing algorithms for mobile communications, All-pass digital filters, rake receivers

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us