default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 180 matches
- 2022
- Farzane Amirzade, Mohammad-Reza Sadeghi, Daniel Panario:
Protograph-based LDPC codes with chordless short cycles and large minimum distance. CWIT 2022: 16-20 - Elham Anarakifirooz, Sergey Loyka:
Favorable Propagation for Wideband Massive MIMO with Non-Uniform Linear Arrays. CWIT 2022: 92-96 - Amirreza Asadzadeh, Masoud Barakatain, Stark C. Draper, Jeebak Mitra:
SAPA: Sparse Affine Projection Algorithm in ADMM-LP Decoding of LDPC Codes. CWIT 2022: 27-32 - Shahab Asoodeh:
Distribution Simulation Under Local Differential Privacy. CWIT 2022: 57-61 - Salime Bameri, Ramy H. Gohary:
A Novel Differential Decode and Forward Scheme for Channel-Unaware Two-Way Relay Networks. CWIT 2022: 74-79 - Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - Milad Dabiri, Sergey Loyka:
On The Capacity of IRS-Assisted Gaussian SIMO Channels. CWIT 2022: 6-10 - Daniel B. Dermont, Jérémy Nadal, François Leduc-Primeau:
Single-Minimum LDPC Decoding Offset Optimization Methods. CWIT 2022: 21-26 - Nadim Ghaddar, Shouvik Ganguly, Lele Wang, Young-Han Kim:
A Lego- Brick Approach to Lossy Source Coding. CWIT 2022: 45-50 - Maxim Goukhshtein, Stark C. Draper, Jeebak Mitra:
Probabilistic Shaping Using a Block-Based Bit-Level Distribution Matcher. CWIT 2022: 68-73 - Adam Gronowski, William Paul, Fady Alajaji, Bahman Gharesifard, Philippe Burlina:
Rényi Fair Information Bottleneck for Image Classification. CWIT 2022: 11-15 - Azar Hakimi, Shayan Zargari, Chintha Tellambura, Sanjeewa P. Herath:
Sum Rate Maximization of Full-Duplex MIMO Monostatic Backscatter Networks Under Residual Self-Interference. CWIT 2022: 103-108 - Mahmoud A. Hasabelnaby, Anas Chaaban:
Intra C-RAN Two-Way Multi-Pair Computation under Total Power and Fronthaul Capacity Constraints. CWIT 2022: 109-114 - O. Saatlou, Steven D. Blostein:
A Hybrid Random-Greedy Approach to User Selection for MU-MIMO Based on Pairwise Metrics. CWIT 2022: 97-102 - Ehsan Seifi, Mehran Atamanesh, Amir K. Khandani:
Performance Evaluation of Media-based Modulation in Comparison with Spatial Modulations and Legacy SISO/MIMO. CWIT 2022: 80-85 - Ferenc Cole Thierrin, Fady Alajaji, Tamás Linder:
On the Rényi Cross-Entropy. CWIT 2022: 1-5 - Pradeepa Yahampath:
An Extension to Source-Channel Coding of Correlated Gaussian Sources for a Fading GMAC Using TCVQ. CWIT 2022: 33-38 - Siyuan Yang, Yongyi Mao:
Vector Quantization of Deep Convolutional Neural Networks With Learned Codebook. CWIT 2022: 39-44 - Linfeng Ye, En-Hui Yang, Ahmed H. Salamah:
Modeling and Energy Analysis of Adversarial Perturbations in Deep Image Classification Security. CWIT 2022: 62-67 - Hen-Geul Yeh, Jun Zhou:
Space-Time Interleaved OFDM Systems in Impulsive Noise and Mobile Fading Channels. CWIT 2022: 86-91 - 17th Canadian Workshop on Information Theory, CWIT 2022, Ottawa, ON, Canada, June 5-8, 2022. IEEE 2022, ISBN 978-1-6654-9908-8 [contents]
- 2019
- Faten Ben Abdallah, Mohamed Lassaad Ammari, Paul Fortier:
Performance Analysis of Adaptive Modulation in MIMO-MRC Systems with Transmit Beamforming over Rayleigh Product Channels. CWIT 2019: 1-4 - Wahiba Abid, Sébastien Roy, Mohamed L. Ammari:
Analysis for Massive MIMO Systems with Two-Layer Linear Receive Processing. CWIT 2019: 1-6 - Nima Akbarzadeh, Aditya Mahajan:
Dynamic spectrum access under partial observations: A restless bandit approach. CWIT 2019: 1-6 - Ammar Alhosainy, Ramy H. Gohary, Ioannis Lambadaris:
A Soft Metric for Assessing the Compliance of WLAN Devices. CWIT 2019: 1-6 - Salime Bameri, Ramy H. Gohary:
Performance Analysis of a Perfect SI Cancellation Scheme for Differential Channel-Unaware TWRNs. CWIT 2019: 1-6 - Reza Rafie Borujeny, Frank R. Kschischang:
A Bounded-Noise Model for Nondispersive Optical Fiber. CWIT 2019: 1-5 - Dania Elzouki, Sorina Dumitrescu, Jun Chen:
Lattice-based Robust Distributed Source Coding for Three Correlated Sources. CWIT 2019: 1-6 - Abdallah S. Ghazy, Steve Hranilovic, Mohammad Ali Khalighi:
Angular MIMO for Underwater Wireless Optical Communications: Channel Modelling and Capacity. CWIT 2019: 1-6 - Greg Harrington, Fady Alajaji, Bahman Gharesifard:
Infection-Curing Games over Polya Contagion Networks. CWIT 2019: 1-6
skipping 150 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-24 13:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint