default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2015
- Ahmad Al-Rababa'a, Danny Dubé:
Using bit recycling to reduce the redundancy in plurally parsable dictionaries. CWIT 2015: 62-65 - Syed Salman Ali:
A novel image quality assessment metric using singular value decomposition. CWIT 2015: 170-173 - Samad Ali, Nandana Rajatheva, Matti Latva-aho:
Effect of interference of full-duplex transmissions in underlay device-to-device communication. CWIT 2015: 54-57 - Aasem N. Alyahya, Jacek Ilow:
Uplink scheduling in multi-cell MU-MIMO systems with ZF post-processing and diversity combining. CWIT 2015: 83-87 - Aasem N. Alyahya, Jacek Ilow:
Spatial stream scheduling in uplink multiuser MIMO systems with zero-forcing post-processing. CWIT 2015: 101-105 - Jorge Pedraza Arpasi:
One example of a non-Abelian group code over AWGN channels. CWIT 2015: 115-118 - Shahab Asoodeh, Fady Alajaji, Tamás Linder:
On maximal correlation, mutual information and data privacy. CWIT 2015: 27-31 - Samareh Attarsharghi, Vlastimil Masek:
Ocean current measurement using acoustic sensor network: 'Challenges, simulation, deployement'. CWIT 2015: 119-122 - Seyed Arvin Ayoughi, Wei Yu:
A DoF analysis of compress-and-forward in MIMO Gaussian relay channel with correlated noises. CWIT 2015: 182-185 - Stefania Bartoletti, Wenhan Dai, Andrea Conti, Moe Z. Win:
Wideband localization via range likelihood based on reduced dataset. CWIT 2015: 93-96 - Ian F. Blake, V. Kumar Murty, Hamid Usefi:
Higher dimensional varieties in coding theory. CWIT 2015: 1-4 - Doru Calin:
Technologies for future broadband wireless evolution. CWIT 2015: 58-61 - Zhong Cheng, Yongyi Mao, Terence Chan:
Communication of dependent messages over degraded compound channels. CWIT 2015: 156-159 - Danish Chowdhry, Raman Paranjape, Paul Laforge:
Smart home automation system for intrusion detection. CWIT 2015: 75-78 - Khalid El-Darymli, Eric W. Gill, Cecilia Moloney, Peter F. McGuire, Desmond Power:
Permutation entropy for signal analysis: A case study of synthetic aperture radar imagery. CWIT 2015: 66-70 - Ahmad Abu Al Haija, Mai Vu:
Improving transmission rate for the two-way relay channel by user cooperation. CWIT 2015: 195-199 - Mohamed Haroun, Sébastien Roy:
Adaptive block-length partitioned Viterbi algorithm. CWIT 2015: 110-114 - Khaled F. Hayajneh, Shahram Yousefi:
Overlapped fountain coding for delay-constrained priority-based broadcast applications. CWIT 2015: 79-82 - Mohammad K. Hossan, Sanjay Karmakar, Anirban Ghosh:
On the secrecy capacity of fading Gaussian wiretap channel. CWIT 2015: 36-40 - Chathura Illangakoon, Pradeepa Yahampath:
Optimal CDMA signatures for correlated sources with a multi-antenna receiver. CWIT 2015: 147-150 - Sanjay Karmakar, Anirban Ghosh:
Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits. CWIT 2015: 88-92 - Mohamad El Khaled, Paul Fortier, Mohamed Lassaad Ammari, Mohamed Hai Taieb:
Capacity of the millimeter wave underground mine channel. CWIT 2015: 123-126 - Wuling Liu, Xiaoli Chu, Jie Zhang:
On a generalised typicality with respect to general probability distributions. CWIT 2015: 165-169 - Siyu Liu, Felice Manganiello, Frank R. Kschischang:
Construction and decoding of generalized skew-evaluation codes. CWIT 2015: 9-13 - Zhen Ma, Tengchan Zeng, Gongpu Wang, Feifei Gao:
Signal detection for ambient backscatter system with multiple receiving antennas. CWIT 2015: 50-53 - Arghavan Modiri, Shahram Yousefi:
Single-source two-terminal multicast networks with overlapping demands over the binary erasure channel. CWIT 2015: 131-134 - Asieh Abolpour Mofrad, Zahra Ferdosi, Matthew Geoffrey Parker, Mohammad Hesam Tadayon:
Neural network associative memories with local coding. CWIT 2015: 178-181 - Mostafa Mohammadkarimi, Octavia A. Dobre:
A novel non-parametric method for blind identification of STBC codes. CWIT 2015: 97-100 - Thomas O'Neil, Travis Desell:
Empirical support for the high-density subset sum decision threshold. CWIT 2015: 160-164 - Toritseju Okpotse, Shahram Yousefi:
Locality-aware fountain codes for massive distributed storage systems. CWIT 2015: 18-21
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-18 00:03 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint