default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2017
- Haider Al-Lawati, Nuwan S. Ferdinand, Stark C. Draper:
Coded caching with non-identical user demands. CWIT 2017: 1-5 - Mayank Amencherla, Lav R. Varshney:
Color-based visual sentiment for social communication. CWIT 2017: 1-5 - Ahmadreza Amirzadeh, Mohamed Haj Taieb, Jean-Yves Chouinard:
On the design of good LDPC codes with joint genetic algorithm and linear programming optimization. CWIT 2017: 1-5 - Ahmadreza Amirzadeh, Mohamed Haj Taieb, Jean-Yves Chouinard:
Physical layer secrecy for wireless communication systems using adaptive HARQ with error contamination. CWIT 2017: 1-5 - Mohamed Lassaad Ammari, Paul Fortier:
Secrecy rate maximization for MIMO wiretap channels with channel uncertainty. CWIT 2017: 1-5 - Mohamed Lassaad Ammari, Paul Fortier:
Adaptive modulation analysis in MIMO-OSTBC systems over nakagami-M keyhole channels. CWIT 2017: 1-4 - Roberta Barbi, Pascal Felber, Hugues Mercier, Valerio Schiavoni:
Worst-case, information and all-blocks locality in distributed storage systems: an explicit comparison. CWIT 2017: 1-5 - Simon Brodeur, Jean Rouat:
Optimality of inference in hierarchical coding for distributed object-based representations. CWIT 2017: 1-5 - Pao-Sheng Chouy, Nuwan S. Ferdinand, Ihab Amerz, Stark C. Draper:
Hardware-aware motion estimation via low-resolution motion hints. CWIT 2017: 1-5 - Limeng Dong, Sergey Loyka, Yong Li:
The operational secrecy capacity of cognitive radio MIMO channel. CWIT 2017: 1-5 - Danny Dubé, Mounir Mechqrane:
Almost minimum-redundancy construction of balanced codes using limited-precision integers. CWIT 2017: 1-5 - Toluwanimi Fagorusi, Yi Feng, Jan Bajcsy:
An architecture for non-orthogonal multi-carrier faster-than-nyquist transmission. CWIT 2017: 1-5 - Yi Feng, Jan Bajcsy:
Information rate of multi-antenna spectrally-efficient FDM communication. CWIT 2017: 1-5 - Hassan Hamad, Ghassan M. Kraidy:
Performance analysis of convolutional codes over the Bernoulli-Gaussian impulsive noise channel. CWIT 2017: 1-5 - Khaled F. Hayajneh, Shahram Yousefi:
Robust LT designs in binary erasures. CWIT 2017: 1-5 - Mohammad Kazem Izadinasab, Mohamed Oussama Damen, Hossein Najafi:
Efficient lattice-reduction-aided conditional detection for MIMO systems. CWIT 2017: 1-5 - Ghassan M. Kraidy:
Convolutional code design for secure transmission on a two-link compound wiretap channel. CWIT 2017: 1-5 - Hao Li, Yunlong Cai, Benoît Champagne:
SIC aided physical-layer network coding for multi-way relay channels. CWIT 2017: 1-5 - Mehrtash Mehrabi, Masoud Ardakani:
On minimum distance of locally repairable codes. CWIT 2017: 1-5 - Nicolò Michelusi:
On population density estimation via quorum sensing. CWIT 2017: 1-5 - Toritseju Okpotse, Shahram Yousefi:
Truncated poisson distribution for encoding of systematic rateless codes in massive distributed storage systems. CWIT 2017: 1-5 - Adebola Olutayo, Julian Cheng, Jonathan F. Holzman:
Asymptotically tight performance bounds for equal-gain combining over a new correlated fading channel. CWIT 2017: 1-5 - Linchen Wang, Andrew W. Eckford:
Nonnegative code division multiple access techniques in molecular communication. CWIT 2017: 1-5 - Pradeepa Yahampath:
On linear analog coding of sources with memory over fading and broadcast channels with correlated noise. CWIT 2017: 1-5 - Jun Yan, Bingcheng Zhu, Genfa Zhang, Julian Cheng:
Optimal user node placement for multi-hop FSO broadcasting communications under weak turbulence conditions. CWIT 2017: 1-5 - Bingcheng Zhu, Julian Cheng, Jun Yan, Jinyuan Wang, Lenan Wu, Yongjin Wang:
A new technique for analyzing asymptotic outage performance of diversity over lognormal fading channels. CWIT 2017: 1-5 - 15th Canadian Workshop on Information Theory, CWIT 2017, Quebec City, QC, Canada, June 11-14, 2017. IEEE 2017, ISBN 978-1-5090-6026-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-08 12:00 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint