Search
Selected: T

The Relationship between Tsallis Statistics, the Fourier Transform, and Nonlinear Coupling

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Relay-Eavesdropper Channel: Cooperation for Secrecy

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The restricted isometry property for time-frequency structured random matrices

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Role of Feedback in Two-way Secure Communications

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Russian effort in establishing large atomic and molecular databases

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Second Law and Informatics

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Second Law as a Cause of the Evolution

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The second weight of generalized Reed-Muller codes in most cases

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded Message Sets

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity of the MIMO Wiretap Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Graph and Some of its Properties

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Rate Region of the Broadcast Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secret Key-Private Key Capacity Region for Three Terminals

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Sender-Excited Secret Key Agreement Model: Capacity and Error Exponents

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Sensing Capacity of Sensor Networks

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Serializability of Network Codes

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Shannon capacity of a graph and the independence numbers of its powers

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.