Search
Selected: E

Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain Tradeoff

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Channel Correlation and PU Traffic Memory for Opportunistic Spectrum Scheduling

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Channel Correlations - Simple Interference Alignment Schemes with no CSIT

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Channel Memory for Multi-User Wireless Scheduling without Channel Measurement: Capacity Regions and Algorithms

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Interference Alignment in Multi-Cell Cooperative OFDMA Resource Allocation

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Opportunistic Multiuser Detection in Decentralized Multiuser MIMO Systems

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploration of AWGNC and BSC Pseudocodeword Redundancy

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exponential decreasing rate of leaked information in universal random privacy amplification

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exponential Sums, Cyclic Codes and Sequences: the Odd Characteristic Kasami Case

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exposing Pseudoweight Layers in Regular LDPC Code Ensembles

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Expurgated PPM Using Symmetric Balanced Incomplete Block Designs

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Extremes of Information Combining

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Generalized-K (EGK): A New Simple and General Model for Composite Fading Channels

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Non-Binary Low-Density Parity-Check Codes over Erasure Channels

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Range Profiling in Stepped-Frequency Radar with Sparse Recovery

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extension of the Blahut-Arimoto algorithm for maximizing directed information

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extracting randomness and dependencies via a matrix polarization

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extropy: a complementary dual of entropy

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.