Search
Selected: S

Scanning and Sequential Decision Making for Multi-Dimensional Data - Part II: the Noisy Case

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduled-PEG construction of LDPC codes for Upper-Layer FEC

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduling and Codeword Length Optimization in Time Varying Wireless Networks

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduling and performance limits of networks with constantly changing topology

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduling and Pre-Conditioning in Multi-User MIMO TDD Systems

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduling in Multi-hop Wireless Networks with Priorities

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scheduling in Wireless Networks under Uncertainties: A Greedy Primal-Dual Approach

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Science metadata management for the planetary data system. The MDIM data engineering database prototype

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Scientific data searching, sharing and retrieval

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Search Process and Probabilistic Bifix Approach

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Searching for low weight pseudo-codewords

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Searching for Minimum Storage Regenerating Codes

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Searching for Voltage Graph-Based LDPC Tailbiting Codes with Large Girth

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Second order asymptotics in fixed-length source coding and intrinsic randomness

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Second-Order Resolvability, Intrinsic Randomness, and Fixed-Length Source Coding for Mixed Sources: Information Spectrum Approach

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Second-Order Weight Distributions

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Secrecy capacity of a class of orthogonal relay eavesdropper channels

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Secrecy Capacity of the Gaussian Wire-Tap Channel with Finite Complex Constellation Input

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Secrecy Capacity of the Wiretap Channel with Noisy Feedback

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Secrecy Capacity over Correlated Ergodic Fading Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.