Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 121 matches
- 2016
- Assad Akhlaq, Robby G. McKilliam, André Pollok:
Robustness of the least squares range estimator. AusCTW 2016: 147-152 - Hamdan Awan:
Effect of retroactivity on the performance of molecular communication networks. AusCTW 2016: 35-40 - Farhana Bashar, Thushara D. Abhayapala, S. M. Akramus Salehin:
On bandwidth of broadband wavefields observed over spatial regions. AusCTW 2016: 41-46 - Dora Boviz, Gopalasingham Aravinthan, Chung Shue Chen, Laurent Roullet:
Physical layer split for user selective uplink joint reception in SDN enabled cloud-RAN. AusCTW 2016: 83-88 - Ni Ding, Chung Chan, Tie Liu, Rodney A. Kennedy, Parastoo Sadeghi:
A game-theoretic perspective on communication for omniscience. AusCTW 2016: 95-100 - Zihao Gao, He Henry Chen, Yonghui Li, Branka Vucetic:
Wireless-powered communications with two-way information flow: Protocols and throughput regions. AusCTW 2016: 29-34 - Xiaoxi Guo, Alex S. Leong, Subhrakanti Dey:
Power allocation for estimation outage minimization with secrecy outage constraints. AusCTW 2016: 71-76 - Stephen V. Hanly, Iain B. Collings, Zeeshan Azmat Shaikh, Philip Whiting:
Law of large numbers analysis of antenna selection aided downlink beamforming in massive MISO under RF chains constraint. AusCTW 2016: 163-168 - Seyed Ali Hesammohseni, Mohamed Oussama Damen:
Provably near optimal link scheduling and power control for wireless device-to-device networks. AusCTW 2016: 47-52 - Gou Hosoya, Hiroyuki Yashima:
Constellation shaping for non-uniform signals in bit-interleaved coded modulation combined with multi-stage decoding. AusCTW 2016: 181-186 - Yeqing Hu, Yi Hong, Jamie S. Evans:
SIR coverage in an uplink poisson cellular network with LoS massive MIMO. AusCTW 2016: 187-192 - Yifei Huang, Ali A. Nasir, Salman Durrani, Xiangyun Zhou:
Graphical generalization of power control in multiuser interference channels. AusCTW 2016: 136-140 - Chuling Huang, Parastoo Sadeghi, Ali A. Nasir:
BER performance analysis and optimization for energy harvesting two-way relay networks. AusCTW 2016: 65-70 - Shama Naz Islam, Salman Durrani, Parastoo Sadeghi:
Multi-pair two-way relay networks: Interference management using lattice codes and amplify and compute relaying. AusCTW 2016: 1-6 - Sarah J. Johnson, Vikram Arkalgud Chandrasetty, Andrew M. Lance:
Repeat-accumulate codes for reconciliation in continuous variable quantum key distribution. AusCTW 2016: 18-23 - Adriel Kind:
Information flow in stochastic computers. AusCTW 2016: 101-106 - Min Li, Chunshan Liu, Hajime Suzuki, Stephen V. Hanly, Iain B. Collings, Philip Whiting:
Measurements and analysis of multiuser MIMO-OFDM channels in campus environment. AusCTW 2016: 157-162 - Chenxi Liu, Robert A. Malaney:
Location-based beamforming for Rician wiretap channels. AusCTW 2016: 124-129 - Amin Movahed, Mark C. Reed, Neda Aboutorab:
Hyperbolic mapping method for turbo compressive sensing. AusCTW 2016: 24-28 - Ronald Mulinde, Khoa D. Nguyen, William G. Cowley, Md. Noor-A-Rahim:
Coding architecture for optical eU-OFDM transmission over AWGN. AusCTW 2016: 175-180 - Vahid Naghshin, Mark C. Reed, Neda Aboutorab:
Optimizing downlink coverage performance in two-tier heterogeneous cellular networks. AusCTW 2016: 107-111 - Bao Nguyen, Terence Chan, David Haley, Robby G. McKilliam:
Using Gaussian pulses in physical-layer network coding with symbol misalignment. AusCTW 2016: 77-82 - Md. Noor-A-Rahim, Gottfried Lechner, Khoa D. Nguyen:
Density evolution analysis of spatially coupled LDPC codes over BIAWGN channel. AusCTW 2016: 13-17 - Tri Pham, Graeme K. Woodward, Philippa A. Martin:
Channel estimation and data detection for insufficient cyclic prefix SIMO-OFDM with pilot sub-carriers. AusCTW 2016: 141-146 - Bhathiya Pilanawithana, Saman Atapattu, Jamie S. Evans:
Distribution of number of users per cell in a poisson wireless network with shadowing. AusCTW 2016: 153-156 - Yinyue Qiu, David Haley, Terence Chan, Linda M. Davis:
Game theoretic framework for studying WBAN coexistence: 2-Player game analysis and n-player game estimation. AusCTW 2016: 53-58 - Ginige Singithi Himashini de Silva, William G. Cowley, Gottfried Lechner:
Using channel state information for low-latency applications in free-space optical communication. AusCTW 2016: 7-12 - Sudhir Singh, Paul D. Teal, Pawel A. Dmochowski, Alan J. Coulson:
Robust cooperative relay beamforming for cognitive radio networks. AusCTW 2016: 89-94 - Amanthi Thudugalage, Saman Atapattu, Jamie S. Evans:
Beamforming for total energy maximization in MISO networks. AusCTW 2016: 112-117 - Huiyang Wang, Eryk Dutkiewicz, Gengfa Fang, Markus Dominik Mueck:
A fair spectrum sharing framework based on topological sort and max weight for femtocells. AusCTW 2016: 169-174
skipping 91 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-21 18:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint