Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 2015
- Shabbir Ahmed, Raheleh Eslampanah, Robabeh Amirkhanzadeh Antiohos, Stefan Andersson, Mike Faulkner:
Baseband equalizer for TX leakage cancellation in active duplexing. ICSPCS 2015: 1-4 - Muhammad Sabbir Alam, Md. Farhad Hossain, Kumudu S. Munasinghe, Abbas Jamalipour:
Reliability and delay analysis of AUV navigation system using EM wave based underwater sensor network. ICSPCS 2015: 1-6 - Gholamreza Alirezaei, Rudolf Mathar:
An upper bound on the capacity of censored channels. ICSPCS 2015: 1-6 - Olusegun Peter Awe, Sangarapillai Lambotharan:
Cooperative spectrum sensing in cognitive radio networks using multi-class support vector machine algorithms. ICSPCS 2015: 1-7 - Alice P. Bates, Zubair Khalid, Rodney A. Kennedy:
On the use of Slepian functions for the reconstruction of the head-related transfer function on the sphere. ICSPCS 2015: 1-7 - Ibrahim Bilal, Arjan Meijerink, Mark J. Bentum:
Performance analysis of noise-based frequency offset modulation in dense frequency-selective fading channels. ICSPCS 2015: 1-7 - Jacob Boomgaarden, Joshua Corney, Holly Whittaker, George W. Dinolt, John McEachen:
Challenges in emulating sensor and resource-based state changes for Android malware detection. ICSPCS 2015: 1-10 - Dong Chen, Jason Brown, Jamil Y. Khan:
An interference mitigation approach for a dense heterogeneous wireless sensor network. ICSPCS 2015: 1-7 - He Chen, Yifan Gu, Yonghui Li, Branka Vucetic, Yuexing Peng:
Throughput analysis of wireless-powered communications with energy beamforming and adaptive time switching. ICSPCS 2015: 1-5 - Mingqi Chen, Ting Jiang, Weixia Zou:
Differential physical layer secret key generation based on weighted exponential moving average. ICSPCS 2015: 1-4 - Dae-Soon Cho, Il-Kyu Kim:
Implementation of downlink control channels for millimeter wave mobile hotspot network system. ICSPCS 2015: 1-5 - Satoshi Denno, Hidenori Osai:
A trellis-coded 16QAM receiver with virtual channels for overloaded MIMO. ICSPCS 2015: 1-5 - Kevin D'hoe, Jean-Pierre Goemaere, Nobby Stevens, Bart Nauwelaers, Lieven De Strycker:
Optimized shape of a parametric designed HF loop antenna. ICSPCS 2015: 1-5 - Glenn Dickins, Hanchi Chen, Wen Zhang:
Soundfield control for consumer device testing. ICSPCS 2015: 1-5 - Ibrahim Elgendi, Kumudu S. Munasinghe, Abbas Jamalipour:
A three-tier SDN architecture for DenseNets. ICSPCS 2015: 1-7 - Ashraf Eltholth:
Forward Backward autoregressive spectrum prediction scheme in Cognitive Radio Systems. ICSPCS 2015: 1-5 - Hamid Eltom, Kandeepan Sithamparanathan, Bill Moran, Robin J. Evans:
Spectrum occupancy prediction using a Hidden Markov Model. ICSPCS 2015: 1-8 - Haytham M. Fayek, Margaret Lech, Lawrence Cavedon:
Towards real-time Speech Emotion Recognition using deep neural networks. ICSPCS 2015: 1-5 - Samoda Gamage, Jamil Y. Khan, Duy Trong Ngo:
Geolocation database-assisted QoS-aware cognitive network architecture. ICSPCS 2015: 1-8 - Mingsheng Gao, Wei Li, Jian Li:
Performance analysis of a JSW-based MAC protocol for mobile underwater acoustic networks. ICSPCS 2015: 1-6 - Omar Gatera, Ahmet H. Kayran, Haci Ilhan:
BLM detection in AF based relay networks. ICSPCS 2015: 1-6 - Farnaz Gharari, Thi My Chinh Chu, Hans-Jürgen Zepernick:
Performance analysis of a piecewise-and-forward relay network on Rayleigh fading channels. ICSPCS 2015: 1-7 - Lingyi Han, Yuexing Peng, Yonghui Li, Hui Zhao, Jiang Zhao:
Turbo compressed channel sensing for millimeter wave communications with massive antenna arrays and RF chain constraints. ICSPCS 2015: 1-6 - Hirotaka Hayashi, Tomoaki Ohtsuki:
DOA estimation in MIMO radar using temporal spatial virtual array with MUSIC algorithm. ICSPCS 2015: 1-6 - Wen Huang, Ting Jiang, Yue Liu, Wei Liu:
Applications of software radio for hand gesture recognition by using long training symbols. ICSPCS 2015: 1-5 - Tao Huang, Jinhong Yuan, Xingqing Cheng, Wan Lei:
Advanced link-to-system modeling of MMSE-SIC receiver in MIMO-OFDM systems. ICSPCS 2015: 1-6 - Tao Huang, Jinhong Yuan, Xingqing Cheng, Wan Lei:
Design of degrees of distribution of LDS-OFDM. ICSPCS 2015: 1-6 - Abdel Y. Hussenbocus, Margaret Lech, Nicholas B. Allen:
Statistical differences in speech acoustics of major depressed and non-depressed adolescents. ICSPCS 2015: 1-7 - Nahina Islam, Kandeepan Sithamparanathan, James R. Scott:
Energy efficiency of cellular base stations with ternary-state transceivers. ICSPCS 2015: 1-7 - Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Flow-based anomaly detection using semisupervised learning. ICSPCS 2015: 1-5
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-02 05:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint