Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 257 matches
- 1994
- Julia Abrahams:
Parallelized Huffman and Hu-Tucker searching. IEEE Trans. Inf. Theory 40(2): 508-510 (1994) - Rudolf Ahlswede, Ning Cai:
On communication complexity of vector-valued functions. IEEE Trans. Inf. Theory 40(6): 2062-2067 (1994) - Rudolf Ahlswede, Zhen Zhang:
On multiuser write-efficient memories. IEEE Trans. Inf. Theory 40(3): 674-686 (1994) - Fady Alajaji, Thomas E. Fuja:
A communication channel molded on contagion. IEEE Trans. Inf. Theory 40(6): 2035-2041 (1994) - Paul H. Algoet:
The strong law of large numbers for sequential decisions under uncertainty. IEEE Trans. Inf. Theory 40(3): 609-633 (1994) - Noga Alon, Alon Orlitsky:
A lower bound on the expected length of one-to-one codes. IEEE Trans. Inf. Theory 40(5): 1670-1672 (1994) - Mona (Fahmy) Ammar, Yih-Fang Huang:
Quantization based on statistical moments for signal detection: design and analysis. IEEE Trans. Inf. Theory 40(4): 1192-1204 (1994) - Ofer Amrani, Yair Be'ery, Alexander Vardy, Feng-Wen Sun, Henk C. A. van Tilborg:
The Leech lattice and the Golay code: bounded-distance decoding and multilevel constructions. IEEE Trans. Inf. Theory 40(4): 1030-1043 (1994) - Venkat Anantharam, Ayalvadi J. Ganesh:
Correctness within a constant of an optimal buffer allocation rule of thumb. IEEE Trans. Inf. Theory 40(3): 871-882 (1994) - John B. Anderson, Elke Offer:
Reduced-state sequence detection with convolutional codes. IEEE Trans. Inf. Theory 40(3): 965-972 (1994) - Markus Antweiler:
Cross-correlation of p-ary GMW sequences. IEEE Trans. Inf. Theory 40(4): 1253-1261 (1994) - Erdal Arikan:
An upper bound on the zero-error list-coding capacity. IEEE Trans. Inf. Theory 40(4): 1237-1240 (1994) - Jonathan J. Ashley, Marie-Pierre Béal:
A note on the method of poles for code construction. IEEE Trans. Inf. Theory 40(2): 512-517 (1994) - Daniel Augot, Nicolas Sendrier:
Idempotents and the BCH bound. IEEE Trans. Inf. Theory 40(1): 204-207 (1994) - Israel Bar-David, Eli Plotnik, Raphael Rom:
Limitations of the capacity of the M-user binary adder channel due to physical considerations. IEEE Trans. Inf. Theory 40(3): 662-673 (1994) - Yoram Baram:
Corrective memory by a symmetric sparsely encoded network. IEEE Trans. Inf. Theory 40(2): 429-438 (1994) - Carl W. Baum, Venugopal V. Veeravalli:
A sequential procedure for multihypothesis testing. IEEE Trans. Inf. Theory 40(6): 1994-2007 (1994) - Amos Beimel, Benny Chor:
Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3): 786-794 (1994) - Steven M. Bellovin, Michael Merritt:
An attack on the Interlock Protocol when used for authentication. IEEE Trans. Inf. Theory 40(1): 273-275 (1994) - Sergio Benedetto, Roberto Garello, Marina Mondin, Guido Montorsi:
Geometrically uniform TCM codes over groups based on L × MPSK constellations. IEEE Trans. Inf. Theory 40(1): 137-152 (1994) - Thierry P. Berger:
The automorphism group of double-error-correcting BCH codes. IEEE Trans. Inf. Theory 40(2): 538-542 (1994) - Yuval Berger, Yair Be'ery:
Soft trellis-based decoder for linear block codes. IEEE Trans. Inf. Theory 40(3): 764-773 (1994) - W. Betts, A. Robert Calderbank, Rajiv Laroia:
Performance of nonuniform constellations on the Gaussian channel. IEEE Trans. Inf. Theory 40(5): 1633-1638 (1994) - Ezio Biglieri, Giuseppe Caire:
Symmetry properties of multilevel coded modulation. IEEE Trans. Inf. Theory 40(5): 1630-1632 (1994) - Khaled H. Biyari, William C. Lindsey:
Binary communications through noisy, non-Gaussian channels. IEEE Trans. Inf. Theory 40(2): 350-362 (1994) - Simon R. Blackburn:
A generalisation of the discrete Fourier transform: determining the minimal polynomial of a periodic sequence. IEEE Trans. Inf. Theory 40(5): 1702-1704 (1994) - Ian F. Blake:
Review of 'Source and Channel Coding: An Algorithmic Approach' (Anderson, J.B., and Mohan, S.; 1991). IEEE Trans. Inf. Theory 40(1): 289- (1994) - Mario Blaum, Jehoshua Bruck:
Coding for delay-insensitive communication with partial synchronization. IEEE Trans. Inf. Theory 40(3): 941-945 (1994) - Rick S. Blum:
Asymptotically robust detection of known signals in nonadditive noise. IEEE Trans. Inf. Theory 40(5): 1612-1619 (1994) - Pascal Bondon:
Polynomial estimation of the amplitude of a signal. IEEE Trans. Inf. Theory 40(3): 960-965 (1994)
skipping 227 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 07:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint