Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 177 matches
- 2017
- Ahmed Attia Abotabl, Aria Nosratinia:
Achieving the secrecy capacity of the AWGN wiretap channel via multilevel coding. Allerton 2017: 894-901 - Soyeon Ahn, Ziqi Ke, Haris Vikalo:
Viral quasispecies reconstruction via tensor factorization. Allerton 2017: 1236-1239 - Amir Ajorlou, Ali Jadbabaie:
A game theoretic approach to promotion design in two-sided platforms. Allerton 2017: 639-641 - Mehmet S. Aktas, Sarah E. Anderson, Ann Johnston, Gauri Joshi, Swanand Kadhe, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin:
On the service capacity region of accessing erasure coded content. Allerton 2017: 17-24 - Abdullah Al-Digs, Sairaj V. Dhople, Yu Christine Chen:
Time-varying injection shift factors to predict post-contingency dynamic line flows. Allerton 2017: 302-306 - Andreea B. Alexandru, Konstantinos Gatsis, George J. Pappas:
Privacy preserving cloud-based quadratic optimization. Allerton 2017: 1168-1175 - Sulaiman A. Alghunaim, Kun Yuan, Ali H. Sayed:
Decentralized exact coupled optimization. Allerton 2017: 338-345 - James Anderson, Nikolai Matni:
Structured state space realizations for SLS distributed controllers. Allerton 2017: 982-987 - Ahmed H. Anwar, George K. Atia, Mina Guirguis:
Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks. Allerton 2017: 252-258 - Meysam Asadi, Natasha Devroye:
On the zero-error capacity of channels with noisy feedback. Allerton 2017: 642-649 - Morteza Ashraphijuo, Xiaodong Wang, Vaneet Aggarwal:
An approximation of the CP-rank of a partially sampled tensor. Allerton 2017: 604-611 - Mohsen Bahrami, Mohamed Adel Attia, Ravi Tandon, Bane Vasic:
Towards the exact rate-memory trade-off for uncoded caching with secure delivery. Allerton 2017: 878-885 - Islam El Bakoury, Bobak Nazer:
Integer-forcing architectures for uplink cloud radio access networks. Allerton 2017: 67-75 - Karim A. Banawan, Sennur Ulukus:
Private information retrieval from Byzantine and colluding databases. Allerton 2017: 1091-1098 - Jean Barbier, Nicolas Macris, Léo Miolane:
The layered structure of tensor estimation and its mutual information. Allerton 2017: 1056-1063 - Leighton Pate Barnes, Xiugang Wu, Ayfer Özgür:
A solution to cover's problem for the binary symmetric relay channel: Geometry of sets on the hamming sphere. Allerton 2017: 844-851 - Burak Bartan, Mary Wootters:
Repairing multiple failures for scalar MDS codes. Allerton 2017: 1145-1152 - Allison Beemer, Salman Habib, Christine A. Kelley, Jörg Kliewer:
A generalized algebraic approach to optimizing SC-LDPC codes. Allerton 2017: 672-679 - Michael Bell, Yuval Kochman:
On composite binary hypothesis testing with training data. Allerton 2017: 1026-1033 - Assaf Ben-Yishai, Ofer Shayevitz, Young-Han Kim:
Interactive coding for Markovian protocols. Allerton 2017: 870-877 - Alankrita Bhatt, Nadim Ghaddar, Lele Wang:
Polar coding for multiple descriptions using monotone chain rules. Allerton 2017: 565-571 - Fabio Cecchi, Sem C. Borst, Johan S. H. van Leeuwaarden, Philip A. Whiting:
Spatial mean-field limits for CSMA networks. Allerton 2017: 502-509 - Chin-Yao Chang, Sonia Martínez, Jorge Cortés:
Convex relaxation for mixed-integer optimal power flow problems. Allerton 2017: 307-314 - Yuansi Chen, Raaz Dwivedi, Martin J. Wainwright, Bin Yu:
Vaidya walk: A sampling algorithm based on the volumetric barrier. Allerton 2017: 1220-1227 - Jie Chen, Wenyi Zhang, H. Vincent Poor:
An FDR-oriented approach to multiple sequential fault detection and isolation. Allerton 2017: 629-633 - Ashish Cherukuri, Jorge Cortés:
Data-driven distributed optimization using Wasserstein ambiguity sets. Allerton 2017: 38-44 - Ameera Chowdhury, Alexander Vardy:
Improved schemes for asymptotically optimal repair of MDS codes. Allerton 2017: 950-957 - Jeff Cooper, Lev Reyzin:
Improved algorithms for distributed boosting. Allerton 2017: 806-813 - John A. W. B. Costanzo, Donatello Materassi, Bruno Sinopoli:
Inferring link changes in dynamic networks through power spectral density variations. Allerton 2017: 220-227 - Sanmay Das, Emir Kamenica, Renee Mirka:
Reducing congestion through information design. Allerton 2017: 1279-1284
skipping 147 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 19:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint