Exportar 535 resultados:
[ Autor(Desc)] Título Tipo Año
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
M. Vecchio y López-Valcarce, R., «A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks», Information Processing Letters, vol. 115, n.º 3, pp. 408-413, 2015.Icono PDF IPL_ack.pdf (380.47 KB)
K. Venugopal, Alkhateeb, A., Heath, Jr., R. W., y González-Prelcic, N., «Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., y Sanna, A., «Co-creating Security-and-Privacy-by-Design Systems», in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., y Pun, T., «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., y Pun, T., «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pun, T., y Pérez-González, F., «Worst case additive attack against quantization-based watermarking techniques», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
S. Voloshynovskiy, Koval, O., Topak, E., Vila-Forcén, J. E., Comesaña, P., y Pun, T., «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.Icono PDF cms05.pdf (267.92 KB)