Exportar 41 resultados:
Autor [ Título
Filtros: First Letter Of Last Name es W [Elimina todos los filtros]
«Adaptive Self-interference Cancellation in Wideband Full-Duplex Decode-and-Forward MIMO Relays», in IEEE 14th Int. Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Darmstadt, Germany, 2013.
1569729637.pdf (259.49 KB)
, 
«Adaptive Self-interference Cancellation in Wideband Full-Duplex Decode-and-Forward MIMO Relays», in IEEE 14th Int. Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Darmstadt, Germany, 2013.
1569729637.pdf (259.49 KB)
, 
«Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
«Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
«Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
«Autocorrelation-based adaptation rule for feedback equalization in Wideband Full-Duplex Amplify-and-Forward MIMO relays», in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013.
mimo_canceller.pdf (272.66 KB)
, 
«Autocorrelation-based adaptation rule for feedback equalization in Wideband Full-Duplex Amplify-and-Forward MIMO relays», in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013.
mimo_canceller.pdf (272.66 KB)
, 
«Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA», Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
, «Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA», Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
«The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
«Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes», in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
«On Distortion Measures Associated to Random Desynchronization Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Fast-fading channel estimator using DCT and simplified kalman filter», in Signal Processing Advances in Wireless Communications, 2007. SPAWC 2007. IEEE 8th Workshop on, 2007, pp. 1 -5.
, «Hexagonal Quantizers are not Optimal for 2-D Data Hiding», in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «A Hybrid Beamforming Design for Massive MIMO LEO Satellite Communications », Frontiers in Space Technologies, vol. 2, 2021.
, «Low-Complexity Channel Prediction Using Approximated Recursive DCT», Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 58, pp. 2520 -2530, 2011.
, «Low-Complexity Channel Prediction Using Approximated Recursive DCT», Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 58, pp. 2520 -2530, 2011.
, «MMSE filter design for Full-Duplex filter-and-forward MIMO relays under limited dynamic range», Signal Processing, vol. 156, pp. 208-219, 2019.
MMSE4FDLimitedDynamicRange.pdf (837.56 KB)
, 
«MMSE filter design for Full-Duplex filter-and-forward MIMO relays under limited dynamic range», Signal Processing, vol. 156, pp. 208-219, 2019.
MMSE4FDLimitedDynamicRange.pdf (837.56 KB)
, 
«A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 