Export 613 results:
Author [ Title(Desc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
K. Venugopal, Alkhateeb, A., Heath, Jr., R. W., and González-Prelcic, N., Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
C. Mosquera, Scalise, S., Taricco, G., and Giunta, D., Time-transfer performance in burst-mode communication systems, in International Workshop on Digital Signal Processing Techniques for Space Communications (DSP), 2001.
C. Mosquera, Scalise, S., Taricco, G., Garofalo, G., and Giunta, D., Time-transfer performance in burst-mode communication systems, IEEE Journal on Selected Areas in Communications, vol. 19, pp. 2310-2319, 2001.
R. López-Valcarce and Dasgupta, S., Toward a theory of multirate nonlinear systems, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
E. Rodríguez-Lois and Pérez-González, F., Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes, in 2023 IEEE International Workshop on Information Forensics and Security (WIFS), 2023, pp. 1-6.PDF icon Towards_Traitor.pdf (1007.31 KB)
C. Pasquini, Comesaña, P., and Pérez-González, F., Transportation-theoretic image counterforensics to first significant digit histogram forensics, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.PDF icon cecilia_icassp2014.pdf (390.14 KB)
M. Álvarez-Díaz, Neri, M., Mosquera, C., and Corazza, G. E., Trellis Shaping Techniques for Satellite Telecommunication Systems, in International Workshop on Satellite and Space Communications (IWSSC), Leganés, Spain, 2006.
F. Balado, Pérez-González, F., and Scalise, S., Turbo Coding for Sample-Level Watermarking in the DCT Domain, in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
F. Pérez-González and Hernández, J. R., A Tutorial on Digital Watermarking, in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
P. Comesaña and Pérez-González, F., Two different approaches for attacking BOWS, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07bows.pdf (416.45 KB)
D. Vázquez-Padín, Mosquera, C., and Pérez-González, F., Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748.PDF icon icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
T. Ramírez, Mosquera, C., and López-Valcarce, R., Two-Level Frame Precoding with non-Cooperative Gateways, EURASIP Journal on Wireless Communications and Networking, 2020.PDF icon Two_Level_Frame_Precoding_with_non_Cooperative_Gateways.pdf (2.14 MB)
T. Ramírez, Mosquera, C., and López-Valcarce, R., Two-Level Precoding for High Throughput Satellites with non-Cooperative Gateways, in 22nd International Workshop on Smart Antennas (WSA), 2018.PDF icon finalversion_WSA.pdf (172.32 KB)
M. Vecchio, López-Valcarce, R., and Marcelloni, F., A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks, Applied Soft Computing, vol. 12, no. 7, pp. 1891-1901, 2011.PDF icon asoc-d-10-00754r1.pdf (597.83 KB)
F. Balado and Márquez, O. W., A Two-Stage Codebook Building Method Using Fast WAN, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
W
P. Comesaña and Pérez-González, F., On a watermarking scheme in the logarithmic domain and its perceptual advantages, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon icip07logwat.pdf (77.03 KB)
L. Pérez-Freire, Comesaña, P., Troncoso-Pastoriza, J. R., and Pérez-González, F., Watermarking security: a survey, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.PDF icon survey06security.pdf (268.87 KB)