Export 610 results:
[ Author(Desc)] Title Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
M. Vecchio and López-Valcarce, R., A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks, Information Processing Letters, vol. 115, no. 3, pp. 408-413, 2015.PDF icon IPL_ack.pdf (380.47 KB)
K. Venugopal, Alkhateeb, A., Heath, Jr., R. W., and González-Prelcic, N., Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Worst case additive attack against quantization-based data-hiding methods, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Quantization-Based Methods: Additive Attacks Performance Analysis, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pun, T., and Pérez-González, F., Worst case additive attack against quantization-based watermarking techniques, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
S. Voloshynovskiy, Koval, O., Topak, E., Vila-Forcén, J. E., Comesaña, P., and Pun, T., On reversibility of random binning techniques: multimedia perspectives, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.PDF icon cms05.pdf (267.92 KB)