Export 55 results:
[ Author] Title Type Year Filters: First Letter Of Title is A [Clear All Filters]
“Analog beamforming for full-duplex mmWave communication with low-resolution phase shifters”, in IEEE International Conference on Communications (ICC), Montreal, Canada (Virtual event), 2021. singlestream_caqp.pdf (368.95 KB)
, “Adaptive lattice IIR filtering revisited: convergence issues and new algorithms with improved stability properties”, IEEE Transactions on Signal Processing, vol. 49, pp. 811–821, 2001.
, “Analysis of a first-order adaptive recursive predictor”, in IEEE Conference on Decision and Control / European Control Conference (CDC/ECC), Seville, Spain, 2005. valcarce_cdc05.pdf (1.17 MB)
, “Adaptive algorithms for identification and equalization using recursive filters”, University of Vigo, Vigo, Spain, 2001. iir.pdf (3.43 MB)
, “Analog beamforming for full-duplex millimeter wave communication”, in 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, 2019. fd_analog_bf_iswcs.pdf (759.74 KB)
, “Analysis of the prewhitened constant modulus cost function”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 3, pp. 2641-2644.
, “Analysis of non-data-aided magnitude gain estimators”, in International Symposium on Image/Video Communications (ISIVC), Hammamet, Tunisia, 2006.
, “An Adaptive Feedback Canceller for Full-Duplex Relays Based on Spectrum Shaping”, IEEE J. Selected Areas in Communications, vol. 30, no. 8, pp. 1566 - 1577, 2012. jsac_paper.pdf (656.09 KB)
, “Automatic delay selection in blind channel equalization: a prewhitening + eigenvector approach”, in Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 2002.
, “On the applicability to correlated sources of a blind channel equalization method robust to order overestimation”, in IFAC Symposium on System Identification, Rotterdam, the Netherlands, 2003. painted.pdf (104.01 KB)
, “An adaptive recursive filter for autoregressive inputs”, International Journal of Adaptive Control and Signal Processing, vol. 12, pp. 467–494, 1998.
, “An algorithm for unit-norm equation-error system identification based on the method of multipliers”, IEEE Transactions on Signal Processing, vol. 51, pp. 3080–3085, 2003.
, “Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels”, in IEEE International Conference on Communications (ICC), New Orleans, LA, USA, 2000.
, “Advanced Signal Processing Techniques for Fixed and Mobile Satellite Communications”, in 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop, 2016. 1570262450.pdf (477.63 KB)
, “An Adaptive Tree Search Algorithm with Application to Multiresolution-based Perceptive Audio Coding”, in IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis, Paris, France, 1996, pp. 117–120.
, “Application of singularity detection with wavelets for pitch estimation of speech signals”, in European Signal Processing Conference (EUSIPCO), Edimburgh, UK, 1994.
, “An adaptive tiling of the time-frequency plane with application to multiresolution-based perceptive audio coding”, Signal Processing, vol. 81/2, pp. 301-319, 2001.
, “On the analysis of scheduling in dynamic duplex multi-hop mmWave cellular systems”, IEEE Transactions on Wireless Communications, vol. 14, pp. 6028 – 6042, 2015. mmWaveScheduling.pdf (801.38 KB)
, “Analysis and Design of Multirate Synchronous Sampling Schemes for Sparse Multiband Signals”, in European Signal Processing Conference (EUSIPCO 2012), 2012, pp. 1184-1188. elenanuriaeusipco2012.pdf (408.64 KB)
, “Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
, “Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010. tit-2010.pdf (240.81 KB)
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, “Array Geometry-Invariant Space-Time Opportunistic Null-Space Communications”, IEEE Access, vol. 12, p. 14, 2024.
, “Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
,