Export 71 results:
Author Title [ Type] Year Filters: First Letter Of Title is S [Clear All Filters]
“Spatial Modulation Link Adaptation: a Deep Learning Approach”, in 2019 53rd Asilomar Conference on Signals, Systems, and Computers, California, 2019. Asilomar_2019_vf.pdf (314.11 KB)
, “Spatial Modulation for Beyond 5G Communications: Capacity Calculation and Link Adaptation”, in 2nd XoveTIC Conference, A Coruña (Spain), 2019. XoveTIC2019_published.pdf (377.92 KB)
, “Solving the Node Localization Problem in WSNs by a Two-objective Evolutionary Algorithm and Gradient Descent”, in the 3-th IEEE World Congress on Nature and Biologically Inspired Computing (NaBIC 2011), 2011. nabic2011.pdf (227.26 KB)
, “SNR Estimation with Heterogeneous Frames”, in Advanced Satellite Mobile Systems Conference, Bologna, Italy, 2008.
, “Smooth Orthogonal Signal Extensions for Paraunitary Tree-structured Filter Banks”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, USA, 2002.
, “Skewed Log-Stable model for natural images pixel block-variance”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, “SINR Optimization in Wideband Full-Duplex MIMO Relays under Limited Dynamic Range”, in IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), A Coruña, Spain, 2014. sam2014_emilio.pdf (265.81 KB)
, “Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013. wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, “Sensitivity of compressive sensing architectures based on time interleaved analog-to-digital converters to channel mismatches”, in IEEE International New Circuits and Systems Conference (NEWCAS), 2014.
, “Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017. TPP17_ICASSP17.pdf (403.53 KB)
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “Secure Collaborative Camera Attribution”, in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, “Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, “Second order statistics based blind channel equalization with correlated sources”, in IEEE International Symposium on Circuits and Systems (ISCAS), Sydney, Australia, 2001, vol. 4, pp. 366–369.
, “Scaling laws for infrastructure single and multihop wireless networks in wideband regimes”, in IEEE International Symposium on Information Theory (ISIT), Honolulu, 2014, pp. 76–80.
, “Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, “Stable estimates in equation-error identification: an open problem”, in Open Problems in Mathematical Systems and Control Theory, Springer-Verlag, 1999.
, “The Simultaneous Strict Positive Real Problem: Similarities with the Simultaneous Stability Problem and Applications in Adaptive Recursive Algorithms”, in Mathematics in Signal Processing, Oxford University Press, 1998, pp. 139-148.
,