<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Second-harmonic generation microscopy of carbon nanotubes
2
Second-harmonic generation of a Gaussian laser beam in a self created magnetized plasma channel
3
Second-harmonic generation of green light in periodically poled planar lithium niobate waveguide
4
Second-harmonic generation of Lamb waves in a solid layer on a half space
5
Second-harmonic generation of laser radiation in a plasma with a density ripple
6
Second-harmonic generation of light in ferroelectric polymer films with a spatially nonuniform distribution of polarization
7
Second-harmonic generation of light in ferroelectric polymer films with a spatially nonuniform distribution of polarization
8
Second-harmonic generation of near ultraviolet wavelength by surface nonlinearity polarization
9
Second-harmonic generation of several argon-ion laser lines
10
Second-Harmonic Generation of Super Powerful Femtosecond Pulses Under Strong Influence of Cubic Nonlinearity
11
Second-harmonic generation on the nanoscale: new routes for surface and bulk investigations
12
Second-harmonic generation properties of 2-amino-5-nitropyridinium-dihydrogenarsenate and -dihydrogenphosphate organic-inorganic crystals
13
Second-harmonic generation spectroscopy of silicon quantum dots
14
Second-harmonic generation to 2048 Å in Β-Ba
2
O
4
15
Second-harmonic generation to green using ultrafast fibre source and femtosecond written periodically poled waveguide
16
Second-harmonic generation using a high-energy and tunable Q-switched multicore fiber laser
17
Second-harmonic generation using matching-layer enhanced Al
x
Ga
1−x
As Bragg reflection waveguide
18
Second-harmonic Generation With Laser Diodes And Organic Channel Waveguides
19
Second-harmonic generation with monolithic walkoff-compensated KTP periodic structures
20
Second-harmonic generation with the GaAs laser
21
Second-Harmonic Generation with Zero Group-Velocity Mismatch in Nonlinear Photonic Crystal Fibers
22
Second-harmonic generations in fishet metamaterials
23
Second-harmonic imaging of ZnO nanoparticles
24
Second-harmonic Ka-band gyro-TWT with axis-encircling electrons
25
Second-harmonic light intensity modulation and its possible application in subcarrier-multiplexed optical communication
26
Second-harmonic locking properties of l.s.a.-mode transferred-electron oscillators
27
Second-harmonic magnetic modulator using ferrite core materials
28
Second-harmonic Magneto-optic Kerr Effect From Spin-valve Test Structures And Correlation With Magnetoresistance Response
29
Second-harmonic magneto-optic Kerr effect from spin-valve test structures: correlation with magnetoresistance response
30
Second-harmonic nanoparticles for deep tissue in vivo imaging
31
Second-harmonic nonlinearities in RF silicon integrated passive devices
32
Second-harmonic operation of coaxial gyrotrons - towards a proof-of-principle experiment
33
Second-harmonic phase spectroscopy of porous silicon based photonic crystals combined with microcavities
34
Second-harmonic phase spectroscopy of porous silicon based photonic crystals combined with microcavities
35
Second-harmonic power extraction from InP Gunn devices with more than 1 mW in 260-320 GHz frequency range
36
Second-harmonic pulse shaping with engineered quasi-phase-matching gratings in the strongly depleted pump regime
37
Second-harmonic reduction in CMUTs using unipolar pulsers
38
Second-harmonic reflector type high-gain FET frequency doubler operating in K-band
39
Second-harmonic reflectors on 128/spl deg/ LiNbO/sub 3/
40
Second-harmonic resonances in GaAs/AlGaAs photonic crystal slabs
41
Second-harmonic spectroscopy on split-ring-resonator arrays
42
Second-harmonic suppression in DART-SFIT devices
43
Second-harmonic tuning of the avalanche transit-time oscillator
44
Second-harmonic-generation Imaging of Collagen Fiber in Dermis Tissue
45
Secondis: An Adaptive Dissemination Protocol for Synchronizing Wireless Sensor Networks
46
Second-kind energy function of power system and its applications
47
SecondLab: A remote laboratory under Second Life
48
Second-law Analysis Of Energy Recovery In Uhp Electric-arc Furnaces
49
Second-level buffer cache management
50
Second-level interconnects reliability as a function of PCB build-up
51
Second-level interconnects reliability for large-die flip chip lead-free BGA package in power cycling and thermal cycling tests
52
Second-level NIST Randomness Tests for Improving Test Reliability
53
Second-level sliding mode tracking control of unmanned surface vessels with parameter uncertainties
54
Second-level testing revisited and applications to NIST SP800-22
55
Second-LSB-Dependent Robust Watermarking for Relational Database
56
Second-mode operation of the spiral antenna
57
Second-Mode Tuning Forks for High Frequencies: Finite Element Analysis and Experiments
58
SECONDO: an extensible DBMS platform for research prototyping and teaching
59
Second-order ΔΣAD modulator with novel feedforward architecture
60
Second-order absorbing boundary conditions for marching-on-in-order scheme
61
Second-order absorbing boundary conditions for the FD-TLM method analysis of open-region scattering problems
62
Second-order acceleration models for a multiple model adaptive estimator in a FLIR tracker
63
Second-order acceleration models for an MMAE target tracker
64
Second-order accurate FDTD equations at dielectric interfaces for TE modes
65
Second-Order Accurate FDTD Equations at Magnetic Media Interfaces
66
Second-order accurate FDTD equations for the analysis of cylindrical dielectric resonators
67
Second-order accurate FDTD space and time grid refinement method in three space dimensions
68
Second-order achievable rates in random number generation for mixed sources
69
Second-order adaptive bandwidth allocation to control delay of multicast multimedia streams in DiffServ router
70
Second-order adaptive spherical target state estimation
71
Second-order adaptive Volterra system identification based on discrete nonlinear Wiener model
72
Second-order adjoint-based control for multiphase flow in subsurface oil reservoirs
73
Second-Order Analysis of Formation of Holes in Spatial Point Patterns: Applications in Wireless Sensor Networks
74
Second-order analysis of free vibrations of piezoelectric ceramic actuators
75
Second-order analysis of improper complex random vectors and processes
76
Second-order analysis of lossless and lossy versions of Lempel-Ziv codes
77
Second-order analysis of the joint SINR distribution in Rayleigh multiple access and broadcast channels
78
Second-order analysis of the output of a discrete-time Volterra system driven by white noise
79
Second-order analysis of the RC-WL-QLMS algorithm
80
Second-order analytical modeling of thin-film SOI MOSFETs
81
Second-Order and Dependently-Sorted Abstract Syntax
82
Second-order approximation for the design of broadband couplers using nonuniform lines
83
Second-order approximation of the autocorrelation matrix function
84
Second-order approximations for RLC trees
85
Second-order asymmetric BAM design with a maximal basin of attraction
86
Second-Order Asymptotics for Source Coding, Dense Coding, and Pure-State Entanglement Conversions
87
Second-order asymptotics for the discrete memoryless MAC with degraded message sets
88
Second-order asymptotics for the Gaussian interference channel with strictly very strong interference
89
Second-Order Asymptotics for the Gaussian MAC With Degraded Message Sets
90
Second-order asymptotics for the gaussian MAC with degraded message sets
91
Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness
92
Second-order asymptotics of mutual information
93
Second-order averaging of forced and coupled nonlinear oscillators
94
Second-order backpropagation algorithms for a stagewise-partitioned separable Hessian matrix
95
Second-Order Balanced Truncation for Passive-Order Reduction of
RLC
K Circuits
96
Second-order bandpass frequency selective surface for terahertz applications
97
Second-Order Based Cyclic Frequency Estimates: The Case of Digital Communication Signals
98
Second-order beams of two-dimensional slot arrays
99
Second-Order Belief Propagation and Its Application to Object Localization
100
Second-order blind identifiability of certain classes of multipath channels using antenna arrays
101
Second-order blind MIMO channel identification based on correlative coding: asymptotic performance analysis
102
Second-order blind separation of first- and second-order cyclostationary sources-application to AM, FSK, CPFSK, and deterministic sources
103
Second-order blind separation of sources based on canonical partial innovations
104
Second-Order Blind Signal Separation for Convolutive Mixtures Using Conjugate Gradient
105
Second-Order Blind Source Separation: A New Expression of Instantaneous Separating Matrix for Mixtures of Delayed Sources
106
Second-order bounds on the domain of attraction and the rate of convergence of nonlinear dynamical systems and neural networks
107
Second-order capacities of erasure and list decoding
108
Second-order cascaded nonlinearity in lithium niobate channel waveguides
109
Second-order cascading effects in LiB/sub 3/O/sub 5/ crystals
110
Second-order channel parameter estimation assisted cancellation of channel variation-induced inter-subcarrier interference in OFDM systems
111
Second-Order Channel Statistic of Cooperative Selection Diversity with an Amplify-and-Forward Relay on Fading Channels
112
Second-order coding rate for m-class source-channel codes
113
Second-Order Coding Rates for Channels With State
114
Second-order coding rates for entanglement-assisted communication
115
Second-order coherence of supercontinuum
116
Second-order coherence of supercontinuum
117
Second-order coherence properties of supercontinuum
118
Second-order compensated bandgap reference with convex correction
119
Second-order complex random vectors and normal distributions
120
Second-order conceptual clustering of temporal events
121
Second-order conditions for optimal control problems with mixed control-state constraints and control appearing linearly
122
Second-order conditions for optimal control problems with mixed state-control constraints
123
Second-Order Cone Programming for Optimal Power Flow in VSC-Type AC-DC Grids
124
Second-order cone programming for robust downlink beamforming with imperfect CSI
125
Second-Order Cone Programming for Scan-Plane Reconstruction for the Wavelength-Scaled Array
126
Second-Order Cone Programming-Based Optimal Control Strategy for Wind Energy Conversion Systems Over Complete Operating Regions
127
Second-Order Cone Relaxation for TOA-Based Source Localization With Unknown Start Transmission Time
128
Second-Order Configuration of Local Features for Geometrically Stable Image Matching and Retrieval
129
Second-order Consensus Algorithm with Extensions to Switching Topologies and Reference Models
130
Second-order consensus algorithm with input constraints for swarm robots formation control
131
Second-order consensus for heterogeneous agents in the cooperation-competition network
132
Second-Order Consensus for Multiagent Systems With Directed Topologies and Nonlinear Dynamics
133
Second-order consensus for multi-agent systems with limited communication range
134
Second-order consensus for networks of agents with fixed and switching topology
135
Second-order consensus for nonlinear leader-following multi-agent systems with sampled-data information
136
Second-order consensus for nonlinear multi-agent systems with intermittent measurements
137
Second-order consensus in leader-follower multi-agent systems with noisy measurement
138
Second-order consensus in multi-agent dynamical systems with sampled data
139
Second-order consensus in multi-agent systems with Multi-leaders under nonlinear dynamics control
140
Second-order consensus of discrete-time multi-agent systems via one-step delayed data
141
Second-order Consensus of Multi-agent System with Dynamic Network Topology
142
Second-order consensus of multi-agent systems with noise
143
Second-order consensus of multiple agents with coupling delay
144
Second-order consensus of multiple non-identical agents with non-linear protocols
145
Second-order consensus of networked mechanical systems with communication delays
146
Second-order consensus protocol design in multi-agent systems: A general framework
147
Second-Order Consensus Seeking in Multi-Agent Systems With Nonlinear Dynamics Over Random Switching Directed Networks
148
Second-order consensus tracking of nonlinear multi-agent systems with intermittent links
149
Second-order consensus with unknown dynamics via cyclic-small-gain method
150
Second-order constrained parametric proposals and sequential search-based structured prediction for semantic segmentation in RGB-D images
151
Second-order constraints for equations of motion of constrained systems
152
Second-order contact kinematics for regular contacts
153
Second-order convergence analysis of stochastic adaptive linear filtering
154
Second-order convergent algorithms for the steady-state Riccati equation
155
Second-order correlation method for bilinear system identification
156
Second-order correlation method for bilinear system identification
157
Second-order correlation-based algorithm for STBC-OFDM signal identification
158
Second-order counterexample to the discrete-time Kalman conjecture
159
Second-order criterion for blind source extraction
160
Second-order cyclic statistics based blind channel identification and equalization
161
Second-Order Cyclostationarity of BT-SCLD Signals: Theoretical Developments and Applications to Signal Classification and Blind Parameter Estimation
162
Second-Order Cyclostationarity of Cyclically Prefixed Single Carrier Linear Digital Modulations with Applications to Signal Recognition
163
Second-Order Cyclostationarity of Mobile WiMAX and LTE OFDM Signals and Application to Spectrum Awareness in Cognitive Radio Systems
164
Second-Order Cyclostationarity-Based Detection of LTE SC-FDMA Signals for Cognitive Radio Systems
165
Second-order cyclostationary approach to NDA ML square timing estimation with frequency uncertainty
166
Second-order dc SQUID gradiometer from single layer of high temperature superconducting film
167
Second-order delta-sigma modulation with interfered reference
168
Second-order delta-sigma modulator with two 1 bit quantisers
169
Second-order derivative-based smoothness measure for error concealment in DCT-based codecs
170
Second-order DFB lasers fabricated by deep UV contact lithography and GSMBE
171
Second-order differential adaptive microphone array
172
Second-order differential approximation for screw thread pitch equivalent diameter
173
Second-order differential based matching pursuit method for compressive sensing signal recovery
174
Second-Order Differential Encoding of Deterministic Finite Automata
175
Second-order digital filter with only one magnitude-truncation quantiser and having practically no limit cycles
176
Second-order discriminant function for amplitude comparison monopulse antenna systems [EW antenna array]
177
Second-order dispersion in oscillating GaAs junction lasers
178
Second-order distortion and electronic compensation in analog links containing fiber amplifiers
179
Second-order distortion generated by amplification of intensity-modulated signals with chirping in erbium-doped fiber
180
Second-order distortion improvements or degradations brought by erbium-doped fiber amplifiers in analog links using directly modulated lasers
181
Second-order distortion in CATV push-pull amplifiers
182
Second-order distortion of amplified intensity-modulated signals with chirping in erbium-doped fiber
183
Second-order distributed consensus with modified probabilistic quantization
184
Second-order distributed consensus with one-bit adaptive quantization
185
Second-order distributed feedback lasers with mode selection provided by first-order radiation losses
186
Second-order divided difference filter with application to ballistic target tracking
187
Second-order DMOC using projection
188
Second-order DOA estimation from digitally modulated signals
189
Second-Order Doppler and Cavity Phase Dependent Frequency Shifts in Atomic Beam Frequency Standards
190
Second-order edge agreement with locally Lipschitz dynamics under digraph via edge Laplacian and ISS method
191
Second-order effects in acoustic surface-wave filters: design methods
192
Second-order effects in fiber optical parametric amplifier
193
Second-order effects in fiber optical parametric amplifier
194
Second-order effects in self-testable accelerometers
195
Second-Order Effects in Surface-Wave Devices Due to Stored Energy at Step Discontinuities
196
Second-Order Effects on VHF Geostationary Satellite Ranging and Range Correction Systems
197
Second-order eigenvalue sensitivities applied to multivariable control systems
198
Second-order EKF and Unscented Kalman Filter Fusion for Tracking Maneuvering Targets
199
Second-order equivalence of rectangular and exponential windows in least-squares estimation of Gaussian autoregressive processes
200
Second-order error correction of a calibrated two-port vector network analyzer
201
Second-order estimates in singular perturbation of output regulator problems
202
Second-order event-triggered multi-agent consensus control
203
Second-order event-triggered tracking control with only position measurements
204
Second-Order Extended
Filter for Nonlinear Discrete-Time Systems Using Quadratic Error Matrix Approximation
205
Second-Order Feed-Forward Renderingfor Specular and Glossy Reflections
206
Second-order fiber Bragg gratings
207
Second-order fiber gratings
208
Second-order filter response from parallel coupled glass microring resonators
209
Second-order filter response with series-coupled silica microresonators
210
Second-order fluid dynamics models for travel times in dynamic transportation networks
211
Second-order frequency shifts in crystal resonators under relatively large biasing fields
212
Second-order function realisation with switched-capacitor network and unity-gain amplifiers
213
Second-order generalization
214
Second-Order Global Consensus in Multiagent Networks With Random Directional Link Failure
215
Second-order gradient noise-cancelling microphone
216
Second-Order Greedy Algorithms for Centralized Teleprocessing Network Design
217
Second-order group consensus in multi-agent systems with time-delays based on second-order neighbours´ information
218
Second-order H
∞
optimal LMS and NLMS algorithms based on a second-order Markov model
219
Second-order harmonic distortion and optimal fiber length in erbium-doped fiber amplifiers
220
Second-order heavy-tailed distributions and tail analysis
221
Second-order hidden Markov models based on the fuzzy c-means and fuzzy entropy
222
Second-Order HMM-Based Diagnosis Method for Web Service Fault
223
Second-order hyperpolarizability and susceptibility calculations of a series of ruthenium complexes
224
Second-order IMD cancellation receiver for wideband coherent SCM systems
225
Second-order improperness in frequency-domain colored signal model
226
Second-Order Integral Sliding Mode Control for Uncertain Systems With Control Input Time Delay Based on Singular Perturbation Approach
227
Second-order interference of two independent photons
228
Second-Order Intermodulation Distortion in Heterodyne Detection Fiber-Optic Millimeter-Wave Links
229
Second-Order Intermodulation in Current-Commutating Passive FET Mixers
230
Second-order intermodulation mechanisms in CMOS downconverters
231
Second-Order Iterative Learning Control for Scaled Setpoints
232
Second-order kinematic control of robot manipulators with Jacobian damped least-squares inverse: theory and experiments
233
Second-Order Latent-Space Variational Bayes for Approximate Bayesian Inference
234
Second-order leader-following consensus of multi-agent systems with nonlinear dynamics and time delay via periodically intermittent pinning control
235
Second-order leader-following consensus of nonlinear multi-agent systems via adaptive pinning control
236
Second-Order Locally Dynamical Consensus of Multiagent Systems With Arbitrarily Fast Switching Directed Topologies
237
Second-Order Markov Chain Based Multiple-Model Algorithm for Maneuvering Target Tracking
238
Second-order method for optimal control problems with state constraints and piecewise-constant controls
239
Second-order methods for L1 regularized problems in machine learning
240
Second-order model for remote and close-up short-circuit faults currents on DC traction supply
241
Second-order model for rotary traveling wave ultrasonic motors
242
Second-order model of membrane electric field induced by alternating external electric fields
243
Second-order modeling for Rayleigh flat fading channel estimation with Kalman Filter
244
Second-order moment analysis of dispersion-managed solitons
245
Second-order moment-based direction finding of a single source for ULA systems
246
Second-order motion compensation in bistatic airborne SAR based on a geometrical approach
247
Second-Order Motion Compensation in Bistatic Airborne SAR based on the Windowed Fourier-Transformation
248
Second-order motion perception: space/time separable mechanisms
249
Second-order multi-bit ΣΔ ADC using a Pulse-Width Modulated DAC and an integrating quantizer
250
Second-Order Multidimensional ICA: Performance Analysis
251
Second-order multifunction filter with fully differential current follower
252
Second-order multilayer perceptrons and its optimization with genetic algorithms
253
Second-order n-dimensional systems and the Lyapunov matrix equation
254
Second-order near-field localization with automatic paring operation
255
Second-order near-field source localization: algorithm and performance analysis
256
Second-order necessary optimality conditions in state constrained optimal control
257
Second-order networks for wall-building agents
258
Second-order neural core for bioinspired focal-plane dynamic image processing in CMOS
259
Second-order neural nets for constrained optimization
260
Second-order noiseless source coding theorems
261
Second-order nonlinear efficiency in II-VI semiconductors for wavelength conversion applications in the near IR
262
Second-order nonlinear function navigation method for fast mobile robots
263
Second-order nonlinear interactions of space charge waves in photorefractive crystals
264
Second-order nonlinear optical effects of spin currents
265
Second-order Nonlinear Optical Properties Of Bond Alternating Dipolar Structures
266
Second-order nonlinear optical properties of novel a-methylstyrene copolymers containing the organo boron salt dye chromophore in the side chain
267
Second-order nonlinear optical susceptibilities determined through gas-phase experiments
268
Second-order nonlinear optical susceptibilities of surface and bulk of glass
269
Second-order nonlinear optical thin films fabricated from ionically self-assembled monolayers
270
Second-order nonlinear processes using gap plasmon-polaritons
271
Second-order nonlinear susceptibility in As
2
S
3
chalcogenide thin glass films
272
Second-order nonlinearities in poled fibers
273
Second-Order Nonlinearities of Molecular Films Studied with 20 fs Pulses
274
Second-order nonlinearity distribution in a doped silica glass multilayered structure
275
Second-order nonlinearity of a disazo dye attached polymer
276
Second-order non-linearity of heart rate and blood pressure short-term variability
277
Second-order nonlinearity profile in thermally poled twin-hole fibre
278
Second-order nonlinearity profile in twin-hole fibre with borosilicate layer around anode hole
279
Second-order nonsingular terminal sliding mode control of uncertain MIMO linear systems
280
Second-order Observer for a Class of Second-Order Distributed Parameter Systems
281
Second-order observer for nonlinear systems from discrete noiseless measurements
282
Second-Order Ocean Surface Cross Section for Shipborne HFSWR
283
Second-order odd-harmonic repetitive control and its application to active filter control
284
Second-Order Optical Differentiator Based on a Mechanically-Induced LPFG with a Single pi-Shift
285
Second-order optical nonlinearities of novel “H-shaped” two-dimensional charge transfer chromophores
286
Second-order optical nonlinearity in thermally poled multilayer germanosilicate thin films
287
Second-order optical nonlinearity in thermally poled phosphorus-doped silicon dioxide thin-film waveguides
288
Second-order optical nonlinearity in thermally poled silica waveguides written by femtosecond laser pulses
289
Second-order optimal estimation of slip state for a simple slip-steered vehicle
290
Second-order optimality conditions for the Bolza problem with path constraints
291
Second-Order Optimality of Generalized Spatial Modulation for MIMO Channels With No CSI
292
Second-Order Optimization of Mutual Information for Real-Time Image Registration
293
Second-order OTA-C filters derived from Nawrocki-Klein biquad
294
Second-order OTA-C filters using a single OTA
295
Second-order output statistics of the adaptive line enhancer
296
Second-order parabolic approximation: a new mathematical approximation dedicated to ROM-less DDFSs
297
Second-order parameter estimation
298
Second-Order Perfectly Matched Layers for the Time-Domain Finite-Element Method
299
Second-Order Perturbative Solution of Scattering From Two Rough Surfaces With Arbitrary Dielectric Profiles
300
Second-Order Perturbative Solutions for 3-D Electromagnetic Radiation and Propagation in a Layered Structure With Multilayer Rough Interfaces
301
Second-Order Phase Transition and the Magnetocaloric Effect in
Nanoparticles
302
Second-order Phase Transition At The Critical Point Of Optical Bistability Due To Nonlinear Absorption
303
Second-Order Phase-Lock-Loop Acquisition Time in the Presence of Narrow-Band Gaussian Noise
304
Second-order phenomena in α-quartz and the polarizing effect with plates of orientation (xzl)Ψ
305
Second-order photonic temporal differentiator based on a phase-shifted long period fiber grating
306
Second-order PLL loop filters with independent adjustment of ¿n and ¿
307
Second-order PMD compensation by all-optical regenerator based on optical parametric amplification
308
Second-order PMD measurement using polarization dependent baseband amplitude modulation method
309
Second-order PMD monitoring from adaptive FIR-filter tap coefficients in a digital coherent receiver
310
Second-order PMD outage of first-order compensated fiber systems
311
Second-Order PMD-Induced Crosstalk Between Polarization-Multiplexed Signals and Its Impact on Ultrashort Optical Pulse Transmission
312
Second-order polarization mode dispersion: impact on analog and digital transmissions
313
Second-order polarization mode dispersion: new expressions, induced pulse broadening, and its compensation
314
Second-order polarization-mode dispersion in photonic crystal fibers
315
Second-order pole-zero pair selection for nth-order minimum sensitivity networks
316
Second-order power control with asymptotically fast convergence
317
Second-order predictive direct control of a voltage source inverter coupled to an LC filter
318
Second-Order Procedure for Modeling Dielectric Material Interfaces in Structured Nonorthogonal Finite-Difference Discretizations of Maxwell´s Equations
319
Second-Order Properties for Wireless Cooperative Systems with Rayleigh Fading
320
Second-order properties of families of discrete event systems
321
Second-order properties of families of discrete-event systems
322
Second-order properties of MUSIC and ESPRIT estimates of sinusoidal frequencies in high SNR scenarios
323
Second-order properties of products of clipped Gaussian processes
324
Second-order properties of the pre-envelope and envelope processes (Corresp.)
325
Second-order Q and ¿0 shifts in RC active filters having nonideal amplifiers
326
Second-Order Rate Region of Constant-Composition Codes for the Multiple-Access Channel
327
Second-order rate region of constant-composition codes for the multiple-access channel
328
Second-order rate-control based transport protocols
329
Second-Order Rate-Control Based Transport Protocols Over Mobile Wireless Networks
330
Second-order recurrent neural network for word sequence learning
331
Second-order recurrent neural networks for grammatical inference
332
Second-order recursive digital filter that is free from all constant-input limit cycles
333
Second-order recursive digital-filter element for poles near the unit circle and the real z axis
334
Second-order redundancy of coarsely quantised video signals
335
Second-Order Resolvability, Intrinsic Randomness, and Fixed-Length Source Coding for Mixed Sources: Information Spectrum Approach
336
Second-order ring modulator. Calculations of losses and some design considerations
337
Second-order robust consensus for nonlinear multi-agent systems with extended state observer
338
Second-order sampling and oversampled A/D- and D/A-converters in digital data transmission
339
Second-order sampling of wideband signals
340
Second-order sampling-based fast recovery of bandpass signals
341
Second-Order Semantic Web
342
Second-order semiblind adaptive interference cancellation: maximum likelihood solution
343
Second-order sensitivity analysis of a linear system
344
Second-order sensitivity analysis of a nonlinear system
345
Second-Order Shape Optimization for Geometric Inverse Problems in Vision
346
Second-Order Siding Mode Control with Fuzzy Compensator for a Magnetic Levitation System
347
Second-order sigma-delta modulation for digital-audio signal acquisition
348
Second-order signal analysis on the direct-current amplitude-modulation of semiconductor lasers with effects of hot carriers and hot phonons
349
Second-order silicon photonic differential-equation solver for general linear time-invariant systems
350
Second-order single channel digital tanlock based phase-locked loop
351
Second-order Slepian-Wolf coding theorems for non-mixed and mixed sources
352
Second-Order Slepian-Wolf Coding Theorems for Non-Mixed and Mixed Sources
353
Second-Order Sliding Fuzzy Interval Type-2 Control for an Uncertain System With Real Application
354
Second-order sliding mode algorithms for the reconstruction of leaks
355
Second-order sliding mode based output-feedback control of an engine air path actuator in presence of uncertainties
356
Second-order sliding mode based sensor fault-tolerant control of induction motor drives
357
Second-order sliding mode control applied to inverted pendulum
358
Second-order sliding mode control for a magnetic levitation system
359
Second-order sliding mode control for aerodynamic missiles using backstepping design
360
Second-order sliding mode control for high-dimension uncertain multivariable systems
361
Second-order sliding mode control for nonholonomic mobile robots formation
362
Second-Order Sliding Mode Control for Nonlinear Uncertain Systems Bounded by Positive Functions
363
Second-order sliding mode control for passive ranging system in missile interception
364
Second-order sliding mode control of 3D overhead cranes
365
Second-Order Sliding Mode Control of a Doubly Fed Induction Generator Driven Wind Turbine
366
Second-order sliding mode control of an innovative engine cooling system
367
Second-order sliding mode control of electronic throttle valves
368
Second-order sliding mode control of the engine speed for an automated manual transmission during gear shifting process
369
Second-order sliding mode speed controller with anti-windup for BLDC motors
370
Second-Order Sliding Mode Strategy for Air–Fuel Ratio Control of Lean-Burn SI Engines
371
Second-order sliding modes control for in-vehicle pedal robots
372
Second-order sliding-mode control as an alternative to static and dynamic optimisation in human gait simulation
373
Second-order sliding-mode control of a Buck converter
374
Second-order sliding-mode control of a mobile robot based on a harmonic potential field
375
Second-order sliding-mode control of DC drives
376
Second-order sliding-mode control of DFIG-based wind turbines
377
Second-order sliding-mode control of the uncertain heat and wave equations
378
Second-order sliding-mode controller design and tuning for grid synchronisation and power control of a wind turbine-driven doubly fed induction generator
379
Second-order sliding-mode controller design and tuning for grid synchronization and power control of a wind turbine-driven DFIG
380
Second-order sliding-mode controller for higher-order DC-DC converters
381
Second-order sliding-mode observer for mechanical systems
382
Second-Order Sliding-Mode Observer With Online Parameter Identification for Sensorless Induction Motor Drives
383
Second-order slip flow and heat transfer in a microchannel
384
Second-Order SM Approach to SISO Time-Delay System Output Tracking
385
Second-Order Spectral Statistics for the Power Gain of Wideband Wireless Channels
386
Second-order spin-wave instability in Mn-Zn2Y planar hexagonal ferrites
387
Second-order split-step envelope PML algorithm for 2D FDTD simulations
388
Second-order stability cells of a frictionless rigid body grasped by rigid fingers
389
Second-order state-space formulation of systems
390
Second-Order State-Variable Filter with Current Operational Amplifiers
391
Second-order statistical analysis of totally weighted subspace fitting methods
392
Second-order statistical approaches to channel shortening in multicarrier systems
393
Second-order statistical characterization of the filter bank and its elements
394
Second-Order Statistical Moments of a Surface Scatter Channel with Multiple Wave Direction and Dispersion
395
Second-order statistical properties of nonlinearly distorted phase-shift keyed (PSK) signals
396
Second-order statistical properties of the WSS Jakes´ fading channel simulator
397
Second-Order Statistical Property of Partially Developed Speckle and its Applications to Speckle Metrology
398
Second-order statistic-based detection of Alamouti-coded OFDM signals for cognitive radio
399
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics
400
Second-Order Statistics Based Minimal Transmit Redundancy Space-Time FIR Precoder-Blind Equalizer
401
Second-order statistics based prefilter-blind equalization for MIMO-OFDM
402
Second-order statistics blind MIMO-FIR channel equalization for antenna array-based wireless communications systems
403
Second-order statistics for diversity-combining of non-identical correlated hoyt signals
404
Second-order statistics for diversity-combining of non-identical, unbalanced, correlated Weibull signals
405
Second-order statistics for diversity-combining techniques in Nakagami-fading channels
406
Second-order statistics for equal gain and maximal ratio diversity-combining reception
407
Second-order statistics for equal gain combining with arbitrary channels
408
Second-Order Statistics for Many-Link Body Area Networks
409
Second-order statistics for the envelope and phase of η-μ generalized fading channels
410
Second-Order Statistics for the Envelope of α - κ - μ Fading Channels
411
Second-Order Statistics in Weibull-Lognormal Fading Channels
412
Second-Order Statistics of η-μ Fading Channels: Theory and Applications
413
Second-order statistics of 2D non isotropic mobile-to-mobile wireless channels
414
Second-order statistics of a maximum ratio combiner with unbalanced and unequally distributed nakagami branches
415
Second-order statistics of Amplify-and-Forward multi-hop wireless networks: A framework for computing the end-to-end SNR auto-correlation function over Log-Normal shadowing channels
416
Second-order statistics of an improved Jakes´ fading simulator
417
Second-order statistics of channel state information in a multi-cell mobile network with fast fading
418
Second-order statistics of complex signals
419
Second-order statistics of electromagnetic pulse propagation through the turbulent ionosphere
420
Second-Order Statistics of Equal-Gain and Maximal-Ratio Combining for the α-μ (Generalized Gamma) Fading Distribution
421
Second-Order Statistics of Improved Jakes Models´ for Rayleigh Fading Channels
422
Second-order statistics of large isometric matrices and applications to MMSE SIR
423
Second-order statistics of logarithmic quantization noise in QAM data communication
424
Second-order statistics of maximal-ratio and equal-gain combining in Hoyt fading
425
Second-order statistics of maximal-ratio and equal-gain combining in Weibull fading
426
Second-order statistics of morphological dilation and erosion of a memoryless source
427
Second-Order Statistics of Polarization State Dispersion by Narrowband Ricean Fading Channels
428
Second-Order Statistics of Selection Combining Systems with Cochannel Interference in Various Fading Channels
429
Second-Order Statistics of the Mutual Information of the Asymptotic Separately-Correlated Rician Fading MIMO Channel with Interference
430
Second-order statistics of the wavelet transform of multiplicative white stochastic process
431
Second-order statistics over correlated dual-hop Rayleigh fading channels
432
Second-order statistics versus HOS for the estimation of harmonics in additive and multiplicative noise
433
Second-order statistics-based blind equalization of IIR single-input multiple-output channels with common zeros
434
Second-Order Statistics-Based Blind Synchronization Algorithm for Two Receive-Antenna Orthogonal STBC Systems
435
Second-order steganographic method based on adaptive reference matrix
436
Second-order stochastic input-output stability and instability of interconnected systems
437
Second-order stochastic properties in queueing systems
438
Second-order susceptibility χ
(2)
in Si waveguides
439
Second-order switched capacitor building block and its application to the design of silicon efficient filters
440
Second-order switched-capacitor bandpass filter implemented in GaAs
441
Second-order switching time and magnitude optimization for impulsive hybrid systems
442
Second-Order Switching Time Optimization for Nonlinear Time-Varying Dynamic Systems
443
Second-Order Synchrosqueezing Transform or Invertible Reassignment? Towards Ideal Time-Frequency Representations
444
Second-order system´s velocity feedback gain control based on PID variable damping ratio controller
445
Second-Order Systems With Acceleration Measurements
446
Second-order TDTL with initialization process
447
Second-Order Temperature Coefficients of Singly and Doubly Rotated Cuts of Berlinite
448
Second-Order Temporal-Accurate Scheme for 3-D LOD-FDTD Method With Three Split Matrices
449
Second-Order Terahertz Bandpass Frequency Selective Surface With Miniaturized Elements
450
Second-order theories for extensional vibrations of piezoelectric crystal plates and strips
451
Second-order theory for nonlinear phase noise in coherent fiber-optic system based on phase shift keying
452
Second-order theory for self-phase modulation and cross-phase modulation in optical fibers
453
Second-order time-domain adjoint sensitivity analysis exploiting TLM
454
Second-order time-frequency synthesis of nonstationary random processes
455
Second-order time-varying sliding mode control for uncertain systems
456
Second-order torque components in the Schrage motor operating at synchronous speed
457
Second-order torque components in the Schrage motor operating at synchronous speed
458
Second-order total Generalized Variation constraint
459
Second-order training for recurrent neural networks without teacher-forcing
460
Second-order training of adaptive critics for online process control
461
Second-order uniform exact sliding mode control with uniform sliding surface
462
Second-order Volterra filtering and its application to nonlinear system identification
463
Second-order Volterra system identification
464
Second-Order Volterra System Identification With Noisy Input–Output Measurements
465
Second-Order Volumetric-Perturbative Reciprocal Scattering Theory
466
Second-order waveguide calibration of a one-port vector network analyzer
467
Second-Order Weight Distributions
468
Second-order-cone-programming scheme for designing all-pass phase systems
469
Second-order-difference integrator. Design base for realising high-resolution digital differential analysers
470
Second-Ordered Reputation and Incentive Mechanism in Ad Hoc Networks
471
Second-order-optimal filters on Lie groups
472
Second-Order-Statistics-Based Blind Source Separation for Non-Stationary Sources with Stationary Noise
473
Seconds out
474
Seconds out in the watch war
475
Second-score auction based on production possibilities set in DEA
476
Second-sourcing CPUs - Emulation, Ethics, And Electropolitics
477
Second-Stage Actuation for Hard Disc Drives Through MEMS Technology
478
Second-stage tuning procedure for analogue CMOS design reuse methodology
479
Second-Stokes Raman lasers with large wavelength shift from 1064 to 1316 nm wavelength in PbWO
4
crystals
480
Second-tier metering for smaller industrial and commercial consumers
481
SecondWATCH: A workspace awareness tool based on a 3-D virtual world
482
SecOnT 2013: Message from the Workshop Organizers
483
SecOnT 2013: Workshop Program Committee
484
SecOnT Workshop Program Committee
485
SecOPP+: A secure dynamic scheme for adding new nodes in SecOPP protocol
486
SecOPP-a low-cost energy secure multi-hop routing protocol for wireless sensor networks
487
SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection
488
SECOVAL: the IEEE/CREATE-NET workshop on the value of security through collaboration
489
SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments
490
SECPSIM: A Training Simulator for cyber-power infrastructure security
491
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks
492
Secrecy & Rate Adaptation for secure HARQ protocols
493
Secrecy Analysis for Massive MIMO Systems with Internal Eavesdroppers
494
Secrecy analysis for selection among transmit antennas with unequal average SNR performance
495
Secrecy analysis of multi-cell massive MIMO systems with RCI precoding and artificial noise transmission
496
Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling
497
Secrecy Analysis of Purchase Transaction in Electronic Purses
498
Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter
499
Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection
500
Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications
501
Secrecy and energy efficiency in MIMO-ME systems
502
Secrecy and industrial research
503
Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network
504
Secrecy and reliable Byzantine detection in a Gaussian untrusted two-hop link
505
Secrecy beyond encryption: obfuscating transmission signatures in wireless communications
506
Secrecy broadcast transmission capacity for heterogeneous correlated wireless ad hoc networks
507
Secrecy by typing and file-access control
508
Secrecy by witness-functions on increasing protocols
509
Secrecy by witness-functions under equational theories
510
Secrecy capacities for multiple terminals
511
Secrecy Capacities for Multiterminal Channel Models
512
Secrecy capacities for multiterminal channel models
513
Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems
514
Secrecy capacity analysis in a cooperative MIMO based wireless sensor network
515
Secrecy capacity and secure outage performance for rayleigh fading simo channel
516
Secrecy capacity and wireless energy harvesting in amplify-and-forward relay networks
517
Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper
518
Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems
519
Secrecy capacity for MIMO fading channel with size-limited eavesdropper
520
Secrecy Capacity for Satellite Networks under Rain Fading
521
Secrecy capacity limits of multiple antenna multiple eavesdropper multicast
522
Secrecy capacity maximization for secure cooperative ad-hoc networks
523
Secrecy capacity of a class of orthogonal relay eavesdropper channels
524
Secrecy capacity of a Nakagami-m fading channel in the presence of cooperative eavesdroppers
525
Secrecy capacity of correlated rayleigh fading channels
526
Secrecy capacity of heterogeneous distributed storage systems
527
Secrecy capacity of MIMO channels
528
Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer
529
Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers
530
Secrecy Capacity of Semi-deterministic Wire-tap Channels
531
Secrecy capacity of SIMO and slow fading channels
532
Secrecy capacity of single- and multi-antenna channels with simple helpers
533
Secrecy Capacity of Space Keying with Two Antennas
534
Secrecy capacity of the 2-2-1 gaussian MIMO wire-tap channel
535
Secrecy capacity of the degraded Poisson wiretap channel
536
Secrecy capacity of the ergodic layered erasure wiretap channel
537
Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference
538
Secrecy capacity of the Noise-Loop secure modulation
539
Secrecy Capacity of the Primary System in a Cognitive Radio Network
540
Secrecy Capacity of Wireless Channels
541
Secrecy Capacity of Wireless LAN
542
Secrecy capacity of wireless links subject to log-normal fading
543
Secrecy capacity of wiretap channel for a new scenario and designing code for wiretap channel
544
Secrecy capacity of wiretap channels with additive colored Gaussian noise
545
Secrecy capacity optimization in coordinated multi-point processing
546
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs
547
Secrecy capacity over correlated ergodic fading channel
548
Secrecy capacity over correlated log-normal fading channel
549
Secrecy Capacity Over Log-normal Fading Channel with Diversity Combining Techniques
550
Secrecy Capacity per Unit Cost
551
Secrecy capacity region of a class of one-sided interference channel
552
Secrecy capacity region of a class of two-user Gaussian MIMO BC with degraded message sets
553
Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages
554
Secrecy Capacity Region of Fading Broadcast Channels
555
Secrecy capacity region of Gaussian broadcast channel
556
Secrecy Capacity Region of Parallel Broadcast Channels
557
Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels
558
Secrecy capacity region of the degraded compound multi-receiver wiretap channel
559
Secrecy capacity region of the Gaussian multi-receiver wiretap channel
560
Secrecy Capacity with Leakage Constraints in Fading Channels
561
Secrecy coding for the wiretap channel using best known linear codes
562
Secrecy communication of wireless information and power transfer system with green relay
563
Secrecy correctness for security protocols
564
Secrecy coverage
565
Secrecy coverage in two dimensions
566
Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT
567
Secrecy Degrees of Freedom of the 2
2
2 Interference Channel With Delayed CSIT
568
Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSIT
569
Secrecy degrees of freedom of wireless X networks using artificial noise alignment
570
Secrecy diversity in MISOME wiretap channels
571
Secrecy energy efficiency optimization for MISO and SISO communication networks
572
Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation
573
Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario
574
Secrecy Enhancement via Public Discussion
575
Secrecy enhancement with artificial noise in decentralized wireless networks: A stochastic geometry perspective
576
Secrecy Enhancing in Wireless Communication with a Full-Duplexing at the Receiver
577
Secrecy extraction from correlated fading channels: An upper bound
578
Secrecy Extraction from Increased Randomness in a Time-Variant MIMO Channel
579
Secrecy for Bounded Security Protocols under Composed Keys and Disequality Tests
580
Secrecy for Bounded Security Protocols without Freshness Check
581
Secrecy for Bounded Security Protocols: Disequality Tests and an Intruder with Existentials Lead to Undecidability
582
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
583
Secrecy for MISO broadcast channels via alternating CSIT
584
Secrecy for MISO broadcast channels with heterogeneous CSIT
585
Secrecy forever? Analysis of anonymity in Internet-based voting protocols
586
Secrecy gain of Gaussian wiretap codes from 2- and 3-modular lattices
587
Secrecy gain of Gaussian wiretap codes from unimodular lattices
588
Secrecy gain of trellis codes: The other side of the union bound
589
Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices
590
Secrecy gain: A wiretap lattice code design
591
Secrecy games in cognitive radio networks with multiple secondary users
592
Secrecy games on the one-sided interference channel
593
Secrecy games over the cognitive channel
594
Secrecy Generation for Multiaccess Channel Models
595
Secrecy generation for multiple input multiple output channel models
596
Secrecy in broadcast channels with receiver side information
597
Secrecy in cascade networks
598
Secrecy in cognitive radio networks: Turning foes to allies
599
Secrecy in cooperative relay broadcast channels
600
Secrecy in Cooperative Relay Broadcast Channels
601
Secrecy in Cooperative Senma with Unauthorized Intrusions
602
Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies
603
Secrecy in MIMO Gaussian bidirectional broadcast channels
604
Secrecy in MIMOME wiretap channels: Beamforming with imperfect CSI
605
Secrecy in multiagent systems
606
Secrecy in stochastic discrete event systems
607
Secrecy in the 2-user symmetric deterministic interference channel with transmitter cooperation
608
Secrecy in the two-way untrusted relay channel with compute-and-forward
609
Secrecy in Two-Way Relay Systems
610
Secrecy is cheap if the adversary must reconstruct
611
Secrecy measures for broadcast channels with receiver side information: Joint vs individual
612
Secrecy of Cryptography with Compressed Sensing
613
Secrecy outage analysis for cooperative DF underlay CRNs with outdated CSI
614
Secrecy Outage Analysis in Cellular Networks
615
Secrecy outage analysis of cognitive radio networks with power control
616
Secrecy outage analysis of cognitive wireless sensor networks
617
Secrecy outage analysis of multi-user cellular networks in the face of cochannel interference
618
Secrecy Outage Analysis of Multiuser Diversity With Unequal Average SNR in Transmit Antenna Selection Systems
619
Secrecy outage analysis of MU-MIMO transmit antenna selection systems with arbitrary number of eavesdropping users
620
Secrecy Outage Analysis of Transmit Antenna Selection with Switch-and-Examine Combining over Rayleigh Fading
621
Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami-
Fading Channels
622
Secrecy Outage and Diversity Analysis of Cognitive Radio Systems
623
Secrecy outage capacity of fading channels
624
Secrecy Outage Capacity of Fading Channels
625
Secrecy outage in correlated Nakagami-m fading channels
626
Secrecy Outage in MISO Systems With Partial Channel Information
627
Secrecy outage in random wireless networks subjected to fading
628
Secrecy outage of a two-user slow fading broadcast channel
629
Secrecy Outage of Dual-Hop AF Relay System With Relay Selection Without Eavesdropper´s CSI
630
Secrecy Outage of Dual-Hop Amplify-and-Forward System and Its Application to Relay Selection
631
Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection
632
Secrecy outage of Nakagami-m MISO channels with randomly located receivers
633
Secrecy outage of TAS/GSC in Nakagami-m fading channels
634
Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners
635
Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks
636
Secrecy outage performance for partial relay selection schemes in cooperative systems
637
Secrecy outage performance for partial relay selection schemes in network coding systems
638
Secrecy outage performance of MISO wiretap channels with outdated CSI
639
Secrecy outage performance of relay networks under interference constraint
640
Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems
641
Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper
642
Secrecy outage probability of cooperative network through distributed Alamouti code
643
Secrecy outage probability of maximal ratio combining and optimum combining in interference-limited wiretap channels
644
Secrecy outage probability of network-coded cooperation without channel state information
645
Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks
646
Secrecy outage probability of relay networking in multiple destination and eavesdropper scenarios
647
Secrecy Outage Probability of Selective Relaying Wiretap Channels with Collaborative Eavesdropping
648
Secrecy Outage Probability of Two-Path Successive Relaying in Physical Layer Security
649
Secrecy Performance Analysis for SIMO Simultaneous Wireless Information and Power Transfer Systems
650
Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback
651
Secrecy performance analysis of SLNR-based beamforming scheme in MISOME wiretap channels
652
Secrecy performance analysis with relay selection methods under impact of co-channel interference
653
Secrecy Performance of Maximum Ratio Diversity With Channel Estimation Error
654
Secrecy performance of MRT/RAS system with outdated CSI in MIMO wiretap channels
655
Secrecy rate analysis for jamming assisted relay communications systems
656
Secrecy Rate Analysis of Jamming Superposition in Presence of Many Eavesdropping Users
657
Secrecy rate balancing for the downlink multiuser MISO system with independent confidential messages
658
Secrecy rate evaluation of wireless channel in the presence of eavesdroppers
659
Secrecy Rate for MISO Rayleigh Fading Channels with Relative Distance of Eavesdropper
660
Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise
661
Secrecy rate maximization for information and energy transfer in MIMO beamforming networks
662
Secrecy rate maximization for MIMO Gaussian wiretap channels with multiple eavesdroppers via alternating matrix POTDC
663
Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming by single-antenna helpers
664
Secrecy rate maximization of a miso channelwith multiple multi-antenna eavesdroppers via semidefinite programming
665
Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint
666
Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint
667
Secrecy rate of a class of state-dependent untrusted relay channel with orthogonal components
668
Secrecy Rate of Adaptive Modulation Techniques in Flat-Fading Channels
669
Secrecy Rate of Time Switched Transmit Diversity System
670
Secrecy rate optimization for a MIMO secrecy channel based on Stackelberg game
671
Secrecy rate optimization under cooperation with perfect channel state information
672
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer
673
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper
674
Secrecy Rate Pair Constraints for Secure Throughput
675
Secrecy rate region of independent parallel multiple-carrier two-way secure communications with secure feedback
676
Secrecy rate study in two-hop relay channel with finite constellations
677
Secrecy rate with friendly full-duplex relay
678
Secrecy Rates for Relay Selection in OFDMA Networks
679
Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers
680
Secrecy rates of binary wiretapper channels using feedback schemes
681
Secrecy signal and artificial noise designs in cellular network
682
Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling
683
Secrecy sum-rates for multi-user MIMO linear precoding
684
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding
685
Secrecy sum-rates with regularized channel inversion precoding under imperfect CSI at the transmitter
686
Secrecy systems approximating perfect and ideal secrecy
687
Secrecy through Synchronization Errors
688
Secrecy throughput analysis in MISOSE networks with channel feedback delay and channel estimation errors
689
Secrecy Throughput of MANETs Under Passive and Active Attacks
690
Secrecy throughput of MANETs with malicious nodes
691
Secrecy throughput of MISO single-eavesdropper ropper networks with imperfect channel state information
692
Secrecy transmission capacity of decentralized wireless networks
693
Secrecy transmission capacity of primary network with help of cognitive interference
694
Secrecy transmission capacity of random networks
695
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes
696
Secrecy transmission with a helper: To relay or not to relay
697
Secrecy Transmission With a Helper: To Relay or to Jam
698
Secrecy Transmit Beamforming for Heterogeneous Networks
699
Secrecy using compressive sensing
700
Secrecy via Sources and Channels
701
Secrecy via sources and channels — A secret key - Secret message rate tradeoff region
702
Secrecy when the eavesdropper controls its channel states
703
Secrecy wireless information and power transfer in fading wiretap channel
704
Secrecy Wireless Information and Power Transfer in OFDMA Systems
705
Secrecy Wireless Information and Power Transfer With MISO Beamforming
706
Secrecy wireless information and power transfer with MISO beamforming
707
Secrecy wireless information and power transfer with transmit antenna selection in MISO systems
708
Secrecy-achieving polar-coding
709
Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks
710
Secrecy-based channel assignment for device-to-device communication: An auction approach
711
Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels
712
Secrecy-oriented partner selection based on social trust in device-to-device communications
713
Secrecy-Oriented Resource Sharing for Cellular Device-to-Device Underlay
714
Secrecy-Rate Balancing for Two-User MISO Interference Channels
715
Secret and private rates on degraded wire-tap channels via polar coding
716
Secret and public key image watermarking schemes for image authentication and ownership verification
717
Secret and reliable coding mechanism for noncoherent multisource network coding
718
Secret audio watermarking using empirical mode decomposition and chaotic map
719
Secret code embedded authentication of songs (SEAS)
720
Secret communication in colored images using saliency map as model
721
Secret communication in large wireless networks without eavesdropper location information
722
Secret communication in presence of colluding eavesdroppers
723
Secret communication in wireless sensor network with perfect channel state information
724
Secret communication on interference channels
725
Secret Communication Over Broadcast Erasure Channels With State-Feedback
726
Secret communication using artificial noise
727
Secret Communication Using JPEG Double Compression
728
Secret Communication Using Parallel Combinatory Spreading WFRFT
729
Secret communication using Public Key steganography
730
Secret communication using sources and channels
731
Secret Communication via Multi-antenna Transmission
732
Secret Communication with a Fading Eavesdropper Channel
733
Secret communication with feedback
734
Secret communications over semi-deterministic broadcast channels
735
Secret data communication in a degraded practical multiple input multiple output multiple eavesdropper channel
736
Secret data communication system using steganography, AES and RSA
737
Secret data sharing in cloud environment using steganography and encryption using GA
738
Secret data transmission using vital image steganography over transposition cipher
739
Secret data writing using DNA sequences
740
Secret Distribution for Secure Fingerprint Verification
741
Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems
742
Secret enough for you?
743
Secret function sharing schernes and their applications to the oblivious transfer
744
Secret Group Key Generation in Physical Layer for Mesh Topology
745
Secret handshakes from pairing-based key agreements
746
Secret Hiding Mechanism Using QR Barcode
747
Secret image / message transmission through meaningful shares using (2, 2) visual cryptography (SITMSVC)
748
Secret image communication scheme based on vector quantisation
749
Secret Image Sharing Based on Array Codes
750
Secret image sharing safety
751
Secret image sharing scheme based on bivariate polynomial
752
Secret image sharing scheme based on HS-TS geometric method
753
Secret Image Sharing Scheme with Flexible Adjustment Shadow Images
754
Secret image sharing using (t,n) threshold scheme with lossless recovery
755
Secret Image Sharing Using Quadratic Residues
756
Secret Image Sharing with Reversible Steganography
757
Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy
758
Secret image sharing without keeping permutation key
759
Secret images sharing scheme using two-variable one-way functions
760
Secret information in communications networks
761
Secret Information of Wireless Multi-Dimensional Gaussian Channels
762
Secret information transmission scheme using MIMO system
763
Secret Key Agreement Based on Radio Propagation Characteristics in Two-Way Relaying Systems
764
Secret Key Agreement by LLR Thresholding and Syndrome Feedback over AWGN Channel
765
Secret key agreement by public discussion from common information
766
Secret key agreement by reliability information of signals in Gaussian Maurer’s Model
767
Secret key agreement for cooperative wireless communications: bounds and efficient protocol design
768
Secret key agreement for free-space optical communications over strong turbulence channels
769
Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack
770
Secret key agreement from correlated source outputs using LDPC matrices
771
Secret key agreement from vector Gaussian sources by rate limited public communication
772
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
773
Secret key agreement on wiretap channel with transmitter side information
774
Secret key agreement under an active attack in MU-TDD systems with large antenna arrays
775
Secret key agreement under sampling attack
776
Secret key agreement using asymmetry in channel state knowledge
777
Secret key agreement using correlated sources over the generalized multiple access channel
778
Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack
779
Secret key agreement: General capacity and second-order asymptotics
780
Secret Key and Private Key Constructions for Simple Multiterminal Source Models
781
Secret key and private key constructions for simple multiterminal source models
782
Secret Key Capacity and Advantage Distillation Capacity
783
Secret key capacity for multipleaccess channel with public feedback
784
Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack
785
Secret key capacity: Talk or keep silent?
786
Secret Key Cryptography based Security Approach for Wireless Sensor Networks
787
Secret key cryptography with cellular automata
788
Secret key cryptography with cellular automata
789
Secret key cryptosystem based on polar codes over Binary Erasure Channel
790
Secret key distribution using differential-phase-shift keyed macroscopic coherent light
791
Secret key establishment over a pair of independent broadcast channels
792
Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients
793
Secret Key Estimation for Image Sequential Steganograph in Transform Domain
794
Secret key estimation in sequential steganography
795
Secret key extraction based on uplink CFR estimation for OFDM-FDD system
796
Secret key extraction from a UWB channel: Analysis in a real environment
797
Secret Key Extraction from Wireless Signal Strength in Real Environments
798
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
799
Secret key extraction using Bluetooth wireless signal strength measurements
800
Secret Key Generation and Agreement in UWB Communication Channels
801
Secret Key Generation Based on AoA Estimation for Low SNR Conditions
802
Secret key generation based on channel and distance measurements
803
Secret key generation exploiting antenna beam steering and wave propagation reciprocity
804
Secret key generation exploiting channel characteristics in wireless communications
805
Secret Key Generation Exploiting Ultra-wideband Indoor Wireless Channel Characteristics
806
Secret key generation for a pairwise independent network model
807
Secret Key Generation for a Pairwise Independent Network Model
808
Secret Key Generation for Correlated Gaussian Sources
809
Secret key generation for correlated Gaussian sources
810
Secret key generation from Gaussian sources using lattice hashing
811
Secret key generation from mobility
812
Secret key generation from multiple cooperative helpers by rate unlimited public communication
813
Secret key generation from reciprocal spatially correlated MIMO channels
814
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage
815
Secret key generation from static channels with untrusted relays
816
Secret key generation in correlated multi-dimensional Gaussian channels
817
Secret Key Generation in the Two-Way Relay Channel With Active Attackers
818
Secret key generation over correlated wireless fading channels using vector quantization
819
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks
820
Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks
821
Secret key generation through OFDM multipath channel
822
Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels
823
Secret Key Generation Using Physical Channels with Imperfect CSI
824
Secret Key Generation Via Localization and Mobility
825
Secret key generation via random beamforming in stationary environment
826
Secret key generation with one communicator and a one-shot converse via hypercontractivity
827
Secret Key Generation within Peer-to-Peer Network Overlays
828
Secret key management and dynamic security coding system
829
Secret key management based on variable authentication code in UPT system
830
Secret key rate region of multiple access channel model
831
Secret key reconciliation using BCH code in quantum key distribution
832
Secret key reconstruction method using round addition DFA on lightweight block cipher LBlock
833
Secret key sharing by means of reconfigurable antenna systems
834
Secret key sharing in a new source model: Rate regions
835
Secret key sharing using entanglement swapping and remote preparation of quantum state
836
Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
837
Secret key watermarking in WAV audio file in perceptual domain
838
Secret key watermarking with changing keys
839
Secret key-based authentication with a privacy constraint
840
Secret key-private key generation over three terminals: Capacity region
841
Secret laws of the labyrinth
842
Secret linear congruential generators are not cryptographically secure
843
Secret Little Functions and Codebook for Protecting Users from Password Theft
844
Secret message capacity of a line network
845
Secret message capacity of erasure broadcast channels with feedback
846
Secret message sharing using online social media
847
Secret message transmission by HARQ with multiple encoding
848
Secret Precoding-Aided Spatial Modulation
849
Secret program execution in the cloud applying homomorphic encryption
850
Secret rate - Privacy leakage in biometric systems
851
Secret Restoration Algorithms for the Image Data
852
Secret Science Fiction
853
Secret sequence comparison in distributed computing environments by interval sampling
854
Secret sequence comparison on public grid computing resources
855
Secret shares to protect health records in Cloud-based infrastructures
856
Secret Sharing and Information Hiding by Shadow Images
857
Secret Sharing and Non-Shannon Information Inequalities
858
Secret sharing based countermeasure for AES S-box
859
Secret Sharing Based on Discrete Fractional Random Transform
860
Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains
861
Secret Sharing for Health Data in Multi-provider Clouds
862
Secret sharing in continuous access control system, using heart sounds
863
Secret sharing in fast fading channels based on reliability-based hybrid ARQ
864
Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ
865
Secret sharing in graph-based prohibited structures
866
Secret Sharing in the Encrypted Domain
867
Secret Sharing in the Encrypted Domain with Secure Comparison
868
Secret sharing mechanism with cheater detection
869
Secret Sharing Method for Gray-level Images
870
Secret sharing model: GS
3
871
Secret sharing of 3D models using Blakely scheme
872
Secret Sharing of Digital Raster Maps Based on Image Scrambling
873
Secret sharing on partially ordered sets
874
Secret Sharing Protocol for Linguistic Threshold Schemes
875
Secret sharing scheme based on mignotte´s scheme
876
Secret sharing scheme for cloud computing using IDs
877
Secret Sharing Scheme for Data Confidentiality Preserving in a Public-Private Hybrid Cloud Storage Approach
878
Secret sharing scheme for data encryption based on polynomial coefficient
879
Secret sharing scheme security and performance analysis
880
Secret Sharing Scheme Suitable for Cloud Computing
881
Secret Sharing Scheme to implement medical image security
882
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage
883
Secret Sharing Scheme with Fairness
884
Secret Sharing Scheme with Non-expansible Shadow Size for Color Images
885
Secret sharing scheme with reversing
886
Secret Sharing Scheme: Vector Space Secret Sharing and F Function
887
Secret sharing schemes based on min-entropies
888
Secret sharing schemes based on minimum bandwidth regenerating codes
889
Secret sharing schemes from three classes of linear codes
890
Secret sharing schemes with bipartite access structure
891
Secret Sharing System and Secret Sharing Matrix
892
Secret Sharing Systems with Authentication-Based Steganography
893
Secret sharing via noisy broadcast channels
894
Secret sharing with access structures in a hierarchy
895
Secret sharing with extended coefficient use for improved data capacity
896
Secret Sharing With Public Reconstruction
897
Secret sharing with public reconstruction
898
Secret Sharing: Secure Password Sharing Technique
899
Secret Software [News]
900
Secret Telephone Technology Based on Information Hiding and Encryption
901
Secret Telephony as a Historical Example of Spread-Spectrum Communication
902
Secret Wavelet Packet Decompositions for Jpeg 2000 Lightweight Encryption
903
Secret window
904
Secret Wireless Communication with Public Feedback by Common Randomness
905
Secret writing on dirty paper: A deterministic view
906
Secret Writing on Dirty Paper: A Deterministic View
907
Secret!
908
Secret, public and quantum correlation cost of triples of random variables
909
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks
910
SeCReT: A Security Framework for Enhancing Chain of Response Trust in Session Initiation Protocol
911
SECRET: Selective error correction for refresh energy reduction in DRAMs
912
Secretariat
913
Secretariat of EUROCON 2007
914
Secretariat staff
915
Secretariat staff
916
Secretariat staff
917
Secretaries´ fourth conference
918
Secretary henline retires June 1 after 27 years of service
919
Secretary of the Institute appointed
920
Secretary rice of A. S. M. E. to describe South American trip
921
Secretary´s Bulletin
922
Secretary´s column
923
Secretary´s column
924
Secretary´s column
925
Secretary´s Report
926
Secretary´s Report
927
Secretary´s report highlights - AES board of governors meeting
928
Secretary´s Western tour
929
Secret-ballot receipts: True voter-verifiable elections
930
Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding
931
Secret-hardware public-key cryptography
932
Secret-Image Sharing for Multimedia Chaotic Encryption
933
Secretion of different altered laminin isoforms results in three-dimensional morphological changes in cells cultured on Matrigel
934
Secretion of mmp-9 by soluble glucocorticoid-induced tumor necrosis factor receptor (sgitr) is mediated by phosprolipase d (pld) in murine macrophage
935
Secret-key agreement over a non-coherent block-fading MIMO wiretap channel
936
Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion
937
Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime
938
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
939
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
940
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
941
Secret-Key Agreement With Channel State Information at the Transmitter
942
Secret-Key capacity of compound source models with one-way public communication
943
Secret-key cryptography from ideal primitives: A systematic overview
944
Secret-Key Distribution Based on Bounded Observability
945
Secret-key generation from wireless channels: Mind the reflections
946
Secret-Key Generation Using Correlated Sources and Channels
947
Secret-key generation with arbitrarily varying eavesdropper´s channel
948
Secret-key generation with correlated sources and noisy channels
949
Secret-key sharing based on layered broadcast coding over fading channels
950
Secrets and dice
951
Secrets and lies: digital security in a networked world [Book Review]
952
Secrets and lies: digital security in a networked world [Books]
953
Secrets of a teleprinter
954
Secrets of GrabCut and Kernel K-Means
955
Secrets of innovation success - A research organisation perspective
956
Secrets of Matrix Factorization: Approximations, Numerics, Manifold Optimization and Random Restarts
957
Secrets of optical flow estimation and their principles
958
Secrets of PZT
959
Secrets of Software Success: Management Insights from 100 Software Firms around the World [Book Review]
960
Secrets of success
961
Secrets of success: Innovation in the Silicon Valley: Business development and innovation of tech companies
962
Secrets of successful simulation projects
963
Secrets of successful simulation studies
964
Secrets of the data stream
965
Secrets of the great communicators
966
Secrets of the Soviet nuclear complex
967
Secrets of user-seductive documents: wooing and winning the reluctant reader [Book Review]
968
Secrets to managing a large documentation project virtually—process, technology, and group ethos: Lessons learned
969
Secrets to success and fatal flaws: the design of large-display groupware
970
Secret-Sharing Based Secure Communication Protocols for Passive RFIDs
971
Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel
972
Secret-sharing schemes based on self-dual codes
973
Secret-sharing: Interactions between a child, robot, and adult
974
Secrobat: Secure and Robust Component-based Architectures
975
SecRout: a secure routing protocol for sensor networks
976
SECS: A New Single-Electron-Circuit Simulator
977
SE-CSE 2009: The second international workshop on software engineering for Computational Science and Engineering
978
SecSE 2010 Organization
979
SecSE 2013: Message from the Workshop Organizers
980
SE-CSE 2013: The 2013 International Workshop on Software Engineering for Computational Science and Engineering
981
SecSE 2013: Workshop Program Committee
982
SecSE Organization Committee
983
SecSE Program Committee
984
SecSE reviewers
985
SECSE Workshop Program Committee
986
SecSens - Security Architecture for Wireless Sensor Networks
987
SecSip: A stateful firewall for SIP-based networks
988
SecSyslog: an approach to secure logging based on covert channels
989
SecSyWiSe: A secure time synchronization scheme in wireless sensor networks
990
SECT---A coding technique for black/white graphics
991
SECTCS: towards improving VSM and Naive Bayesian classifier
992
SecTest 2012 Workshop Organization
993
Section
994
Section
995
Section
996
Section
997
Section
998
Section
999
Section
1000
Section