Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

ISIT 2009: Seoul, Korea

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Finite Precision Compressive Sensing

    Relay Channel:Capacity and Bounds I

    Multiple Descriptions

    Combinatorial Properties of LDPC Codes I

    Space-Time Coding I

    Network Coding and Capacity I

    Sequences and Correlation I

    Information Measures

    Compressive Sensing and Applications

    Relay Channel:Capacity and Bounds II

    Lossless Compression

    Combinatorial Properties of LDPC Codes II

    ARQ

    Network Coding and Capacity II

    Sequences and Correlation II

    Information Inequalities

    Matrix Completion and Compressive Sensing

    Bi-Directional Relaying

    Source Coding

    LDPC Decoding I

    Feedback in Wireless Communication

    Network Coding and Decoding

    Sequences and Applications

    Estimation I

    Sparse Recovery I

    Decode-Forward Relaying

    Random-Process Compression

    Analysis of LDPC Codes I

    Wireless Channels

    Cognitive Radio and Capacity

    Sequences and Complexity

    Detection

    Sparse Recovery II

    Cooperation I

    Universal Compression

    Lattice Codes

    Channel Estimation

    Network Wireless Communication

    Quantum Codes

    Estimation II

    Network Operations

    Cooperation II

    Slepian-Wolf

    Turbo Codes

    Space-Time Coding II

    Applications of LDPC Codes

    Quantum Codes and Systems

    Hypothesis Testing

    Errors and Erasures

    Scheduling in Relay Networks

    Coding with Side Information

    Constrained Coding I

    Coded Modulation

    Cryptographic Algorithms

    Maximum Likelihood

    Network Coding and Security

    Impact of Channel State Information

    Distributed Source Coding

    Coding for Storage

    List Decoding

    Precoding II

    Cryptographic Protocols

    Lossless Distributed Source Coding

    Sequential Methods

    Frequency Domain Communication

    Algebraic Methods I

    Queuing and Delays

    Cooperative Diversity-Multiplexing Tradeoff

    Lossy Distributed Source Coding

    Channels with Feedback

    Wireless Systems

    Constrained Coding II

    Applications

    DMT and Feedback in the Interference Channel

    Multihop Wireless Networks

    Channel Coding

    LDPC Decoding II

    Wireless Precoding

    Capacity of Multiple Access Channels

    Algebraic Error Correcting Codes I

    Stochastic Processes

    Interference Alignment

    Heterogeneous Wireless Networks

    Capacity Bounds

    Analysis of LDPC Codes II

    Wireless Capacities

    Coding for Multiple Access Channels

    Quantum Channels and Systems

    Statistics

    Degrees of Freedom for the Interference Channel

    Wiretap Channels

    The Gelfand-Pinsker Channel

    LDPC Code Design

    Space-Time Coding III

    Bi-Directional Communications

    Spherical Codes

    Algorithms and Circuits

    Interference Cooperation and Secrecy

    Network Resilience

    Source-Channel Coding

    Channel Variations

    Channel Capacity

    Codes and Bands

    Biometric Identification and Fingerprinting

    Interference and System Performance

    Generation and Cost of Secrecy

    Network Information Theory

    Rateless Codes

    Feedback in Wireless Communication II

    Multiple-Access Channels

    Algebraic Error-Correcting Codes II

    Statistics II

    Interference and Capacity

    Physical Layer Security

    Broadcast Channels

    Wireless Broadcast

    Cognitive Radio Systems

    Codes and Applications I

    Wireless Network Coding

    Gaussian Interference Channels

    Wireless Security

    Multiuser Information Theory

    Analysis of LDPC Codes IV

    Optimization of Wireless Systems

    Network Detection

    Combinatorial Codes

    Security

    Wireless Network Broadcast and Access

    Broadcast Channels and Secrecy

    Broadcasting Correlated Sources

    Algebraic Methods II

    Space-Time Coding IV

    Operation of Ad Hoc Networks

    Network Codes

    Sensors and Network Coding

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-07-18 00:42 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp