default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2024
- Zhaobin Duan, Zhenyang Ma, Jie Bai, Peng Wang, Ke Xu, Shun Yuan:
Deployment Protection for Interference of 5G Base Stations with Aeronautical Radio Altimeters. Sensors 24(7): 2313 (2024) - Eunsun Kim, Ian P. Roberts, Jeffrey G. Andrews:
Spectrum Sharing in Low-Earth Orbit Satellite Systems Under an Interference Protection Constraint. ICC 2024: 4433-4438 - 2023
- Zihao Peng, Boyuan Li, Le Li, Shengbo Chen, Guanghui Wang, Hong Rao, Cong Shen:
Performance Optimization for Noise Interference Privacy Protection in Federated Learning. IEEE Trans. Cogn. Commun. Netw. 9(5): 1322-1339 (2023) - Johannes Rossouw van der Merwe, Iñigo Cortés, Muhammad Saad, Fabio Garzia, Alexander Rügamer, Matthias Overbeck, Wolfgang Felber:
Comparison of interference mitigation with adaptive notch filter architectures against privacy protection devices. PLANS 2023: 481-491 - 2022
- Ai Zhang, Xiaohui Li:
Research on privacy protection of dummy location interference for Location-Based Service location. Int. J. Distributed Sens. Networks 18(9): 155013292211251 (2022) - Hede Lu, Fulong Xu, Qianying Wang, Zhida Chen, Qiang Zhang:
For Safer Approach Landing of the Aircraft: Measuring the Electromagnetic Interference of High-Speed Train to ILS and Giving Protection Recommendations. IEEE Instrum. Meas. Mag. 25(8): 26-31 (2022) - Hao Wang, Guangjie Han, Yun Hou, Mohsen Guizani, Yan Peng:
A Multi-Channel Interference Based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 71(2): 2058-2069 (2022) - Ho-Kyung Son, Young-Jun Chong:
Derivation of separation distance for LTE-M protection from HIBS interference signal. ICTC 2022: 2392-2395 - 2021
- Min-Su Kim, Hee-Sauk Jhon:
An ESD and Interference-Robust Protection Circuit for Cascode Low-Noise Amplifier in CMOS-SOI Technology. IEEE Access 9: 75293-75301 (2021) - Wanqing Wu, Haoke Zhang, Victor Hugo C. de Albuquerque, Lin Xu:
Hyper-Noise Interference Privacy Protection Framework for Intelligent Medical Data-Centric Networks. IEEE Netw. 35(1): 333-339 (2021) - 2020
- Zhimeng Yin, Wenchao Jiang, Ruofeng Liu, Song Min Kim, Tian He:
SafetyNet: Interference Protection via Transparent PHY Layer Coding. ICDCS 2020: 267-277 - 2019
- Kun Zhang, Chong Shen, Mengxing Huang, Haifeng Wang, Hanwen Li, Qian Gao:
Interrupt protection control of anti-interference nodes in network based on band sampling decision filter modulation. Clust. Comput. 22(Supplement): 7569-7576 (2019) - Wasan Kadhim Saad, Waheb A. Jabbar, Bashar J. Hamza:
Adaptive Modulation and Superposition Coding for MIMO Data Transmission Using Unequal Error Protection and Ordered Successive Interference Cancellation Techniques. J. Commun. 14(8): 696-705 (2019) - Volodymyr Yartsev, Dmitry Gololobov:
Protection of data transmission systems from the influence of intersymbol interference of signals. ITS 2019: 59-70 - 2018
- Isabela Cunha Maia Nobre, José Mauro P. Fortes:
On the protection of fixed service receivers from the interference generated by non-GSO satellite systems operating in the 3.7-4.2 GHz band. Int. J. Satell. Commun. Netw. 36(5): 383-401 (2018) - 2017
- Jongpil Seo, Hyeonsu Kim, Jongmin Ahn, Jaehak Chung:
Macrocell Protection Interference Alignment in Two-Tier Downlink Heterogeneous Networks. Mob. Inf. Syst. 2017: 7410546:1-7410546:13 (2017) - Greg Kuperman, Eytan H. Modiano:
Providing Guaranteed Protection in Multi-Hop Wireless Networks with Interference Constraints. IEEE Trans. Mob. Comput. 16(12): 3502-3512 (2017) - Sang-Hoon Kim, Jinhyuk Lee, Jin-Soo Kim:
GCMix: An Efficient Data Protection Scheme against the Paired Page Interference. ACM Trans. Storage 13(4): 37:1-37:23 (2017) - Thabane H. Shabangu, Purva Shrivastava, Bolanle Tolulope Abe, Kazeem B. Adedeji, Peter A. Olubambi:
Influence of AC interference on the cathodic protection potentials of pipelines: Towards a comprehensive picture. AFRICON 2017: 597-602 - 2016
- Helder M. N. S. Oliveira, Nelson L. S. da Fonseca:
The minimum interference p-cycle algorithm for protection of space division multiplexing elastic optical networks. LATINCOM 2016: 1-6 - 2015
- Minh Thao Quach:
Cross-layer framework for interference avoidance in cognitive radio ad-hoc networks. (Un cadre inter-couches pour la protection contre les interférences dans les réseaux ad-hoc radio cognitive). University of Bordeaux, France, 2015 - Oriol Font-Bach, Nikolaos G. Bartzoudis, Xavier Mestre, David López Bueno, Philippe Mege, Laurent Martinod, Vidar Ringset, Tor André Myrvoll:
When SDR meets a 5G candidate waveform : Agile use of fragmented spectrum and interference protection in PMR networks. IEEE Wirel. Commun. 22(6): 56-66 (2015) - Ayodele Periola, Olabisi E. Falowo:
Interference protection of radio astronomy services using cognitive radio spectrum sharing models. EuCNC 2015: 86-90 - Geordie George, Ratheesh Kumar Mungara, Angel E. Lozano:
Optimum exclusion regions for interference protection in device-to-device wireless networks. WiOpt 2015: 102-109 - 2014
- J. Pierre De Vries:
Harm Claim Threshholds: Facilitating More Intensive Spectrum Use Through More Explicit Interference Protection Rights. J. Telecommun. High Technol. Law 12(1): 55-72 (2014) - Vlad Popescu, Mauro Fadda, Maurizio Murroni, Javier Morgade, Pablo Angueira:
Co-Channel and Adjacent Channel Interference and Protection Issues for DVB-T2 and IEEE 802.22 WRAN Operation. IEEE Trans. Broadcast. 60(4): 693-700 (2014) - Jianxin Li, Wenhan Yang:
Research on the Protection Distances for the Interference from the Fixed-Satellite Earth Stations to the Space Research Earth Stations. CIT 2014: 842-845 - Greg Kuperman, Eytan H. Modiano:
Disjoint path protection in multi-hop wireless networks with interference constraints. GLOBECOM 2014: 4472-4477 - 2013
- Rodrigo A. Vaca Ramírez, John S. Thompson, Víctor Manuel Ramos Ramos:
Non-cooperative uplink interference protection framework for fair and energy efficient orthogonal frequency division multiple access networks. IET Commun. 7(18): 2015-2025 (2013) - Mauro Fadda, Maurizio Murroni, Vlad Popescu, Javier Morgade, Ruth Sancho, Pablo Angueira:
Protection ratios and interference curves for broadcast and cognitive co-channel and adjacent channel operation. BMSB 2013: 1-5
skipping 20 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 05:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint