default search action
Anand Kannan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c7]Anand Subramanian, Tanmay Halder, Laxmi Vivek Tripurari, Anand Kannan:
9.5 A 118.5dBA DR 3.3mW Audio ADC with a Class-B Resistor DAC, Non-Overlap DEM and Continuous-Time Quantizer. ISSCC 2024: 176-178 - 2021
- [j5]Shanthi Pavan, Tanmay Halder, Anand Kannan:
Continuous-Time Incremental Delta-Sigma Modulators With FIR Feedback. IEEE Trans. Circuits Syst. I Regul. Pap. 68(8): 3222-3231 (2021) - [c6]Udita Mukherjee, Tanmay Halder, Anand Kannan, Sovan Ghosh, Shanthi Pavan:
A 28.5µW All-Analog Voice-Activity Detector. ISCAS 2021: 1-5 - 2020
- [c5]Vipul Bajaj, Anand Kannan, Minkle E. Paul, Nagendra Krishnapura:
Noise Shaping Techniques for SNR Enhancement in SAR Analog to Digital Converters. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [i1]Iddo Drori, Darshan Thaker, Arjun Srivatsa, Daniel Jeong, Yueqi Wang, Linyong Nan, Fan Wu, Dimitri Leggas, Jinhao Lei, Weiyi Lu, Weilong Fu, Yuan Gao, Sashank Karri, Anand Kannan, Antonio Khalil Moretti, Mohammed AlQuraishi, Chen Keasar, Itsik Pe'er:
Accurate Protein Structure Prediction by Embeddings and Deep Learning Representations. CoRR abs/1911.05531 (2019) - 2015
- [j4]Anand Kannan, Karthik Gururajan Venkatesan, Alexandra Stagkopoulou, Sheng Li, Sathyavakeeswaran Krishnan, Arifur Rahman:
A Novel Cloud Intrusion Detection System Using Feature Selection and Classification. Int. J. Intell. Inf. Technol. 11(4): 1-15 (2015) - 2012
- [c4]Sathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen:
V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning. ICACCI 2012: 148-154 - [c3]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. ICACCI 2012: 952-960 - [c2]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Peter Schoo:
Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks. ICDM Workshops 2012: 416-423
2000 – 2009
- 2007
- [c1]Sampathkumar Veeraraghavan, Sankeerth Rampa, Anand Kannan:
An Agent Based Approach for Intrusion Detection and Prevention in Mobile Networks. IMECS 2007: 561-563 - 2001
- [j3]Anand Kannan, Thomas P. Krauss, Michael D. Zoltowski:
Separation of cochannel signals under imperfect timing and carrier synchronization. IEEE Trans. Veh. Technol. 50(1): 79-96 (2001)
1990 – 1999
- 1997
- [j2]Anand Kannan, V. U. Reddy:
Maximum likelihood estimation of constellation vectors for blind separation of co-channel BPSK signals and its performance analysis. IEEE Trans. Signal Process. 45(7): 1736-1741 (1997) - 1995
- [j1]Anand Kannan, George Mathew, Vellenki U. Reddy:
Blind separation of multiple co-channel BPSK signals arriving at an antenna array. IEEE Signal Process. Lett. 2(9): 176-178 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint