Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 158 matches
- 1978
- János Aczél:
Some Recent Results on characterizations of Measures of Information Related to Coding. IEEE Trans. Inf. Theory 24(5): 592-595 (1978) - Teofilo C. Ancheta Jr.:
Bounds and techniques for linear source coding (Ph.D. Thesis abstr.). IEEE Trans. Inf. Theory 24(2): 276 (1978) - Brian D. O. Anderson:
Covariance factorization via Newton-Raphson iteration. IEEE Trans. Inf. Theory 24(2): 183-187 (1978) - John B. Anderson, Desmond P. Taylor:
A bandwidth-efficient class of signal-space codes. IEEE Trans. Inf. Theory 24(6): 703-712 (1978) - Edward F. Assmus Jr., Harold F. Mattson Jr.:
The weight-distribution of a coset of a linear code (Corresp.). IEEE Trans. Inf. Theory 24(4): 497 (1978) - E. D. Banta:
A class of nonlinear block codes using the logical Hadamard transform to achieve virtually identical encoding and decoding (Corresp.). IEEE Trans. Inf. Theory 24(6): 761-763 (1978) - Israel Bar-David, Moshe Levy:
Advent of nonregularity in photon-pulse delay estimation (Corresp.). IEEE Trans. Inf. Theory 24(1): 122-124 (1978) - Ferruccio Barsi, Piero Maestrini:
Improved decoding algorithms for arithmetic residue codes (Corresp.). IEEE Trans. Inf. Theory 24(5): 640-643 (1978) - Nagwa Esmat Bekir:
Bounds on the distribution of partial correlation for PN and Gold sequences (Ph.D. Thesis abstr.). IEEE Trans. Inf. Theory 24(5): 653 (1978) - Moshe Ben-Bassat:
Epsilon -equivalence of feature selection rules (Corresp.). IEEE Trans. Inf. Theory 24(6): 769-772 (1978) - Moshe Ben-Bassat, Josef Raviv:
Renyi's entropy and the probability of error. IEEE Trans. Inf. Theory 24(3): 324-331 (1978) - Elwyn R. Berlekamp, Robert J. McEliece, Henk C. A. van Tilborg:
On the inherent intractability of certain coding problems (Corresp.). IEEE Trans. Inf. Theory 24(3): 384-386 (1978) - Elwyn R. Berlekamp, John L. Ramsey:
Readable erasures improve the performance of Reed-Solomon codes (Corresp.). IEEE Trans. Inf. Theory 24(5): 632-633 (1978) - Marc R. Best, Andries E. Brouwer, F. Jessie MacWilliams, Andrew M. Odlyzko, Neil J. A. Sloane:
Bounds for binary codes of length less than 25. IEEE Trans. Inf. Theory 24(1): 81-93 (1978) - Vijay K. Bhargava, Gérald E. Séguin, Jack M. Stein:
Some (ink, k) cyclic codes in quasi-cyclic form (Corresp.). IEEE Trans. Inf. Theory 24(5): 630-632 (1978) - Joseph R. Breton:
A general theory of acoustic propagation with applications to strong acoustic scattering in the atmosphere and ocean (Ph.D. Thesis abstr.). IEEE Trans. Inf. Theory 24(5): 653 (1978) - John L. Brown Jr.:
On mean-square aliasing error in the cardinal series expansion of random processes (Corresp.). IEEE Trans. Inf. Theory 24(2): 254-256 (1978) - Charles R. Cahn, Donald K. Leimer:
Threshold reduction for demodulating a BPSK suppressed-carrier signal (Corresp.). IEEE Trans. Inf. Theory 24(5): 645-649 (1978) - Stamatis Cambanis, Elias Masry:
On the reconstruction of the covariance of stationary Gaussian processes observed through zero-memory nonlinearities. IEEE Trans. Inf. Theory 24(4): 485-494 (1978) - Roger J. Camrass, Robert G. Gallager:
Encoding message lengths for data transmission (Corresp.). IEEE Trans. Inf. Theory 24(4): 495-496 (1978) - Gianfranco L. Cariolaro:
Error probability in digital fiber optic communication systems. IEEE Trans. Inf. Theory 24(2): 213-221 (1978) - Aydano B. Carleial:
Interference channels. IEEE Trans. Inf. Theory 24(1): 60-70 (1978) - B. Chandrasekaran, K. B. Lakshmanan:
Finite memory multiple hypothesis testing: Close-to-optimal schemes for Bernoulli problems. IEEE Trans. Inf. Theory 24(6): 755-759 (1978) - Ming Chang:
Rate-distortion with a fully informed decoder and partially informed encoder (Ph.D. Thesis abstr.). IEEE Trans. Inf. Theory 24(6): 786 (1978) - Chin-Long Chen:
Equivalent irreducible Goppa codes (Corresp.). IEEE Trans. Inf. Theory 24(6): 766-769 (1978) - Pierre R. Chevillat, Daniel J. Costello Jr.:
An analysis of sequential decoding for specific time-invariant convolutional codes. IEEE Trans. Inf. Theory 24(4): 443-451 (1978) - A. Brinton Cooper III, Willis C. Gore:
Iterated codes with improved performance (Corresp.). IEEE Trans. Inf. Theory 24(1): 116-118 (1978) - Thomas M. Cover, Roger C. King:
A convergent gambling estimate of the entropy of English. IEEE Trans. Inf. Theory 24(4): 413-421 (1978) - Alain Crolotte:
Memory versus error tradeoffs in question-answering systems (Ph.D. Thesis abstr.). IEEE Trans. Inf. Theory 24(6): 786 (1978) - Imre Csiszár, János Körner:
Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3): 339-348 (1978)
skipping 128 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 19:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint