The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Information Theory
1997, volume: 43, number: 2

  1. Oscar E. Agazzi, Nambirajan Seshadri
    On the use of tentative decisions to cancel intersymbol interference and nonlinear distortion (with application to magnetic recording channels). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:394-408 [Journal]
  2. Daniel M. Yellin, Alexander Vardy, Ofer Amrani
    Joint equalization and coding for intersymbol interference channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:409-425 [Journal]
  3. Tricia J. Willink, Paul H. Wittke
    Optimization and performance evaluation of multicarrier transmission. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:426-440 [Journal]
  4. Bartolomeu F. Uchôa Filho, Mark A. Herro
    Good convolutional codes for the precoded (1-D)(1+D)n partial-response channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:441-453 [Journal]
  5. Ho-Kyoung Lee, Charles L. Weber
    Multiple-symbol trellis-coded modulation applied to noncoherent continuous-phase frequency shift keying. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:454-468 [Journal]
  6. Kutluyil Dogancay, Rodney A. Kennedy
    Blind detection of equalization errors in communication systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:469-482 [Journal]
  7. Gusztáv Morvai, Sidney Yakowitz, Paul H. Algoet
    Weakly convergent nonparametric forecasting of stationary time series. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:483-498 [Journal]
  8. Karim Abed-Meraim, Philippe Loubaton, E. Moulines
    A subspace algorithm for certain blind identification problems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:499-511 [Journal]
  9. H. Pezeshki-Esfahani, A. J. Heunis
    Strong diffusion approximations for recursive stochastic algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:512-523 [Journal]
  10. Adel A. Zerai, James A. Bucklew
    Poisson approximation for excursions of adaptive algorithms with a lattice state space. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:524-536 [Journal]
  11. S. R. Blackburn
    Fast rational interpolation, Reed-Solomon decoding, and the linear complexity profiles of sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:537-548 [Journal]
  12. Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein
    On the information function of an error-correcting code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:549-557 [Journal]
  13. Yosef Kofman, Ephraim Zehavi, Shlomo Shamai
    nd-convolutional codes. I. Performance analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:558-575 [Journal]
  14. Yosef Kofman, Ephraim Zehavi, Shlomo Shamai
    nd-convolutional codes. II. Structural analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:576-589 [Journal]
  15. Josep Rifà, Jaume Pujol
    Translation-invariant propelinear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:590-598 [Journal]
  16. Te Sun Han, Mamoru Hoshi
    Interval algorithm for random number generation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:599-611 [Journal]
  17. Tamás Linder, Gábor Lugosi, Kenneth Zeger
    Empirical quantizer design in the presence of source noise or channel noise. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:612-623 [Journal]
  18. K. L. Bell, Yossef Steinberg, Yariv Ephraim, Harry L. van Trees
    Extended Ziv-Zakai lower bound for vector parameter estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:624-637 [Journal]
  19. Xiaolin Wu
    Optimal binary vector quantization via enumeration of covering codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:638-645 [Journal]
  20. Qun Xie, Andrew R. Barron
    Minimax redundancy for the class of memoryless sources. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:646-657 [Journal]
  21. Serap A. Savari, Robert G. Gallager
    Generalized Tunstall codes for sources with memory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:658-668 [Journal]
  22. Rudolf Ahlswede, Te Sun Han, Kingo Kobayashi
    Universal coding of integers and unbounded search trees. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:669-682 [Journal]
  23. Mark R. Titchener
    The synchronization of variable-length codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:683-691 [Journal]
  24. Steven W. McLaughlin, A. S. Khayrallah
    Shaping codes constructed from cost-constrained graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:692-699 [Journal]
  25. Steven W. McLaughlin
    The construction of M-ary (d, {infty}) codes that achieve capacity and have the fewest number of encoder states. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:699-703 [Journal]
  26. J.-C. Batllo, Vinay A. Vaishampayan
    Asymptotic performance of multiple description transform codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:703-707 [Journal]
  27. L. Wilhelmsson, Kamil Sh. Zigangirov
    On uncoordinated transmission over the T-user q-ary noiseless multiple-access channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:707-711 [Journal]
  28. Marten van Dijk
    On a special class of broadcast channels with confidential messages. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:712-714 [Journal]
  29. Eva K. Englund, A. I. Hansson
    Constructive codes with unequal error protection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:715-721 [Journal]
  30. W. C. Ferreira, W. A. Clarke, Albertus S. J. Helberg, Khaled A. S. Abdel-Ghaffar, A. J. Han Vinck
    Insertion/deletion correction with spectral nulls. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:722-732 [Journal]
  31. Li-Zhong Tang, Cheong Boon Soh, Erry Gunawan
    A note on the q-ary image of a qm-ary repeated-root cyclic code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:732-737 [Journal]
  32. Muzhong Wang, Ian F. Blake
    Normal basis of the finite field F2(p-1)pm over F2. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:737-739 [Journal]
  33. Klaus Huber
    Codes over tori. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:740-744 [Journal]
  34. Enzo Baccarelli, Roberto Cusani, Stefano Galli
    Novel analytical performance bounds for symbol-by-symbol decoding of digital-data impaired by ISI and AWGN. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:744-750 [Journal]
  35. C.-Eugen D. Sterian
    Wei-type trellis-coded modulation with 2N -dimensional rectangular constellation for N not a power of two. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:750-758 [Journal]
  36. Tolga M. Duman, Masoud Salehi
    Optimal quantization for finite-state channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:758-765 [Journal]
  37. Neri Merhav
    On list size exponents in rate-distortion coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:765-769 [Journal]
  38. Igor V. Nikiforov
    Two strategies in the problem of change detection and isolation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:770-776 [Journal]
  39. Elias Masry
    Polynomial interpolation and prediction of continuous-time processes from random samples. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:776-783 [Journal]
  40. Hsien-Kuei Hwang
    Optimal algorithms for inserting a random element into a random heap. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:784-787 [Journal]
  41. Linzhang Lu, Weiwei Sun
    The minimal eigenvalues of a class of block-tridiagonal matrices. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:787-791 [Journal]
  42. Ilya Dumer
    Correction to 'Suboptimal decoding of linear codes: Partition technique' [Nov 96 1971-1986]. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:792- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002