The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Information Theory
1987, volume: 33, number: 3

  1. Jacobus H. van Lint, T. A. Springer
    Generalized Reed - Solomon codes from algebraic geometry. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:305-309 [Journal]
  2. Rudolf Ahlswede, Amiram H. Kaspi
    Optimal coding strategies for certain permuting channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:310-314 [Journal]
  3. Baruch Awerbuch, Robert G. Gallager
    A new distributed algorithm to find breadth first search trees. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:315-322 [Journal]
  4. Ronald L. Rivest
    Network control by Bayesian broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:323-328 [Journal]
  5. Loren P. Clare, Izhak Rubin
    Performance boundaries for prioritized multiplexing systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:329-340 [Journal]
  6. Micha Hofri, Zvi Rosberg
    Packet delay under the golden ratio weighted TDM policy in a multiple-access channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:341-349 [Journal]
  7. Neil L. Gerr, Stamatis Cambanis
    Analysis of adaptive differential PCM of a stationary Gauss - Markov input. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:350-359 [Journal]
  8. Dale H. Mugler, Wolfgang Splettstösser
    Linear prediction from samples of a function and its derivatives. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:360-366 [Journal]
  9. Wolfgang Härdle, Rainer Nixdorf
    Nonparametric sequential estimation of zeros and extrema of regression functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:367-372 [Journal]
  10. Nelson M. Blachman, Robert Machol
    Confidence intervals based on one or more observations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:373-382 [Journal]
  11. Soura Dasgupta, Yih-Fang Huang
    Asymptotically convergent modified recursive least-squares with data-dependent updating and forgetting factor for systems with bounded noise. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:383-392 [Journal]
  12. Jitendra K. Tugnait
    Identification of linear stochastic systems via second- and fourth-order cumulant matching. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:393-407 [Journal]
  13. Wlodzimierz Greblicki, Miroslaw Pawlak
    Necessary and sufficient conditions for Bayes risk consistency of a recursive kernel classification rule. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:408-0 [Journal]
  14. Philippe Delsarte, Yves V. Genin, Y. Kamp
    Stability of linear predictors and numerical range of a linear operator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:412-0 [Journal]
  15. John S. Sadowsky
    On the robust discrimination of Poisson random counting measures. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:415-0 [Journal]
  16. Attilio J. Rainal
    First and second passage times of Rayleigh processes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:419-0 [Journal]
  17. Ian F. Blake, H. Darabian
    Approximations for the probability in the tails of the binomial distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:426-0 [Journal]
  18. Jean Louis Dornstetter
    On the equivalence between Berlekamp's and Euclid's algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:428-0 [Journal]
  19. Michiel H. M. Smid
    Duadic codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:432-0 [Journal]
  20. Jacobus H. Weber, Cornelis de Vroedt, Dick E. Boekee
    New upper bounds on the size of codes correcting asymmetric errors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:434-0 [Journal]
  21. Jan L. P. de Lameillieure
    A heuristic algorithm for the construction of a code with limited word length. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:438-0 [Journal]
  22. Katalin Marton
    Sequences achieving the boundary of the entropy region for a two-source are virtually memoryless. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:443-0 [Journal]
  23. Kenneth J. Kerpez
    The rate-distortion function of a binary symmetric source when side information may be absent. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:448-0 [Journal]
  24. Kees A. Schouhamer Immink, G. F. M. Beenker
    Binary transmission codes with higher order spectral zeros at zero frequency. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:452-0 [Journal]
  25. Michael E. Monaco, James M. Lawler
    Corrections and additions to 'Error recovery for variable length codes' by J.C. Maxted and J.P. Robinson. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:454-0 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002