The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Information Theory
1994, volume: 40, number: 1

  1. Zhen Zhang, Xiang-Gen Xia
    Three messages are not optimal in worst case interactive communication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:3-10 [Journal]
  2. Yossef Steinberg, H. Vincent Poor
    Sequential amplitude estimation in multiuser communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:11-20 [Journal]
  3. Robert J. McEliece, Kumar N. Sivarajan
    Performance limits for channelized cellular telephone systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:21-34 [Journal]
  4. Venugopal V. Veeravalli, Tamer Basar, H. Vincent Poor
    Minimax robust decentralized detection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:35-40 [Journal]
  5. A. M. Maras
    Locally optimum Bayes detection in ergodic Markov noise. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:41-55 [Journal]
  6. M. Mobed, William L. Root
    Estimation of constrained parameters in a linear model with multiplicative and additive noise. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:56-66 [Journal]
  7. Amod V. Dandawate, Georgios B. Giannakis
    Nonparametric polyspectral estimators for kth-order (almost) cyclostationary processes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:67-84 [Journal]
  8. Hirosuke Yamamoto
    Coding theorems for Shannon's cipher system with correlated source outputs, and common information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:85-95 [Journal]
  9. Boris Ryabko
    Fast and efficient coding of information sources. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:96-99 [Journal]
  10. Serap A. Savari, Robert G. Gallager
    Arithmetic coding for finite-state noiseless channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:100-107 [Journal]
  11. Michelle Effros, Philip A. Chou, Eve A. Riskin, Robert M. Gray
    A progressive universal noiseless coder. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:108-117 [Journal]
  12. Douglas R. Stinson
    Decomposition constructions for secret-sharing schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:118-125 [Journal]
  13. Xuemin Chen, Irving S. Reed, Trieu-Kien Truong
    A performance comparison of the binary quadratic residue codes with the 1/2-rate convolutional codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:126-136 [Journal]
  14. Sergio Benedetto, Roberto Garello, Marina Mondin, Guido Montorsi
    Geometrically uniform TCM codes over groups based on L × MPSK constellations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:137-0 [Journal]
  15. Morteza Naraghi-Pour, Manjunath V. Hegde, N. Arora
    DPCM encoding of regenerative composite processes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:153-0 [Journal]
  16. K. T. Oh, J. J. Matzner
    Performance of a general decoding technique over the class of randomly chosen parity check codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:160-0 [Journal]
  17. A. Robert Calderbank, Peter C. Fishburn
    The normalized second moment of the binary lattice determined by a convolutional code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:166-0 [Journal]
  18. Sylvia B. Encheva, Torleiv Kløve
    Codes satisfying the chain condition. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:175-0 [Journal]
  19. Serap A. Savari
    Some notes on Varn coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:181-0 [Journal]
  20. Nam Phamdo, Nariman Farvardin
    Optimal detection of discrete Markov sources over discrete memoryless channels - applications to combined source-channel coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:186-0 [Journal]
  21. Marijn van Eupen
    Five new optimal ternary linear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:193-0 [Journal]
  22. Juriaan Simonis
    Restrictions on the weight distribution of binary linear codes imposed by the structure of Reed-Muller codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:194-0 [Journal]
  23. Robert Morelos-Zaragoza, Shu Lin
    On a class of optimal nonbinary linear unequal-error-protection codes for two sets of messages. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:196-0 [Journal]
  24. Hervé Chabanne, Graham H. Norton
    The n-dimensional key equation and a decoding application. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:200-0 [Journal]
  25. Daniel Augot, Nicolas Sendrier
    Idempotents and the BCH bound. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:204-0 [Journal]
  26. Klaus Huber
    Codes over Gaussian integers. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:207-0 [Journal]
  27. R. G. Egri, F. A. Horrigan
    A finite group of complex integers and its application to differentially coherent detection of QAM signals. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:216-0 [Journal]
  28. Jukka Teuhola, Timo Raita
    Arithmetic coding into fixed-length codewords. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:219-0 [Journal]
  29. Carsten Dahl
    Fast decoding of codes from algebraic curves. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:223-0 [Journal]
  30. Jerry D. Gibson
    A bound on the rate of a system for encoding an unknown Gaussian autoregressive source. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:230-0 [Journal]
  31. F. Brouaye
    Asymptotic normality of some Hermitian forms with complex noisy data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:236-0 [Journal]
  32. Giovanni Jacovitti, Alessandro Neri
    Estimation of the autocorrelation function of complex Gaussian stationary processes by amplitude clipped signals. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:239-0 [Journal]
  33. Vinay A. Vaishampayan, Jaroslaw Domaszewicz
    Design of entropy-constrained multiple-description scalar quantizers. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:245-0 [Journal]
  34. John S. Sadowsky
    On maximizing linear system output energy with an input envelope constraint. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:251-0 [Journal]
  35. Bixio Rimoldi
    Successive refinement of information: characterization of the achievable rates. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:253-0 [Journal]
  36. Meir Feder, Neri Merhav
    Relations between entropy and error probability. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:259-0 [Journal]
  37. László Györfi, Istvan Pali, Edward C. van der Meulen
    There is no universal source code for an infinite source alphabet. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:267-0 [Journal]
  38. Yuan Xing Li, Robert H. Deng, Xin-mei Wang
    On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:271-0 [Journal]
  39. Steven M. Bellovin, Michael Merritt
    An attack on the Interlock Protocol when used for authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:273-0 [Journal]
  40. J. W. P. Hirschfeld, Michael A. Tsfasman, Serge G. Vladut
    The weight hierarchy of higher dimensional Hermitian codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:275-0 [Journal]
  41. David M. Koppelman, A. Yavuz Oruç
    The complexity of routing in Clos permutation networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:278-0 [Journal]
  42. Meir Feder, Neri Merhav, Michael Gutman
    Correction to 'Universal prediction of individual sequences' (Jul 92 1258-1270). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:285- [Journal]
  43. Thomas M. Cover
    Review of 'Complexity, Entropy and the Physics of Information' (Zurek, W.H., Ed.; 1990). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:286-0 [Journal]
  44. Nariman Farvardin
    Review of 'Vector Quantization and Signal Compression' (Gersho, A., and Gray, R.M.; 1992). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:287-0 [Journal]
  45. Ian F. Blake
    Review of 'Source and Channel Coding: An Algorithmic Approach' (Anderson, J.B., and Mohan, S.; 1991). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:289-0 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002