|
Search the dblp DataBase
Hakan Deliç:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Devrim Emrah Ayyildiz, Hakan Deliç
Packet Reservation Window Multiple Access with Capture. [Citation Graph (0, 0)][DBLP] ICC (1), 2000, pp:346-350 [Conf]
- Ldyla Cahut, Kimon P. Valavanis, Hakan Deliç
Sonar Resolution-Based Environment Mapping. [Citation Graph (0, 0)][DBLP] ICRA, 1998, pp:2541-2547 [Conf]
- Ilker Demirkol, Cem Ersoy, M. Ufuk Çaglayan, Hakan Deliç
Location Area Planning in Cellular Networks Using Simulated Annealing. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:13-20 [Conf]
- Tolga Onel, Cem Ersoy, Hakan Deliç
An Information-Controlled Transmission Power Adjustment Scheme for Collaborative Target Tracking. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:294-300 [Conf]
- Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISCIS, 2004, pp:363-372 [Conf]
- Baris Özgül, Hakan Deliç
Blind Collision Resolution Using Retransmission Diversity under Quasi-Static Fading Channels. [Citation Graph (0, 0)][DBLP] ISCIS, 2004, pp:331-340 [Conf]
- Baris Özgül, Hakan Deliç
Blind collision multiplicity detection for wireless access with retransmission diversity. [Citation Graph (0, 0)][DBLP] VTC Fall (2), 2004, pp:1078-1082 [Conf]
- Ertan Onur, Hakan Deliç, Cem Ersoy, M. Ufuk Çaglayan
Measurement-based replanning of cell capacities in GSM networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2002, v:39, n:6, pp:749-767 [Journal]
- Ertan Onur, Cem Ersoy, Hakan Deliç
How many sensors for an acceptable breach detection probability? [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:2, pp:173-182 [Journal]
- Dimitri Kazakos, Lazaros F. Merakos, Hakan Deliç
Random Multiple Access Algorithms Using a Control Mini-Slot. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1997, v:46, n:4, pp:473-476 [Journal]
- Geert Leus, Wanlun Zhao, Georgios B. Giannakis, Hakan Deliç
Space-time frequency-shift keying. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Communications, 2004, v:52, n:3, pp:346-349 [Journal]
- Baris Özgül, Hakan Deliç
Wireless access with blind collision-multiplicity detection and retransmission diversity for quasi-static channels. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Communications, 2006, v:54, n:5, pp:858-867 [Journal]
- William B. Levy, Hakan Deliç
Maximum entropy aggregation of individual opinions. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, 1994, v:24, n:4, pp:606-613 [Journal]
- Devrim Emrah Ayyildiz, Hakan Deliç
Packet Reservation Window Multiple Access for Microcellular Voice/Data Transmission. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2003, v:9, n:6, pp:585-592 [Journal]
- Aykut Hocanin, Shanuj V. Sarin, Hakan Deliç
Medium Access Control for ATM-to-CDMA Interface. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2002, v:8, n:4, pp:337-346 [Journal]
- Mustafa A. Altinkaya, Hakan Deliç, Bülent Sankur, Emin Anarim
Subspace-based frequency estimation of sinusoidal signals in alpha-stable noise. [Citation Graph (0, 0)][DBLP] Signal Processing, 2002, v:82, n:12, pp:1807-1827 [Journal]
- Baris Özgül, Mutlu Koca, Hakan Deliç
Frequency-Domain Doubly-Iterative Equalization of Continuous Phase Modulation. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
Capacity and Mutual Information of Soft and Hard Decision Output M-Ary PPM over UWB Channels. [Citation Graph (, )][DBLP]
On Collaboration in a Distributed Multi-Target Tracking Framework. [Citation Graph (, )][DBLP]
Ultra-Wideband Signal Acquisition in Non-Gaussian Noise via Successive Sampling. [Citation Graph (, )][DBLP]
Joint Transmitter-Receiver UWB Rake Design in the Presence of ISI. [Citation Graph (, )][DBLP]
Temporal Resilience of Deployment Quality in Surveillance Wireless Sensor Networks. [Citation Graph (, )][DBLP]
The statistical relationship between connectivity and neural activity in fractionally connected feed-forward networks. [Citation Graph (, )][DBLP]
The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks. [Citation Graph (, )][DBLP]
Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|