History
1
77


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Function-based morphing methodology for parameterizing patient-specific models of human proximal femurs. (English)
Computer-Aided DesignComputer-Aided Design 51, 31-38(2014)
WorldCat.org
1
GOM-Face: GKP, EOG, and EMG-Based Multimodal Interface With Application to Humanoid Robot Control. (English)
IEEE Trans. Biomed. EngineeringIEEE Trans. Biomed. Engineering 61, N0. 2, 453-462(2014)
WorldCat.org
2
A technique for extracting behavioral sequence patterns from GPS recorded data. (English)
ComputingComputing 96, N0. 3, 163-188(2014)
WorldCat.org
3
Simultaneous Color Camera and Depth Sensor Calibration with Correction of Triangulation Errors. (English)
ISVC (1), 301-311(2013)
WorldCat.org
4
Optimal Reference Vector Selection Algorithm in Subspace Interference Alignment to Maximize System Throughput. (English)
Wireless Personal CommunicationsWireless Personal Communications 71, N0. 2, 1085-1094(2013)
WorldCat.org
5
Immersive virtual aquarium with real-walking navigation. (English)
VRCAI, 291-294(2013)
WorldCat.org
6
A novel approach to visualize web anomaly attacks in pervasive computing environment. (English)
The Journal of SupercomputingThe Journal of Supercomputing 65, N0. 1, 301-316(2013)
WorldCat.org
7
An optimal investment, consumption, leisure, and voluntary retirement problem with Cobb-Douglas utility: Dynamic programming approaches. (English)
Appl. Math. Lett.Appl. Math. Lett. 26, N0. 4, 481-486(2013)
WorldCat.org
8
A Design of Low Latency Random Access Preamble Detector for LTE Uplink Receiver. (English)
IEICE TransactionsIEICE Transactions 96-B, N0. 5, 1089-1096(2013)
WorldCat.org
9
Biclique attack on the full HIGHT. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 365-374 (2012).
WorldCat.org
10
MIMO Detection Techniques Based on Low Complexity Adaptive QR-Decomposition with M-Algorithm for 3GPP LTE Systems. (English)
Wireless Personal CommunicationsWireless Personal Communications 67, N0. 3, 505-523(2012)
WorldCat.org
11
A fully integrated dual-mode CMOS power amplifier for WCDMA applications. (English)
ISSCC, 82-84(2012)
WorldCat.org
12
Interference Alignment with Cooperative Primary Receiver in Cognitive Networks. (English)
IEEE Communications LettersIEEE Communications Letters 16, N0. 7, 1072-1075(2012)
WorldCat.org
13
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. (English)
IEICE TransactionsIEICE Transactions 95-A, N0. 1, 372-380(2012)
WorldCat.org
14
Transmit beamforming with imperfect CSIT in spectrum leasing for physical-layer security. (English)
CCNC, 874-878(2012)
WorldCat.org
15
Related-key attack on the full HIGHT. (English)
Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology ‒ ICISC 2010. 13th international conference, Seoul, Korea, December 1‒3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 49-67 (2011).
WorldCat.org
16
A novel low-power RF4CE-based communication framework for multimedia system control. (English)
Int. J. Communication SystemsInt. J. Communication Systems 24, N0. 10, 1340-1353(2011)
WorldCat.org
17
Related-Key Boomerang Attack on Block Cipher SQUARE. (English)
IEICE TransactionsIEICE Transactions 94-A, N0. 1, 3-9(2011)
WorldCat.org
18
A Single Amplifier-Based 12-bit 100 MS/s 1 V 19 mW 0.13 {$μ$}m CMOS ADC with Various Power and Area Minimized Circuit Techniques. (English)
IEICE TransactionsIEICE Transactions 94-C, N0. 8, 1282-1288(2011)
WorldCat.org
19
Novel approaches to enhance mobile WiMAX security. (English)
EURASIP J. Wirel. Commun. Netw. 2010, Article ID 926275, 11 p. (2010).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Valid XHTML 1.0 Transitional Valid CSS!