ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2010 International Symposium On Information Theory & Its Applications
Latest Publications
TOTAL DOCUMENTS
196
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9781424460168
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Analysis of diversity-multiplexing tradeoff bounds of ZF-SIC systems with error propagation
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649571
◽
2010
◽
Cited By ~ 2
Author(s):
Dong-Min Shin
◽
Kyeongcheol Yang
Keyword(s):
Error Propagation
◽
Diversity Multiplexing Tradeoff
Download Full-text
English and Taiwanese text categorization using N-gram based on Vector Space Model
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649453
◽
2010
◽
Author(s):
Makoto Suzuki
◽
Naohide Yamagishi
◽
Yi-Ching Tsai
◽
Takashi Ishida
◽
Masayuki Goto
Keyword(s):
Vector Space
◽
Text Categorization
◽
Vector Space Model
◽
Space Model
◽
N Gram
Download Full-text
Stationary sequences and stable sampling
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649510
◽
2010
◽
Author(s):
Juan Miguel Medina
◽
Bruno Cernuschi Frias
Keyword(s):
Stationary Sequences
Download Full-text
Körner-Marton theorem for binary modulo-two sum problem from canonical equations
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649269
◽
2010
◽
Author(s):
Richard E. Blahut
◽
Soumya Jana
Download Full-text
Anti-phishing mutual authentication using the visual secret sharing scheme
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649733
◽
2010
◽
Author(s):
Kai Zhao
◽
Yuichi Kaji
Keyword(s):
Secret Sharing
◽
Mutual Authentication
◽
Secret Sharing Scheme
◽
Visual Secret Sharing
◽
Sharing Scheme
Download Full-text
A novel positioning estimation method with the correlation between sensors' data
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649812
◽
2010
◽
Cited By ~ 1
Author(s):
Yuuki Matsuura
◽
Koji Ishii
◽
Shigeaki Ogose
Keyword(s):
Estimation Method
Download Full-text
A new construction of irregular LDPC convolutional codes with cycle removal
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5650164
◽
2010
◽
Author(s):
Chi-Jen Wu
◽
Chung-Hsuan Wang
◽
Chi-chao Chao
Keyword(s):
Convolutional Codes
◽
New Construction
Download Full-text
Approximately universal MIMO diversity embedded codes
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5648877
◽
2010
◽
Author(s):
Hsiao-feng Lu
Download Full-text
Practical design and its evaluations for nested transmit diversity
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649974
◽
2010
◽
Cited By ~ 1
Author(s):
Takashi Hayashi
◽
Koji Ishii
◽
Shigeaki Ogose
Keyword(s):
Transmit Diversity
◽
Practical Design
Download Full-text
Using synchronization bits to boost compression by substring enumeration
2010 International Symposium On Information Theory & Its Applications
◽
10.1109/isita.2010.5649565
◽
2010
◽
Cited By ~ 8
Author(s):
Danny Dube
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close