Primary tabs

Filters: First Letter Of Keyword is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
selective puncturing
Daneshgaran, F., M. Mondin, and P. Mulassano, "Linear subcodes of turbo codes with improved distance spectra", Information Theory, IEEE Transactions on, vol. 50, no. 12, pp. 3291 - 3294, dec., 2004.
Daneshgaran, F., M. Mondin, and P. Mulassano, "Turbo codes optimization via trace-bit injection and selective puncturing", Communications, 2002. ICC 2002. IEEE International Conference on, vol. 3, pp. 1706 - 1710 vol.3, 2002.
selective encryption
Scopigno, R., and S. Belfiore, "Image decomposition for selective encryption and flexible network services", Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, vol. 4, pp. 2302 - 2307 Vol.4, nov.-3 dec., 2004.
selective compression
Avagnina, D., F. Dovis, L. Lo Presti, and P. Mulassano, "A selective compression algorithm for SAR images based on irregular and adaptive sampling", Electronics, Circuits and Systems, 2001. ICECS 2001. The 8th IEEE International Conference on, vol. 3, pp. 1171 -1174 vol.3, 2001.
security of data
Baltatu, M., A. Lioy, D. Lombardo, and D. Mazzocchi, "Towards a policy system for IPsec: issues and an experimental implementation", Networks, 2001. Proceedings. Ninth IEEE International Conference on, pp. 146 - 151, oct., 2001.
security aspects
Dominici, F., D. Mazzocchi, P. Mulassano, M. Spelat, G. Boiero, and P. Lovisolo, "NAV/COM Hybrid Architecture for Innovative Location Based Payment Systems", 6th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, 01/2009.
seamless device-data integration
Conzon, D., T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, and M. A. Spirito, "The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications", 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1 -6, 07/2012.
security attacks
Sarmad, U. K., L. Lavagno, and C. Pastrone, "A key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks", Emerging Technologies (ICET), 6th International Conference on, pp. 364 -369, 10/2010.
secure data communication
Khan, S. U., L. Lavagno, C. Pastrone, and M. A. Spirito, "An effective key management scheme for mobile heterogeneous sensor networks", International Conference on Information Society (i-Society), London, UK, pp. 98 -103, 06/2011.
security attacks
Khan, S. U., C. Pastrone, L. Lavagno, and M. A. Spirito, "An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks", 6th International Conference on Risk and Security of Internet and Systems (CRiSIS), Timişoara, Romania, pp. 1 -8, 09/2011.
security
Kim, Y., D. Mazzocchi, and G. Tsudik, "Admission control in peer groups", Network Computing and Applications, 2003. NCA 2003. Second IEEE International Symposium on, pp. 131 - 139, april, 2003.
secondary network nodes
Penna, F., R. Garello, and M. A. Spirito, "Distributed Inference of Channel Occupation Probabilities in Cognitive Networks via Message Passing", New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, Singapore, pp. 1 -11, 04/2010.
secondary code wipe-off
search space matrix
Lo Presti, L., X. Zhu, M. Fantino, and P. Mulassano, "GNSS Signal Acquisition in the Presence of Sign Transition", IEEE Journal of Selected Topics in Signal Processing, vol. 3, no. 4, pp. 557 -570, 08/2009.
search space
Lo Presti, L., M. Fantino, P. Mulassano, and X. Zhu, "Acquisition systems for GNSS signals with the same code and bit rates", IEEE/ION Position, Location and Navigation Symposium, pp. 187 -195, 05/2008.

Pages