暂无分享,去创建一个
Riccardo Rovatti | Mauro Mangia | Gianluca Setti | Fabio Pareschi | Valerio Cambareri | R. Rovatti | G. Setti | F. Pareschi | Mauro Mangia | V. Cambareri
[1] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[2] Michael P. Friedlander,et al. Probing the Pareto Frontier for Basis Pursuit Solutions , 2008, SIAM J. Sci. Comput..
[3] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[4] Richard G. Baraniuk,et al. Kronecker Compressive Sensing , 2012, IEEE Transactions on Image Processing.
[5] Paolo Toth,et al. Knapsack Problems: Algorithms and Computer Implementations , 1990 .
[6] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[7] E. Candès,et al. Stable signal recovery from incomplete and inaccurate measurements , 2005, math/0503066.
[8] E. Candès. The restricted isometry property and its implications for compressed sensing , 2008 .
[9] Patrick Billingsley,et al. Probability and Measure. , 1986 .
[10] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[11] Emmanuel J. Candès,et al. Exact Matrix Completion via Convex Optimization , 2009, Found. Comput. Math..
[12] E. Candès,et al. Sparsity and incoherence in compressive sampling , 2006, math/0611957.
[13] Andrew Odlyzko,et al. The Rise and Fall of Knapsack Cryptosystems , 1998 .
[14] Thomas Strohmer,et al. General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[17] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[18] S. Mallat. A wavelet tour of signal processing , 1998 .
[19] Kwok-Wo Wong,et al. A two-class information concealing system based on compressed sensing , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).
[20] G. Sharma,et al. On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[21] E. Fischer. Über quadratische Formen mit reellen Koeffizienten , 1905 .
[22] Magda Peligrad,et al. CENTRAL LIMIT THEOREM FOR LINEAR PROCESSES , 1997 .
[23] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[24] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[25] A. C. Berry. The accuracy of the Gaussian approximation to the sum of independent variates , 1941 .
[26] R. Jane,et al. Evaluation of an automatic threshold based detector of waveform limits in Holter ECG with the QT database , 1997, Computers in Cardiology 1997.
[27] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[28] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[29] Mariko Hagita,et al. Cryptographic Mersenne Twister and Fubuki Stream/block Cipher , 2005, IACR Cryptol. ePrint Arch..
[30] Meng Zhang,et al. Energy-efficient and Secure Sensor Data Transmission Using Encompression , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.
[31] D. Donoho,et al. Counting faces of randomly-projected polytopes when the projection radically lowers dimension , 2006, math/0607364.
[32] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[33] Franz Pernkopf,et al. A Pitch Tracking Corpus with Evaluation on Multipitch Tracking Scenario , 2011, INTERSPEECH.
[34] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[35] S. Geman. A Limit Theorem for the Norm of Random Matrices , 1980 .
[36] M. Vetterli,et al. Sensing reality and communicating bits: a dangerous liaison , 2006, IEEE Signal Processing Magazine.
[37] S. Sodin,et al. Variations on the Berry-Esseen theorem , 2010, 1002.3970.
[38] Kari Karhunen,et al. Über lineare Methoden in der Wahrscheinlichkeitsrechnung , 1947 .
[39] H. Nishimori,et al. Statistical Mechanics of an NP-complete Problem: Subset Sum , 2001 .
[40] Riccardo Rovatti,et al. A Pragmatic Look at Some Compressive Sensing Architectures With Saturation and Quantization , 2012, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[41] Justin K. Romberg,et al. Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals , 2009, IEEE Transactions on Information Theory.
[42] Ray Smith. An Overview of the Tesseract OCR Engine , 2007 .
[43] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.