Information Theory in the Benelux: An overview of WIC symposia 1980 - 2003
暂无分享,去创建一个
Bart Preneel | J. Biemond | P. Vanroose | Benoît Macq | A. Nowbakht-Irani | R. Srinivasan | J. Tjalkens | B. Preneel | J. Biemond | B. Macq | P. Vanroose | R. Srinivasan | A. Nowbakht-Irani | J. Tjalkens
[1] Cornelis H. Slump,et al. On the reduction of alias distortion in digital signal processing , 1990 .
[2] M. van Dijk,et al. Quantum key agreement , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[3] A.A.C.M. Kalker,et al. Capacity of reversible information embedding for small distortions , 2003 .
[4] G Vitale,et al. Multipath diffuse routing over heterogeneous mesh networks of web devices and sensors , 2005 .
[6] Luc Van Gool,et al. From speech to 3D face animation , 2002 .
[7] Olivier Markowitch,et al. Efficient designated verifier signature schemes , 2003 .
[8] Paulo S. L. M. Barreto,et al. SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers , 2001, IACR Cryptol. ePrint Arch..
[9] F. W. Hoeksema. Two solutions to the problem of matrixing for non-ideal camera transmission filters , 1992 .
[10] Luc Van Gool,et al. Localization and identification of plane objects in a complex scene , 1995 .
[11] Joos Vandewalle,et al. The digital timestamping problem , 1999 .
[12] Patrick Wambacq,et al. A scheme for perceptual speech and audio coding with damped sinusoids based on total least squares algorithms , 2001 .
[13] Jos Huisken,et al. Implementation issues of 3rd generation mobile communication turbo decoding , 2000 .
[14] Cornelis H. Slump. Applications of Information Theory in Optics , 1997 .
[15] Benoît Macq,et al. Pyramids for image compression with neural networks interpolators , 1993 .
[16] Reginald L. Lagendijk,et al. Independence of source and channel coding for progressive image and video data in mobile communications , 2000, Visual Communications and Image Processing.
[17] A. J. Vinck,et al. An interframe video codec with straight-line approximation , 1985 .
[18] Sabine Van Huffel,et al. Generalization Capacity of Neural Networks for the Classification of ovarium tumours , 1999 .
[19] Joos Vandewalle,et al. On the time-memory tradeoff between exhaustive key search and table precomputation , 1998 .
[20] A. P. Hekstra. Set decoding of convolutional codes with application to gsm/gprs , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[21] Fmj Frans Willems,et al. Minimizing the packet-error probability , 1996 .
[22] Petra Heijnen,et al. The decoding of binary quasi-cyclic codes , 1998 .
[23] V. B. Balakirsky,et al. An efficient algorithm for computing the entropy of output sequences for bitshift channels , 2003 .
[24] Jean-Jacques Quisquater,et al. A Short Note on Irreducible Trinomials in Binary Fields , 2002 .
[25] M. S. Bargh,et al. A block retransmission strategy for multiple repetition feedback coding schemes , 1998 .
[26] Asker M. Bazen,et al. Biometric verification: A result and an exotic example , 2003 .
[27] Wolfgang Effelsberg,et al. Optimal Partitioning of Video Sequences for MPEG-4 Sprite Encoding , 2003 .
[28] Daniel S. Hirschberg,et al. Data compression , 1987, CSUR.
[29] Coding gain strategies for the binary symmetric broadcast channel with confidential messages , 1995 .
[30] W. C. Huisman. Three image compression algorithms for CADISS , 1983 .
[31] M. Blaum,et al. A class of burst correcting codes , 1986 .
[32] T. Brox,et al. Multi-Stage Region Merging for Image Segmentation , 2001 .
[33] Peter Vanroose,et al. A collision resolution protocol of throughput one, using multiplicity feedback , 1994 .
[34] E. P. Hupkens. Quickest detection in random fields: A Bayesian approach , 1997 .
[35] Olivier Markowitch,et al. Optimistic non-repudiable information exchange , 2000 .
[36] de Aj Brian Bart. Coping with ambiguities in the channel code for DVB-S , 1997 .
[37] Joos Vandewalle,et al. An efficient traceable payment system , 1995 .
[38] Vladimir D. Tonchev,et al. Extremal doubly-even codes of length 64 derived from symmetric designs , 1990, Discret. Math..
[39] René J. van der Vleuten. Improved Elastic Storage of Digital Still Images , 2002, DCC.
[40] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[41] Lejla Batina,et al. Secret exponent information leakage for timing analyses , 2002 .
[42] Phn Peter. On performance criteria for dc-free codes , 1984 .
[43] Pierre Moulin. Information-Hiding Games , 2002, IWDW.
[44] Cees J. A. Jansen,et al. Side-Channel Entropy for Modular Exponentiation Algorithms , 2003 .
[45] M. S. Bargh,et al. On error correction in information feedback schemes , 1999 .
[46] Joos Vandewalle,et al. The use of SVD-based techniques for signal separation , 1989 .
[47] Arjan Meijerink,et al. BER Analysis of a DPSK Phase Diversity Receiver for Coherence Multiplexing , 2002 .
[49] Joos Vandewalle,et al. An efficient nonlinear shift-invariant transformation , 1994 .
[50] Benoît Macq,et al. In search of a human visual quality criterion for image data compression , 1989 .
[51] Richard P. Kleihorst,et al. Implementation of DCT-domain motion estimation and compensation , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).
[52] N. F. Benschop. Symmetric Logic Synthesis with Phase Assignment , 2001 .
[53] D. Boekee,et al. Image subband coding: a quantization error analysis , 1989, Sixth Multidimensional Signal Processing Workshop,.
[54] Michel Verleysen,et al. A capacitive neural network for associative memory , 1989 .
[55] Jean-Didier Legat,et al. AGADDIS : Authentication and Geometrical Attacks Detection for Digital Image Signature , 2002 .
[56] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[57] Joos Vandewalle,et al. Dynamic properties of neural networks , 1989 .
[58] Philippe Piret. Binary codes for compound channels , 1985, IEEE Trans. Inf. Theory.
[59] G Geeke Bruin-Muurling,et al. Error correction for combinational logic circuits , 2000 .
[60] S. Baggen,et al. Coding for informed decoders , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[61] V. B. Balakirsky,et al. Characterization of the secrecy of a common key constructed via data transmission over the two-way AND channel , 1999 .
[62] Hsueh-Ming Hang,et al. Predictive Vector Quantization of Images , 1985, IEEE Trans. Commun..
[63] Two suggestions to improve on the efficiency of the check computations in the banking system in Belgium , 1989 .
[64] Amir Atiya. Learning algorithms for neural networks , 1991 .
[65] Kees A. Schouhamer Immink. Coding techniques for partial-response channels , 1988, IEEE Trans. Commun..
[66] Luc Van Gool,et al. Generalized moment invariants for viewpoint and illumination independent color pattern recognition , 1999 .
[67] Joos Vandewalle,et al. On the security of dedicated hash functions , 1998 .
[68] M Mortaza Shoae Bargh,et al. Feedback coded modulation , 1997 .
[69] de G Gerard Haan,et al. Video processing for multimedia systems , 2000 .
[70] P.J.M. Veugen. Error probabilities of repetition feedback strategies with fixed delay for discrete memoryless channels , 1994 .
[71] Wil J. van Gils,et al. Codes for combined symbol and digit error control , 1988, IEEE Trans. Inf. Theory.
[72] Jan W. M. Bergmans,et al. Equalization and Target Response Optimization for High-Density Two-dimensional Optical Storage , 2003 .
[73] Joos Vandewalle,et al. Subject view access mechanism in the personal database , 1994 .
[74] Jean-Jacques Quisquater,et al. TIMING ATTACK: WHAT CAN BE ACHIEVED BY A POWERFUL ADVERSARY? , 2000 .
[75] L.P.J. Veelenturf,et al. Statistical Signal Detection and Kohonen's Neural Network , 1997 .
[76] A. W. Lohmann. Digital Optical Computing , 1985 .
[77] F Fei Zuo. Automatic human face detection for home surveillance application , 2002 .
[78] M. J. Usher. Applications of Information Theory , 1984 .
[79] G.H.L.M. Heideman,et al. Evaluation of a H.261 video codec in an ATM network using a gaussian model , 1994 .
[80] H.F.A. Roefs. CADISS : an image (de)compression system for deep space application , 1983 .
[81] Stefaan Desmet,et al. A segmentation-based video codec , 1996 .
[82] G.H.L.M. Heideman,et al. Fast simulation and applications in communications and signal processing , 2001 .
[83] Heidi Steendam,et al. ML-performance of low-density parity check codes , 2002 .
[84] G.H.L.M. Heideman,et al. Suboptimal approximations in simultaneous detection and estimation problems , 2001 .
[85] A. J. Vinck,et al. Application of a combined test-error-correcting procedure for memories with defects , 1987 .
[86] Patrick Wambacq,et al. Linear feature transformations based on MCE and MMI , 1999 .
[87] G.H.L.M. Heideman,et al. Embedded connectivity with Bluetooth , 2001 .
[88] J.H.F. Ritzerfeld,et al. Time-scale modification for speech coding , 2000 .
[89] E.P. Hupkens,et al. Quickest detection of changes in random fields , 1997, Proceedings of IEEE International Symposium on Information Theory.
[90] Cornelis H. Slump,et al. On the objective speech quality of the TETRA system , 1998 .
[91] Cornelis H. Slump. On information theoretical aspects of speech transmission , 1998 .
[92] Joos Vandewalle,et al. A SOFTWARE IMPLEMENTATION OF THE McELIECE PUBLIC-KEY CRYPTOSYSTEM , 1992 .
[93] K. A. Post,et al. Simple and optimal coding strategies for memories with known defects , 1988 .
[94] Slimane Ben Slimane,et al. BER results for a narrowband multi-user receiver based on successive substraction for MPSK modulated signals , 2000 .
[95] R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions , 1989 .
[96] de Aj Brian Bart,et al. Combining enumerative shaping techniques and block coded modulation for ISI channels , 1995 .
[97] Joos Vandewalle,et al. Efficient pseudorandom sequence generation by cellular automata , 1991 .
[98] Anthony C. C. Coolen,et al. A learning mechanism for invariant pattern recognition in neural networks , 1989, Neural Networks.
[99] Cornelis H. Slump. On Image compression related to image formation, capture and quality , 1993 .
[100] Constant Paul Marie Jozef Baggen,et al. On the diamond code construction , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[101] Eric R. Verheul,et al. Cryptanalysis of ‘Less Short’ RSA Secret Exponents , 1997, Applicable Algebra in Engineering, Communication and Computing.
[102] Arjan Meijerink,et al. Generalization and performance improvement of a coherence multiplexing system , 2001 .
[103] K. J. Keuning,et al. Performance and complexity of decoding algorithms , 1997 .
[104] A. P. Hekstra. On the Maximum Difference Between Path Metrics in a Viterbi Decoder , 1993, Proceedings. IEEE International Symposium on Information Theory.
[105] Huibert Kwakernaak. Estimation of pulse heights and arrival times , 1980, Autom..
[106] Auguste Laloux,et al. Waiting-time approximations for service systems with a polling table , 1989 .
[107] B. Preneel,et al. Anonymity controlled electronic payment systems , 1999 .
[108] C.L.M. van Pul. Computer memories with defective cells , 1985 .
[109] Luc Van Gool,et al. A bottom-up approach to pattern classification , 1994 .
[110] Jean Cardinal,et al. A fast full search equivalent for mean-shape-gain vector quantizers , 1999 .
[111] Adaptive Mixtures for Object Tracking , 2000 .
[112] Patrick Wambacq,et al. Improved noise robustness for speech recognition by adaptive SVD-based filtering , 1999 .
[113] Cornelis H. Slump,et al. Lossy Compression of Cardiac X-Ray Images Based on Acquisition Noise , 1998 .
[114] F. C. Schoute,et al. LART: design and implementation of an experimental wireless platform , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).
[115] Jean Cardinal,et al. Complexity-constrained tree-structured vector quantizers , 2002, Signal Process..
[116] E. Backer,et al. A flexible and intelligent system for fast measurements in binary images for in-line robotic control , 1988 .
[117] D. S. Farin. Towards real-time MPEG-4 segmentation: a fast implementation of region merging , 2000 .
[118] Aggelos K. Katsaggelos,et al. A regularized iterative image restoration algorithm , 1991, IEEE Trans. Signal Process..
[119] Cornelis H. Slump,et al. Medical Image Compression Boundaries Based on the Image Acquisition Process , 1996 .
[120] M. S. Bargh,et al. Coding for channels with low rate noiseless feedback , 1997, Proceedings of IEEE International Symposium on Information Theory.
[121] Joos Vandewalle,et al. Diffusion analysis of Feistel networks , 1999 .