Information Theory in the Benelux: An overview of WIC symposia 1980 - 2003

[1]  Cornelis H. Slump,et al.  On the reduction of alias distortion in digital signal processing , 1990 .

[2]  M. van Dijk,et al.  Quantum key agreement , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[3]  A.A.C.M. Kalker,et al.  Capacity of reversible information embedding for small distortions , 2003 .

[4]  G Vitale,et al.  Multipath diffuse routing over heterogeneous mesh networks of web devices and sensors , 2005 .

[6]  Luc Van Gool,et al.  From speech to 3D face animation , 2002 .

[7]  Olivier Markowitch,et al.  Efficient designated verifier signature schemes , 2003 .

[8]  Paulo S. L. M. Barreto,et al.  SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers , 2001, IACR Cryptol. ePrint Arch..

[9]  F. W. Hoeksema Two solutions to the problem of matrixing for non-ideal camera transmission filters , 1992 .

[10]  Luc Van Gool,et al.  Localization and identification of plane objects in a complex scene , 1995 .

[11]  Joos Vandewalle,et al.  The digital timestamping problem , 1999 .

[12]  Patrick Wambacq,et al.  A scheme for perceptual speech and audio coding with damped sinusoids based on total least squares algorithms , 2001 .

[13]  Jos Huisken,et al.  Implementation issues of 3rd generation mobile communication turbo decoding , 2000 .

[14]  Cornelis H. Slump Applications of Information Theory in Optics , 1997 .

[15]  Benoît Macq,et al.  Pyramids for image compression with neural networks interpolators , 1993 .

[16]  Reginald L. Lagendijk,et al.  Independence of source and channel coding for progressive image and video data in mobile communications , 2000, Visual Communications and Image Processing.

[17]  A. J. Vinck,et al.  An interframe video codec with straight-line approximation , 1985 .

[18]  Sabine Van Huffel,et al.  Generalization Capacity of Neural Networks for the Classification of ovarium tumours , 1999 .

[19]  Joos Vandewalle,et al.  On the time-memory tradeoff between exhaustive key search and table precomputation , 1998 .

[20]  A. P. Hekstra Set decoding of convolutional codes with application to gsm/gprs , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[21]  Fmj Frans Willems,et al.  Minimizing the packet-error probability , 1996 .

[22]  Petra Heijnen,et al.  The decoding of binary quasi-cyclic codes , 1998 .

[23]  V. B. Balakirsky,et al.  An efficient algorithm for computing the entropy of output sequences for bitshift channels , 2003 .

[24]  Jean-Jacques Quisquater,et al.  A Short Note on Irreducible Trinomials in Binary Fields , 2002 .

[25]  M. S. Bargh,et al.  A block retransmission strategy for multiple repetition feedback coding schemes , 1998 .

[26]  Asker M. Bazen,et al.  Biometric verification: A result and an exotic example , 2003 .

[27]  Wolfgang Effelsberg,et al.  Optimal Partitioning of Video Sequences for MPEG-4 Sprite Encoding , 2003 .

[28]  Daniel S. Hirschberg,et al.  Data compression , 1987, CSUR.

[29]  Coding gain strategies for the binary symmetric broadcast channel with confidential messages , 1995 .

[30]  W. C. Huisman Three image compression algorithms for CADISS , 1983 .

[31]  M. Blaum,et al.  A class of burst correcting codes , 1986 .

[32]  T. Brox,et al.  Multi-Stage Region Merging for Image Segmentation , 2001 .

[33]  Peter Vanroose,et al.  A collision resolution protocol of throughput one, using multiplicity feedback , 1994 .

[34]  E. P. Hupkens Quickest detection in random fields: A Bayesian approach , 1997 .

[35]  Olivier Markowitch,et al.  Optimistic non-repudiable information exchange , 2000 .

[36]  de Aj Brian Bart Coping with ambiguities in the channel code for DVB-S , 1997 .

[37]  Joos Vandewalle,et al.  An efficient traceable payment system , 1995 .

[38]  Vladimir D. Tonchev,et al.  Extremal doubly-even codes of length 64 derived from symmetric designs , 1990, Discret. Math..

[39]  René J. van der Vleuten Improved Elastic Storage of Digital Still Images , 2002, DCC.

[40]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[41]  Lejla Batina,et al.  Secret exponent information leakage for timing analyses , 2002 .

[42]  Phn Peter On performance criteria for dc-free codes , 1984 .

[43]  Pierre Moulin Information-Hiding Games , 2002, IWDW.

[44]  Cees J. A. Jansen,et al.  Side-Channel Entropy for Modular Exponentiation Algorithms , 2003 .

[45]  M. S. Bargh,et al.  On error correction in information feedback schemes , 1999 .

[46]  Joos Vandewalle,et al.  The use of SVD-based techniques for signal separation , 1989 .

[47]  Arjan Meijerink,et al.  BER Analysis of a DPSK Phase Diversity Receiver for Coherence Multiplexing , 2002 .

[49]  Joos Vandewalle,et al.  An efficient nonlinear shift-invariant transformation , 1994 .

[50]  Benoît Macq,et al.  In search of a human visual quality criterion for image data compression , 1989 .

[51]  Richard P. Kleihorst,et al.  Implementation of DCT-domain motion estimation and compensation , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).

[52]  N. F. Benschop Symmetric Logic Synthesis with Phase Assignment , 2001 .

[53]  D. Boekee,et al.  Image subband coding: a quantization error analysis , 1989, Sixth Multidimensional Signal Processing Workshop,.

[54]  Michel Verleysen,et al.  A capacitive neural network for associative memory , 1989 .

[55]  Jean-Didier Legat,et al.  AGADDIS : Authentication and Geometrical Attacks Detection for Digital Image Signature , 2002 .

[56]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[57]  Joos Vandewalle,et al.  Dynamic properties of neural networks , 1989 .

[58]  Philippe Piret Binary codes for compound channels , 1985, IEEE Trans. Inf. Theory.

[59]  G Geeke Bruin-Muurling,et al.  Error correction for combinational logic circuits , 2000 .

[60]  S. Baggen,et al.  Coding for informed decoders , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[61]  V. B. Balakirsky,et al.  Characterization of the secrecy of a common key constructed via data transmission over the two-way AND channel , 1999 .

[62]  Hsueh-Ming Hang,et al.  Predictive Vector Quantization of Images , 1985, IEEE Trans. Commun..

[63]  Two suggestions to improve on the efficiency of the check computations in the banking system in Belgium , 1989 .

[64]  Amir Atiya Learning algorithms for neural networks , 1991 .

[65]  Kees A. Schouhamer Immink Coding techniques for partial-response channels , 1988, IEEE Trans. Commun..

[66]  Luc Van Gool,et al.  Generalized moment invariants for viewpoint and illumination independent color pattern recognition , 1999 .

[67]  Joos Vandewalle,et al.  On the security of dedicated hash functions , 1998 .

[68]  M Mortaza Shoae Bargh,et al.  Feedback coded modulation , 1997 .

[69]  de G Gerard Haan,et al.  Video processing for multimedia systems , 2000 .

[70]  P.J.M. Veugen Error probabilities of repetition feedback strategies with fixed delay for discrete memoryless channels , 1994 .

[71]  Wil J. van Gils,et al.  Codes for combined symbol and digit error control , 1988, IEEE Trans. Inf. Theory.

[72]  Jan W. M. Bergmans,et al.  Equalization and Target Response Optimization for High-Density Two-dimensional Optical Storage , 2003 .

[73]  Joos Vandewalle,et al.  Subject view access mechanism in the personal database , 1994 .

[74]  Jean-Jacques Quisquater,et al.  TIMING ATTACK: WHAT CAN BE ACHIEVED BY A POWERFUL ADVERSARY? , 2000 .

[75]  L.P.J. Veelenturf,et al.  Statistical Signal Detection and Kohonen's Neural Network , 1997 .

[76]  A. W. Lohmann Digital Optical Computing , 1985 .

[77]  F Fei Zuo Automatic human face detection for home surveillance application , 2002 .

[78]  M. J. Usher Applications of Information Theory , 1984 .

[79]  G.H.L.M. Heideman,et al.  Evaluation of a H.261 video codec in an ATM network using a gaussian model , 1994 .

[80]  H.F.A. Roefs CADISS : an image (de)compression system for deep space application , 1983 .

[81]  Stefaan Desmet,et al.  A segmentation-based video codec , 1996 .

[82]  G.H.L.M. Heideman,et al.  Fast simulation and applications in communications and signal processing , 2001 .

[83]  Heidi Steendam,et al.  ML-performance of low-density parity check codes , 2002 .

[84]  G.H.L.M. Heideman,et al.  Suboptimal approximations in simultaneous detection and estimation problems , 2001 .

[85]  A. J. Vinck,et al.  Application of a combined test-error-correcting procedure for memories with defects , 1987 .

[86]  Patrick Wambacq,et al.  Linear feature transformations based on MCE and MMI , 1999 .

[87]  G.H.L.M. Heideman,et al.  Embedded connectivity with Bluetooth , 2001 .

[88]  J.H.F. Ritzerfeld,et al.  Time-scale modification for speech coding , 2000 .

[89]  E.P. Hupkens,et al.  Quickest detection of changes in random fields , 1997, Proceedings of IEEE International Symposium on Information Theory.

[90]  Cornelis H. Slump,et al.  On the objective speech quality of the TETRA system , 1998 .

[91]  Cornelis H. Slump On information theoretical aspects of speech transmission , 1998 .

[92]  Joos Vandewalle,et al.  A SOFTWARE IMPLEMENTATION OF THE McELIECE PUBLIC-KEY CRYPTOSYSTEM , 1992 .

[93]  K. A. Post,et al.  Simple and optimal coding strategies for memories with known defects , 1988 .

[94]  Slimane Ben Slimane,et al.  BER results for a narrowband multi-user receiver based on successive substraction for MPSK modulated signals , 2000 .

[95]  R. Moddemeijer On estimation of entropy and mutual information of continuous distributions , 1989 .

[96]  de Aj Brian Bart,et al.  Combining enumerative shaping techniques and block coded modulation for ISI channels , 1995 .

[97]  Joos Vandewalle,et al.  Efficient pseudorandom sequence generation by cellular automata , 1991 .

[98]  Anthony C. C. Coolen,et al.  A learning mechanism for invariant pattern recognition in neural networks , 1989, Neural Networks.

[99]  Cornelis H. Slump On Image compression related to image formation, capture and quality , 1993 .

[100]  Constant Paul Marie Jozef Baggen,et al.  On the diamond code construction , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[101]  Eric R. Verheul,et al.  Cryptanalysis of ‘Less Short’ RSA Secret Exponents , 1997, Applicable Algebra in Engineering, Communication and Computing.

[102]  Arjan Meijerink,et al.  Generalization and performance improvement of a coherence multiplexing system , 2001 .

[103]  K. J. Keuning,et al.  Performance and complexity of decoding algorithms , 1997 .

[104]  A. P. Hekstra On the Maximum Difference Between Path Metrics in a Viterbi Decoder , 1993, Proceedings. IEEE International Symposium on Information Theory.

[105]  Huibert Kwakernaak Estimation of pulse heights and arrival times , 1980, Autom..

[106]  Auguste Laloux,et al.  Waiting-time approximations for service systems with a polling table , 1989 .

[107]  B. Preneel,et al.  Anonymity controlled electronic payment systems , 1999 .

[108]  C.L.M. van Pul Computer memories with defective cells , 1985 .

[109]  Luc Van Gool,et al.  A bottom-up approach to pattern classification , 1994 .

[110]  Jean Cardinal,et al.  A fast full search equivalent for mean-shape-gain vector quantizers , 1999 .

[111]  Adaptive Mixtures for Object Tracking , 2000 .

[112]  Patrick Wambacq,et al.  Improved noise robustness for speech recognition by adaptive SVD-based filtering , 1999 .

[113]  Cornelis H. Slump,et al.  Lossy Compression of Cardiac X-Ray Images Based on Acquisition Noise , 1998 .

[114]  F. C. Schoute,et al.  LART: design and implementation of an experimental wireless platform , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).

[115]  Jean Cardinal,et al.  Complexity-constrained tree-structured vector quantizers , 2002, Signal Process..

[116]  E. Backer,et al.  A flexible and intelligent system for fast measurements in binary images for in-line robotic control , 1988 .

[117]  D. S. Farin Towards real-time MPEG-4 segmentation: a fast implementation of region merging , 2000 .

[118]  Aggelos K. Katsaggelos,et al.  A regularized iterative image restoration algorithm , 1991, IEEE Trans. Signal Process..

[119]  Cornelis H. Slump,et al.  Medical Image Compression Boundaries Based on the Image Acquisition Process , 1996 .

[120]  M. S. Bargh,et al.  Coding for channels with low rate noiseless feedback , 1997, Proceedings of IEEE International Symposium on Information Theory.

[121]  Joos Vandewalle,et al.  Diffusion analysis of Feistel networks , 1999 .