Abstract is missing.
- Good high-rate pi-rotation LDPC codes based on novel puncturing techniquesRich Echard, Shih-Chun Chang. 1-6 [doi]
- Low-density parity-check accumulate codesChung-Li Wang, Shu Lin. 7-12 [doi]
- Adaptive quantization for low-density-parity-check decodersCha-Hao Chung, Yeong-Luh Ueng, Ming-Che Lu, Mao Chao Lin. 13-18 [doi]
- Error-trellis state complexity of LDPC convolutional codes based on circulant matricesMasato Tajima, Koji Okino, Takashi Miyagoshi. 19-24 [doi]
- Approximately universal MIMO diversity embedded codesHsiao-feng Lu. 25-30 [doi]
- MIMO MFSK receivers using FDE and MLD on quasi-static frequency selective fading channelsKenji Nakayama, Yasunori Iwanami, Eiji Okamoto. 31-36 [doi]
- Lattice-reduction aided HNN for vector precodingVesna Gardasevic, Ralf R. Müller, Daniel J. Ryan, Lars Lundheim, Geir E. Øien. 37-41 [doi]
- A family of cyclic division algebra based fast-decodable 4×2 space-time block codesRoope Vehkalahti, Camilla Hollanti, Jyrki T. Lahtonen. 42-47 [doi]
- Direct biometric verification schemes with Gaussian dataVladimir B. Balakirsky, A. J. Han Vinck. 48-53 [doi]
- Fundamental limits for biometric identification with a database containing protected templatesTanya Ignatenko, Frans M. J. Willems. 54-59 [doi]
- A geometric view of mutual information: Application to anonymity protocolsSami Zhioua. 60-65 [doi]
- Realizing and evaluating mutual anonymity in P2P networksChigusa Kawashima, I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita, Todorka Alexandrova. 66-71 [doi]
- On the adaptive antidictionary code using minimal forbidden words with constant lengthsTakahiro Ota, Hiroyoshi Morita. 72-77 [doi]
- On coding for source with infinitesimal time slotsMikihiko Nishiara. 78-81 [doi]
- Using synchronization bits to boost compression by substring enumerationDanny Dubé. 82-87 [doi]
- On coding for nonbinary sources with side information at the decoderShohei Iwata, Toshihiro Hattori, Motohiko Isaka. 88-93 [doi]
- Stationary sequences and stable samplingJuan Miguel Medina, Bruno Cernuschi-Frías. 94-99 [doi]
- Approximating discrete probability distributions with causal dependence treesChristopher J. Quinn, Todd P. Coleman, Negar Kiyavash. 100-105 [doi]
- English and Taiwanese text categorization using N-gram based on Vector Space ModelMakoto Suzuki, Naohide Yamagishi, Yi-Ching Tsai, Takashi Ishida, Masayuki Goto. 106-111 [doi]
- A note on model selection for small sample regressionMasanori Kawakita, Yoko Oie, Junrichi Takeuchi. 112-117 [doi]
- Proper self-complementary codesTorleiv Kløve, Somaye Yari. 118-122 [doi]
- Computing the degree of a Boolean function from its supportJoan-Josep Climent, Francisco J. Garcia, Verónica Requena. 123-128 [doi]
- BER analysis for MIMO BICM-ID assuming finite precision of extrinsic LLRChien-Yi Wang, I-Wei Lai, Tzi-Dar Chiueh, Gerd Ascheid, Heinrich Meyr. 129-134 [doi]
- Upper bounds on the average probability of undetected error for the ensembles of both product and concatenated codesToshihisa Nishijima, Kin-ichiroh Tokiwa. 135-138 [doi]
- Practical design and its evaluations for nested transmit diversityTakashi Hayashi, Koji Ishii, Shigeaki Ogose. 139-144 [doi]
- Improving error performance of Joint Channel and Network Coding in Multiple Access Relay ChannelErnest Kurniawan, Sumei Sun, Kai Yen, Kai Fong Ernest Chong. 145-150 [doi]
- Split-extended LDPC codes for coded cooperationValentin Savin. 151-156 [doi]
- Joint relay selection and link adaptation for distributed beamforming in regenerative cooperative networksWei Yang, Lihua Li, Gang Wu, Haifeng Wang. 157-162 [doi]
- Performance analysis and optimal power allocation for hybrid incremental relayingJaeyoung Lee, Sung-Il Kim, Jun Heo. 163-168 [doi]
- Modeling of DF behavior and SNR evaluation for multinode cooperation system with adaptive modulation under different diversity combining strategiesShi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang. 169-173 [doi]
- Secure rate-adaptive reconciliationDavid Elkouss, Jesús Martínez-Mateo, Vicente Martin. 179-184 [doi]
- Secret key establishment over a pair of independent broadcast channelsHadi Ahmadi, Reihaneh Safavi-Naini. 185-190 [doi]
- New results on Secret Key Establishment over a pair of broadcast channelsHadi Ahmadi, Reihaneh Safavi-Naini. 191-196 [doi]
- Secret key rate region of multiple access channel modelSomayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref. 197-202 [doi]
- Wireless relay networks using multiple frequency bandsToshiyuki Kikkawa, Yukitoshi Sanada. 203-208 [doi]
- Performance analysis of equalization and interference cancellation by adaptive digital filter for UWB-IR system inside a vehicleAya Inami, Chika Sugimoto, Ryuji Kohno. 209-214 [doi]
- A study on estimating implanted devices using image information and ranging system using UWB radioHiroshi Takayama, Chika Sugimoto, Ryuji Kohno. 215-219 [doi]
- A novel positioning estimation method with the correlation between sensors dataYuuki Matsuura, Koji Ishii, Shigeaki Ogose. 220-224 [doi]
- Iterative algorithm using particle filter for positioning in NLOS environmentKoji Enda, Ryuji Kohno. 225-230 [doi]
- Probabilistic search of nonbinary LDPC codes for distributed video codingHaruhiko Kaneko. 231-236 [doi]
- Selective multiple reference frames motion estimation for H.264/AVC video codingChih-Chung Tsui, Yu-Ming Lee, Yinyi Lin. 237-242 [doi]
- Spectral entropy-based bit allocationMalavika Bhaskaranand, Jerry D. Gibson. 243-248 [doi]
- Practical estimation of adaptive correlation noise model for Distributed Video CodingTsung-Han Tsai, Chang-Ming Lee, Wen-Nung Lie. 249-254 [doi]
- Iterative prior-knowledge-based image reconstruction algorithmsHsin M. Shieh, Jin-Gui Li, Yu-Ching Hsu, Meng-Chi Ye, Dong G. Lee. 255-260 [doi]
- Turbo equalization and an M-BCJR algorithm for strongly narrowband intersymbol interferenceJohn B. Anderson, Adnan Prlja. 261-266 [doi]
- Adaptive single-trial error/erasure decoding of binary codesChristian Senger, Vladimir Sidorenko, Steffen Schober, Martin Bossert, Victor V. Zyablov. 267-272 [doi]
- More on general error locator polynomials for a class of binary cyclic codesChong-Dao Lee, Yaotsu Chang, Trieu-Kien Truong, Yan-Haw Chen. 273-277 [doi]
- Efficient decoding algorithm for constant composition codesJen-Chun Chang, I-te Tsai, Hsin-Lung Wu. 278-281 [doi]
- A robust cross coding scheme for OFDM systemsXiaoying Shao, Cornelis H. Slump. 282-287 [doi]
- A modulation classification using amplitude moments in OFDM systemsDaisuke Shimbo, Ikuo Oka. 288-293 [doi]
- Time domain feedback equalizer for fast fading channel in OFDM with scattered pilotYutaro Nakagawa, Yukitoshi Sanada. 294-297 [doi]
- Novel lifetime-aware bit and power allocation in OFDM systemsShi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang. 298-302 [doi]
- An audio watermarking method by using automatic music transcription informationHarumi Murata, Akio Ogihara, Motoi Iwata, Akira Shiozaki. 303-308 [doi]
- Digital watermarking method for tamper detection and recovery of JPEG imagesMotoi Iwata, Tomoki Hori, Akira Shiozaki, Akio Ogihara. 309-314 [doi]
- A scheme of digital watermarking for 3-D models using correlation method in polar coordinate systemShouta Sakaino, Hiromu Koda. 315-319 [doi]
- A simple detection scheme of LSB steganography based on statistics of image difference signalTadakazu Sakakura, Akira Hayashi. 320-325 [doi]
- A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear codeTetsushi Masuno, Toru Fujiwara, Takuya Kusaka. 326-331 [doi]
- Longest queue first in round-robin matching for input-queued switchesJan-Ray Liao, Pin-Hsuan Wu. 332-336 [doi]
- Optimal network planning in robust two site s communicationShin-Guang Chen. 337-342 [doi]
- Directed information and the NRL Network PumpSiva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang. 343-348 [doi]
- Diamond relay network under Rayleigh fading: On-off power control and outage-capacity boundMingjun Dai, Ping Hu, Chi Wan Sung. 355-360 [doi]
- Diversity analysis of the best relay selection for soft-decision-and-forward cooperative networkKyoung-Young Song, Jaehong Kim, Jong-Seon No, Habong Chung. 361-364 [doi]
- Analysis performance of decode-and-forward scheme in distributed MIMO repeater systemPham Thanh Hiep, Ryuji Kohno. 365-370 [doi]
- Efficient space-time block codes for cooperative MIMO communicationsYoussef Nasser, Jean-François Hélard. 371-376 [doi]
- A non-coherent AF scheme for two-way wireless relay networks based on packings in Grassmann manifoldsZoran Utkovski, Yao Cheng, Jürgen Lindner. 377-382 [doi]
- Circulant decomposition: Cyclic, quasi-cyclic and LDPC codesQin Huang, Qiuju Diao, Shu Lin. 383-388 [doi]
- Importance sampling for LDPC codes based on optimal simulation probability density functionTakakazu Sakai, Koji Shibata. 389-393 [doi]
- An iterative decoding algorithm for rate-compatible punctured low-density parity-check codes of high coding ratesGou Hosoya, Hideki Yagi, Manabu Kobayashi. 394-399 [doi]
- Optimized puncturing distributions for irregular non-binary LDPC codesMatteo Gorgoglione, Valentin Savin, David Declercq. 400-405 [doi]
- Körner-Marton theorem for binary modulo-two sum problem from canonical equationsRichard E. Blahut, Soumya Jana. 406-409 [doi]
- On arbitrarily varying bidirectional broadcast channels with constraints on input and statesRafael F. Wyrembelski, Igor Bjelakovic, Holger Boche. 410-415 [doi]
- The compound MAC with common message and partial channel state informationMoritz Wiese, Holger Boche, Igor Bjelakovic. 416-421 [doi]
- Diversity-multiplexing tradeoff analysis of multi-source multi-relay coded networksChao Wang, Ming Xiao, Mikael Skoglund. 422-427 [doi]
- A knapsack cryptosystem based on multiple knapsacksKunikatsu Kobayashi, Kohtaro Tadaki, Masao Kasahara, Shigeo Tsujii. 428-432 [doi]
- A new construction method of knapsack PKC using linear transformation and Chinese remainder theoremYasuyuki Murakami. 433-436 [doi]
- On the critical density associated with the matrix type knapsack cryptosystemAkira Hayashi. 437-440 [doi]
- Improvement of the Low Rank AttackMasahito Gotaishi. 441-445 [doi]
- Error exponents of discrete memoryless channels and AWGN channels with noisy feedbackAkari Sato, Hirosuke Yamamoto. 452-457 [doi]
- Data transmission in the presence of noisy channel state feedback and outage probability constraintBehrooz Makki, Thomas Eriksson. 458-463 [doi]
- On the capacity region of a class of Z Channels with cooperationSadaf Salehkalaibar, Mohammad Reza Aref. 464-468 [doi]
- High-rate maximum runlength constrained coding schemes using base conversionKees A. Schouhamer Immink. 469-472 [doi]
- A prefix-free coding for finite-state noiseless channels with small coding delayKen-ichi Iwata, Takuya Koyama. 473-477 [doi]
- Syndrome former trellis construction for punctured convolutional codesJan Geldmacher, Jürgen Götze. 478-483 [doi]
- On soft iterative decoding for ternary recording systems with RLL constraintsShih-Kai Lee, Hsin-Yi Chen, Mao Chao Lin, Tien-Hui Chen. 484-489 [doi]
- Recovering synchronization with iterative decoders: LDPC codesRaul Martinez-Noriega, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi. 490-495 [doi]
- Optimization of memory utilization for partially parallel QC-LDPC decoderTsung-Che Wu, Yao-Wen Hu, Chang-Ming Lee. 496-500 [doi]
- A message-passing decoding algorithm for q-ary LDPC codes with low-complexityChao-Yu Chen, Qin Huang, Chi-Chao Chao, Shu Lin. 501-506 [doi]
- A new construction of irregular LDPC convolutional codes with cycle removalChi-Jen Wu, Chung-Hsuan Wang, Chi-Chao Chao. 507-512 [doi]
- Detailed evaluation of error floors of LDPC codes using the probabilistic algorithmMasanori Hirotomo, Masakatu Morii. 513-518 [doi]
- An achievable rate of large block-fading MIMO systems with no CSI via successive decodingKeigo Takeuchi, Ralf R. Müller, Mikko Vehkaperä, Toshiyuki Tanaka. 519-524 [doi]
- MIMO block-fading channels with mismatched CSIRA. Taufiq Asyhari, Albert Guillen i Fabregas. 525-530 [doi]
- MIMO systems with mutual coupling: How many antennas to pack into fixed-length arrays?Shuo Shen, Matthew R. McKay, Ross D. Murch. 531-536 [doi]
- Some simple observations on MISO codesRoope Vehkalahti, Camilla Hollanti, Jyrki T. Lahtonen, Hsiao-feng Lu. 537-541 [doi]
- MIMO broadcast channel rate region with linear precoding at high SNR without full multiplexingPaul de Kerret, Michael Joham, Wolfgang Utschick, Rudolf Mathar. 542-547 [doi]
- An ANFIS-IDS against deauthentication DOS attacks for a WLANJeich Mar, Yow-Cheng Yeh, I-Fan Hsiao. 548-553 [doi]
- A user authenticaion scheme using multiple passphrases and its arrangementHirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 554-559 [doi]
- Anti-phishing mutual authentication using the visual secret sharing schemeKai Zhao, Yuichi Kaji. 560-565 [doi]
- De-synchronization attack on RFID authentication protocolsNai-Wei Lo, Kuo-Hui Yeh. 566-570 [doi]
- How to distinguish on-line dictionary attacks and password mis-typing in two-factor authenticationYasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai. 571-576 [doi]
- Relations between universal FV and FF source codesShigeaki Kuzuoka. 577-582 [doi]
- On embeddings of shifts of finite type into the golden-mean-Dyck shiftHiroshi Fujisaki. 583-588 [doi]
- Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure sourceGregory Demay, Vishwambhar Rathi, Lars K. Rasmussen. 589-594 [doi]
- The minimum achievable redundancy rate of fixed-to-fixed length source codes for general sourcesMitsuharu Arimura, Ken-ichi Iwata. 595-600 [doi]
- Joint JPEG-block coding with expurgating trellis for wireless robust image transmissionJyun-Jie Wang, Houshou Chen, Zhin-Han Dai, Hsinying Liang. 601-605 [doi]
- Implementation of finite impulse response systems using rotation structuresKrzysztof Wawryn, Robert T. Wirski, Bogdan Strzeszewski. 606-610 [doi]
- A design method for IIR digital filters with variable stopband using semidefinite programmingNanako Ubayama, Toma Miyata, Naoyuki Aikawa. 611-615 [doi]
- Synthesis of orthogonal Roesser model for two-dimensional FIR filtersRobert T. Wirski. 616-620 [doi]
- The optimum approximate reconstruction of a signal from the discrete sample values of the prescribed multiple wavesYuichi Kida, Takuro Kida. 621-626 [doi]
- Development of a new numerical solution of inhomogeneous linear partial differential equations with many independent variablesYuichi Kida, Takuro Kida. 627-632 [doi]
- Improved decoding of Shannon-Kotel nikov mappingsMatthias Rüngeler, Birgit Schotsch, Peter Vary. 633-638 [doi]
- Pulse interference mitigation techniques for QPSK and QAM using Viterbi decodingYu Morishima, Ikuo Oka, Shingo Ata. 639-643 [doi]
- Performance evaluation of Go-Back-i-symbol ARQ scheme applicable to meteor burst communicationsShinsuke Nagata, Kaiji Mukumoto, Tadahiro Wada, Koji Ishibashi. 644-649 [doi]
- Bounds on end-to-end performance of networks employing erasure control codingXiao-Hong Peng. 650-655 [doi]
- User/sampling point selection algorithm in multiuser MIMO-OFDM with fractional samplingKenta Eguchi, Haruki Higuchi, Yukitoshi Sanada. 656-661 [doi]
- Low-complexity sampling point selection in OFDM receiver with fractional samplingEisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada, Mohammad Ghavami. 662-667 [doi]
- A novel CRC based error correction scheme in OFDM/OFDMA wireless networksChia-Yao Chen, Wen-Kang Jia, Yaw-Chung Chen. 668-672 [doi]
- Bidirectional decision feedback equalization for mobile MIMO-OFDM systemsRih-Lung Chung, Chin-Wen Chang, Jeng-Kuang Hwang. 673-677 [doi]
- Two generalizations of a coding theorem for a (2, 2)-threshold scheme with a cheaterHiroki Koga. 678-683 [doi]
- A secure authentication system based on variable-length codesUlrich Speidel, T. Aaron Gulliver. 684-689 [doi]
- A low complexity authentication protocol based on pseudorandomness, randomness and homophonic codingMiodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai. 690-695 [doi]
- Product perfect Z2 Z4-linear codes in steganographyJosep Rifà, Lorena Ronquillo. 696-701 [doi]
- A theoretical framework for capacity-achieving multi-user waterfilling in OFDMASimon Görtzen, Anke Schmeink. 702-707 [doi]
- The performance of QPSK in low-SNR interference channelsMoritz Wiese, Frederic Knabe, Johannes Georg Klotz, Aydin Sezgin. 708-713 [doi]
- On the rate distortion region of Gaussian multiterminal source codingYasutada Oohama. 714-719 [doi]
- The capacity of a class of linear deterministic relay networksS. M. Hossein Tabatabaei Yazdi, Mohammad Reza Aref. 720-725 [doi]
- Double-directional information azimuth spectrum and relay network tomography for a decentralized wireless relay networkYifan Chen, Chau Yuen, Yong Huat Chew. 726-731 [doi]
- O&7PSK modulation and its bit error rate performanceShin ichi Koike, Seiichi Noda. 732-737 [doi]
- Theoretical analysis of M-CSK/CDMA system in optical wireless channelYusuke Kozawa, Hiromasa Habuchi. 738-742 [doi]
- Inband and outband spectrum analysis of the BFDM and BFDM/OQAM signals with truncated Gaussian pulsesBayarpurev Mongol, Takaya Yamazato, Masaaki Katayama. 743-746 [doi]
- A new bit-labeling for trellis-shaped PSK with improved PAPR reduction capabilityYuuki Nishino, Makoto Tanahashi, Hideki Ochiai. 747-751 [doi]
- Signal analysis and classification of digital communication signal using higher order time-frequency analysis techniquesJo Lynn Tan, Ahmad Zuri bin Sha ameri, Yen Mei Chee. 752-756 [doi]
- Path deletions for finite stack-size sequential-type decoding algorithmsChen-Yi Wang, Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han. 757-761 [doi]
- Theoretical analysis of bit error probability for 4-state recursive systematic convolutional code with Max-Log MAP decodingHideki Yoshikawa, Yoshitake Kawadai. 762-766 [doi]
- Theoretical analysis of bit error probability for Log-MAP decodingHideki Yoshikawa. 767-771 [doi]
- Adaptive recursive MLD using ordered statistics for low rate codesRyuhei Yokoyama, Toru Fujiwara, Takuya Kusaka. 772-777 [doi]
- Update on Enocoro stream cipherDai Watanabe, Toru Owada, Kazuto Okamoto, Yasutaka Igarashi, Toshinobu Kaneko. 778-783 [doi]
- On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipherYasutaka Igarashi, Toshinobu Kaneko. 784-788 [doi]
- A Security evaluation of certain stream ciphers which involve randomness and codingMiodrag J. Mihaljevic, Hideki Imai. 789-794 [doi]
- A structured aggregate signature schemeNaoto Yanai, Eikoh Chida, Masahiro Mambo. 795-800 [doi]
- A revisit to the Muroga method of computing channel capacityTsutomu Kawabata. 801-806 [doi]
- Block fading channels with limited channel state informationS. Lembo, Chia-Hao Yu, Olav Tirkkonen. 807-811 [doi]
- The achievable rate of stationary rayleigh flat-fading channels with IID input symbolsMeik Dorpinghaus, Heinrich Meyr, Gerd Ascheid. 812-817 [doi]
- The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannelsReza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref. 818-823 [doi]
- Suitable representation of values on the logistic map with finite precisionShunsuke Araki, Ken ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara. 824-829 [doi]
- A study on differences in properties of the logistic maps over integers affected by roundingTakeru Miyazaki, Shunsuke Araki, Satoshi Uehara. 830-835 [doi]
- Autocorrelation functions and double difference sequencesYing Li, Yi-Chan Kao, Mei-Wen Chang. 836-841 [doi]
- Hamming distance correlation for q-ary constant weight codesTakayasu Kaida, Junru Zheng. 842-845 [doi]
- An algorithm for new lower bound of minimum distance by DFT for cyclic codesJunru Zheng, Takayasu Kaida. 846-849 [doi]
- Maximum a posteriori estimation using ARCH models and burst error correcting array codes for burst-erasure recording channelsHidetoshi Saito, Ryuji Kohno. 850-855 [doi]
- Comparison of Reed-Solomon and Raptor codes for the protection of video on-demand on the erasure channelJulie Neckebroek, Marc Moeneclaey, Enrico Magli. 856-860 [doi]
- Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channelMathieu Cunche, Valentin Savin, Vincent Roca. 861-866 [doi]
- Floating codes with good average performanceHiroshi Kamabe. 867-872 [doi]
- Informed message update for iterative MIMO demapping and turbo decodingDan Zhang, I-Wei Lai, Konstantinos Nikitopoulos, Gerd Ascheid. 873-878 [doi]
- Imperfect generalized transmit beamforming with co-channel interference cancelationRedha M. Radaydeh, Mohamed-Slim Alouini. 879-884 [doi]
- Distributed precoding design for MIMO interference channelsRonghong Mo, Yong Huat Chew, Tony Q. S. Quek, Chengzhi Chen. 885-889 [doi]
- Analysis of diversity-multiplexing tradeoff bounds of ZF-SIC systems with error propagationDong-Min Shin, Kyeongcheol Yang. 890-894 [doi]
- Digital-controlled analog beamforming for indoor MIMO multipath channelsYabo Li. 895-899 [doi]
- Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methodsKohtaro Tadaki, Shigeo Tsujii. 900-904 [doi]
- Clarifying the specification of linear Piece In Hand matrix methodKohtaro Tadaki, Shigeo Tsujii. 905-910 [doi]
- A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attackMiodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. 911-916 [doi]
- On the security of the quantum key distribution using the Mean King ProblemMasakazu Yoshida, Takayuki Miyadera, Hideki Imai. 917-912 [doi]
- Design and implementation of low power digital phase-locked loopM. Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan. 928-933 [doi]
- Downlink beamforming optimization for cognitive underlay networksYoungmin Jeong, Tony Q. S. Quek, Hyundong Shin. 934-939 [doi]
- Analysis of primary user duty cycle impact on spectrum sensing performanceKevin Chang, Yu-Chieh Huang, Bouchra Senadji. 940-945 [doi]
- Optimal multiuser beamforming and power allocation for hierarchical cognitive radio systemsMeng-Lin Ku, Li-Chun Wang, Yu Ted Su. 946-951 [doi]
- Cognitive interference channel with two confidential messagesHamid G. Bafghi, Somayeh Salimi, Babak Seyfe, Mohammad Reza Aref. 952-956 [doi]
- Relay-aided multi-cell broadcasting with random network codingLu Lu, Fan Sun, Ming Xiao, Lars K. Rasmussen. 957-962 [doi]
- Subcarrier allocation and partner selection algorithms for cooperative multicarrier systemsKuang-Yu Sung, Yao-Win Peter Hong, Chi-Chao Chao. 963-968 [doi]
- Outage performance analysis for fractional frequency reused TDD-OFDMA systems with asymmetric trafficsLi-Chun Wang, Wei-Chi Li. 969-974 [doi]
- Outage analysis and optimal power allocation for network-coding-based hybrid AF and DFJooha Bek, Jaeyoung Lee, Jun Heo. 975-980 [doi]
- Cooperative MMSE OFDM receiver for half-duplex and multiple-relays systemRih-Lung Chung, Shu-Hao Chang. 981-985 [doi]
- Decoding Reed-Solomon codes up to the Sudan radius with the Euclidean algorithmAlexander Zeh, Wenhui Li. 986-990 [doi]
- Syndrome calculation for the decoding of algebraic-geometry codes on plane Garcia-Stichtenoth curvesChung-Chin Lu, Chih-Yen Yang, Ti-Chung Lee. 991-994 [doi]
- A New reliability updating scheme for iterative decoding of Reed-Solomon codes with refined initializationJian-Jia Weng, Yu-Min Hsieh, Hsin-Chuan Kuo, Chung-Hsuan Wang, Tsung-Cheng Wu, Yi-Sheng Su. 995-1000 [doi]
- Unified system of encoding and decoding erasures and errors for algebraic geometry codesHajime Matsui. 1001-1006 [doi]
- Outage capacity of bursty amplify-and-forward with incremental relayingTobias Renk, Holger Jäkel, Friedrich Jondral, Deniz Gündüz, Andrea J. Goldsmith. 1007-1011 [doi]
- Non-coherent two-way relaying: Rate bounds for the high SNR regimeZoran Utkovski, Aydin Sezgin, Jürgen Lindner. 1012-1017 [doi]
- Achievable rate regions for interference channel with two relaysBahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref. 1018-1023 [doi]
- Generalized multiple-access relay channel with confidential messagesAmir Sonee, Somayeh Salimi, Mahmoud Salmasizadeh. 1024-1029 [doi]
- Generalized Wigner-Yanase-Dyson skew information and uncertainty relationKenjiro Yanagi. 1030-1034 [doi]
- Formula of channel matrix for coded quantum signals by classical linear codes over ZmMasaki Ota, Hideyuki Kumazawa, Keisuke Shiromoto, Tsuyoshi Sasaki Usuda. 1035-1040 [doi]
- A further study on the encoding complexity of quantum stabilizer codesKao-Yueh Kuo, Chung-Chin Lu. 1041-1044 [doi]
- On attainment of the capacity of broadband quantum channel by wavelength division multiplexingYoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usuda. 1045-1049 [doi]
- A modified genetic algorithm PTS technique with error correction for PAPR reduction in OFDM systemsHsinying Liang, Zhe Lin, Houshou Chen, Cheng-Ying Yang. 1050-1053 [doi]
- A new selected mapping scheme for PAPR reduction in OFDM systemsKee-Hoon Kim, Hyun-Bae Jeon, Jong-Seon No, Dong-Joon Shin. 1054-1057 [doi]
- PAPR for OFDM and the proportion of information bearing signals for tone reservationHolger Boche, Brendan Farrell. 1058-1063 [doi]