default search action
36th MILCOM 2017: Baltimore, MD, USA
- 2017 IEEE Military Communications Conference, MILCOM 2017, Baltimore, MD, USA, October 23-25, 2017. IEEE 2017, ISBN 978-1-5386-0595-0
- Steven McElwee, Jeffrey Heaton, James B. Fraley, James Cannady:
Deep learning for prioritizing and responding to intrusion detection alerts. 1-5 - Ken F. Yu, Richard E. Harang:
Machine learning in malware traffic classifications. 6-10 - Muhammad Ejaz Ahmed, Hyoungshick Kim, Moosung Park:
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking. 11-16 - Juan Zhao, Sachin Shetty, Jan Wei Pan:
Feature-based transfer learning for network security. 17-22 - Shayok Chakraborty, Jack W. Stokes, Lin Xiao, Dengyong Zhou, Mady Marinescu, Anil Thomas:
Hierarchical learning for automated malware classification. 23-28 - Xiaoqing Fan, Joel Llewelyn, Aaron B. Wagner, Matthew P. Kuzdeba:
Resilient communication against adversarial path-errors. 29-34 - Andrew Kolodgie, Paul Berges, Ryan Burrow, Mark Carman, Josh Collins, Sam Bair, Geffrey D. Moy, Joseph M. Ernst, Alan J. Michaels:
Enhanced TPMS security through acceleration timed transmissions. 35-39 - Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. 40-45 - Rui Zhu, Tao Shu, Huirong Fu:
Empirical statistical inference attack against PHY-layer key extraction in real environments. 46-51 - Omar Nakhila, Cliff C. Zou:
Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network. 52-56 - Xian Liu:
Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors. 57-62 - Marek Malowidzki, Pawel Kaniewski, Robert Matyszkiel, Przemyslaw Berezinski:
Standard tactical services in a military disruption-tolerant network: Field tests. 63-68 - Ehsan Keramat, Nicholas Kauffroath, Kia Karbasi, Heng Zhao, Babak Daneshrad, Gregory J. Pottie:
Experimental results for low overhead frequency offset estimation in MANETs with concurrent transmission. 69-72 - Abdoulaye Saadou, Harsha Chenji:
A network-centric model of situational awareness. 73-78 - Karina M. Fors, Sara Linder, Jan Nilsson, Ulf Sterner:
Effects of interference between co-located frequency-hopping ad hoc networks. 79-84 - Joseph P. Macker, Jeffery W. Weston:
An examination of forwarding prediction metrics in dynamic wireless networks. 85-90 - Xian Liu:
Strictly positive secrecy of IoT: A case study involving correlated eavesdroppers. 91-96 - Ertugrul N. Ciftcioglu, Rommie L. Hardy, Lisa M. Scott, Kevin S. Chan:
Efficient chaff-aided obfuscation in resource constrained environments. 97-102 - Yalin E. Sagduyu, Yi Shi, Tugba Erpek, Sohraab Soltani, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Boleslaw K. Szymanski, Guohong Cao:
Multilayer MANET routing with social-cognitive learning. 103-108 - Venkata Sriram Siddhardh Nadendla, Emrah Akyol, Cedric Langbort, Tamer Basar:
Strategic communication between prospect theoretic agents over a Gaussian test channel. 109-114 - Talha Ahmed Khan, Robert W. Heath Jr.:
Analyzing wireless power transfer in millimeter wave networks with human blockages. 115-120 - Steven Conrad Hauser, William C. Headley, Alan J. Michaels:
Signal detection effects on deep neural networks utilizing raw IQ for modulation classification. 121-127 - Joseph Vanderpoorten, Kevin Zhang:
Flexible modem interface - Enabling DoD wideband SATCOM enterprise. 128-134 - Armando J. Vigil, Mark Jasen, Dahesh A. Khalil:
SATCOM innovation: Priorities for modern development. 135-140 - Qiwei Wang, Thinh Nguyen, Khanh D. Pham, Hyuck Kwon:
Satellite jamming: A game theoretic analysis. 141-146 - Lino Gonzalez, Jerry Rippon:
On minimizing WGS transponder power by optimizing channel gains designed for uplink frequency reuse via circular polarization. 147-152 - Jerry Brand, Keith Olds, Thomas Saam:
Real-time control and management of roaming wideband SATCOM terminals. 153-157 - David N. Meadows, Jordan Thomas:
A remote control and management scheme for deployed VSATs: An approach for the USAF pathfinder flexible modem interface. 158-163 - Mohammad Hossein Moghaddam, Mohammad Javad Azizipour, Saeed Vahidian, Besma Smida:
A framework for super-resolution of scalable video via sparse reconstruction of residual frames. 164-168 - Hassan Yazdani, Azadeh Vosoughi, Nazanin Rahnavard:
Compressive sensing based direction-of-arrival estimation using reweighted greedy block coordinate descent algorithm for ESPAR antennas. 169-173 - Sener Dikmese, Markku Renfors, Ismail Güvenç:
Flexible filter bank based spectrum sensing and waveform processing for mission critical communications. 174-179 - Erik Axell, Sara Örn Tengstrand, Kia Wiklundh:
Online classification of Class A impulse interference. 180-184 - Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner:
Sliding windows technique for LTE network coverage detection. 185-190 - Yuyu Ma, Hui Gao, Tiejun Lv, Yueming Lu:
Novel user clustering schemes for downlink NOMA system. 191-196 - Xinxin Liu, Yunzhou Li, Limin Xiao, Jing Wang:
Power control in D2D-based multi-antenna V2V underlay cellular networks with rate constraints. 197-202 - Henry Romero, Adam R. Margetts, Greg Kuperman:
Subband bandwidth considerations for multiple-antenna multicarrier communications. 203-208 - Hosseinali Jamal, David W. Matolak:
Enhanced airport surface multi-carrier communication systems: Filterbank advantages over AeroMACS OFDM. 209-213 - Stephen G. Wilson, Rui Shang, Ruixuan He:
Frame synchronization for OFDM using cyclic prefix and pilot carriers. 214-218 - Çagri Göken, Onur Dizdar:
Performance of edge windowing for OFDM under non-linear power amplifier effects. 219-224 - Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry:
X509Cloud - Framework for a ubiquitous PKI. 225-230 - Marcus Pendleton, Shouhuai Xu:
A dataset generator for next generation system call host intrusion detection systems. 231-236 - Iman Vakilinia, Shamik Sengupta:
A coalitional game theory approach for cybersecurity information sharing. 237-242 - Yi Shi, Yalin E. Sagduyu:
Evasion and causative attacks with adversarial deep learning. 243-248 - David Whelihan, Michael Vai, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, B. Frantz, D. Hadcock, Michael Lynch, Douglas Schafer, J. DeMatteis, D. Russo:
Designing agility and resilience into embedded systems. 249-254 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic:
Quantifying information leakage in a processor caused by the execution of instructions. 255-260 - Xueping Liang, Juan Zhao, Sachin Shetty, Danyi Li:
Towards data assurance and resilience in IoT using blockchain. 261-266 - Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
The Mirai botnet and the IoT Zombie Armies. 267-272 - Thomas H. Shake, Rahul Amin:
Maximizing interconnectedness and availability in directional airborne range extension networks. 273-278 - Kin-Ping Hui, Damien Phillips, Asanka Kekirigoda:
Beyond Line-of-Sight range extension with OPAL using autonomous unmanned aerial vehicles. 279-284 - DeJuan Anderson:
An investigation into the use of software defined networking controllers in aerial networks. 285-290 - William D. Watson, Steve Huntsman, James T. Dolan:
Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs). 291-296 - John M. Shea, Joseph P. Macker:
An adjacency matrix approach to delay analysis in temporal networks. 297-302 - Xiao Xu, Sattar Vakili, Qing Zhao, Ananthram Swami:
Online learning with side information. 303-308 - Yuan Li, Prithwish Basu:
Assigning teams to tasks under time-varying coordination costs. 309-314 - Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Successive synthesis of latent Gaussian trees. 315-320 - Peter Dong, Harrison Carcione, Joseph Hutter, Gina Jiang, Charles Kuch, Soomin Park, Advai Podduturi, Peijing Xu, David Beering:
Designing a low-cost mobile tracking system for communication with a medium earth orbit satellite. 321-324 - Yash Vasavada, Deepak Arur, Channasandra Ravishankar, Charles Barnett:
User location determination using delay and Doppler measurements in LEO satellite systems. 325-330 - Yash Vasavada, Channasandra Ravishankar, J. Corrigan, Gaguk Zakaria, Xiaoling Huang:
Determination of locations of calibration earth stations for ground based beam forming in satellite systems. 331-336 - Madhuprana Goswami, Hyuck M. Kwon, Khanh D. Pham, James Lyke, Thinh Nguyen:
Communication on the move with satellite digital beamforming. 337-341 - Ahmad A. I. Ibrahim, Andrew C. Marcum, David J. Love, James V. Krogmeier:
Channel estimation for multi-way quantized distributed wireless relaying. 342-347 - Ngwe Thawdar, Ulysses Lee, Weifeng Su, Dimitris A. Pados:
Differential amplify-and-forward cooperative relaying in a software-defined radio testbed with an aerial relay node. 348-353 - Xian Liu:
Performance of selection DF scheme for a relay system with non-identical Rician fading. 354-359 - Bilal Al-Doori, Xian Liu, Ayad N. Bihnam:
Throughput and power management of access link DF type I relay nodes for LTE-A networks and beyond. 360-365 - Marcel Rieß, Steffen Moser, Frank Slomka:
Efficient underwater communication modem for harsh and highly non-stationary channel conditions - A fully model-based approach. 366-371 - Alexei V. Nikitin, Ruslan L. Davidchack:
Nonlinear rank-based analog loop filters in delta-sigma analog-to-digital converters for mitigation of technogenic interference. 372-381 - Juha Kukkola, Mari Ristolainen, Juha-Pekka Nikkarila:
Confrontation with closed network nation: Open network society's choices and consequences. 382-387 - Grace A. Lewis, Sebastián Echeverría, Dan Klinedinst, Keegan Williams:
Secure VM migration in tactical cloudlets. 388-393 - Jaime C. Acosta, Joshua McKee, Alexander Fielder, Salamah Salamah:
A platform for evaluator-centric cybersecurity training and data acquisition. 394-399 - Markus Kont, Mauno Pihelgas, Kaie Maennel, Bernhards Blumbergs, Toomas Lepik:
Frankenstack: Toward real-time Red Team feedback. 400-405 - Hyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee:
Cyber situational awareness enhancement with regular expressions and an evaluation methodology. 406-411 - Xi Zhang, Qixuan Zhu:
Statistical quality of service provisioning over edge computing mobile wireless networks. 412-417 - Georgios Kyriakou, Pei Liu, Shivendra S. Panwar, Stephen Raio, Giorgio Bertoli, William Scott Sanz, Harold Brown:
Spreading the message: Defining the delay distribution in opportunistic communications. 418-423 - Weiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Yuemei Xu:
A hybrid caching scheme based on manifold learning in CCN. 424-429 - Roberto Fronteddu, Alessandro Morelli, Enrico Casini, Niranjan Suri, Brian Jalaian, Laurel Sadler:
A content and context-aware solution for network state exchange in tactical networks. 430-435 - Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Modeling the age of information in emulated ad hoc networks. 436-441 - James Norris, John Nieto:
A new UHF narrowband satellite communications PHY layer for HPW. 442-446 - Robert T. Schwarz, Florian Völk, Andreas Knopp, Christian A. Hofmann, Kai-Uwe Storek:
The multiple-satellite MIMO channel of narrow band vehicular communications at UHF. 447-452 - Hanguk Jee, Kyuman Lee, Jaesung Lim:
Autonomous maneuvering of relay UAV for battlefields using TDOA localization. 453-458 - Pengyuan Du, Fan Pang, Torsten Braun, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim:
Traffic optimization in software defined naval network for satellite communications. 459-464 - Tauhidul Alam, Md. Mahbubur Rahman, Leonardo Bobadilla, Brian Rapp:
Multi-vehicle patrolling with limited visibility and communication constraints. 465-470 - Siddhartha S. Borkotoky, Patrick J. Dynes, Michael B. Pursley:
A comparison of three adaptive transmission protocols for fountain-coded multicast. 471-476 - O. Goubet, R. Fracchia, A. Descharles:
A more robust and efficient physical layer for SEDR airborne waveform. 477-482 - Michael A. Tope, Joel M. Morris:
Near optimal channel rate discovery for discrete memoryless binary output channels. 483-488 - Adrien Le Naour, Elie Janin, Charly Poulliat:
New perspectives for coded continuous phase modulations for narrowband waveforms: Iterative versus non-iterative solutions. 489-494 - Marco Di Renzo:
Spatial modulation based on reconfigurable antennas - A new air interface for the IoT. 495-500 - Zafer Vatansever, Maïté Brandt-Pearce:
Effects of unknown shadowing and non-line-of-sight on indoor tracking using visible light. 501-506 - Chris A. Rogers, Dimitrie C. Popescu:
Fluctuating extended target detection in clutter environment compressed sensing MIMO radar. 507-512 - Jaeuk Baek, Doyeon Kim, Hongsuk Shim, Youngnam Han:
Improved target-tracking process in PCL. 513-518 - Mahi Abdelbar, R. Michael Buehrer:
Indoor localization through trajectory tracking using neural networks. 519-524 - Yu Rong, Daniel W. Bliss:
Underdetermined source number estimation based on complex wishart distribution using nested arrays. 525-530 - Kevin Andrea, Arda Gumusalan, Robert Simon, Hugh Harney:
The design and implementation of a multicast address moving target defensive system for internet-of-things applications. 531-538 - Cong Pu, Sunho Lim, Byungkwan Jung, Manki Min:
Mitigating stealthy collision attack in energy harvesting motivated networks. 539-544 - Laila M. Almutairi, Sachin Shetty:
Generalized stochastic Petri Net model based security risk assessment of software defined networks. 545-550 - Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. 551-556 - Yonghui Xin, Yang Li, Wei Wang, Weiyuan Li, Xin Chen:
Detection of collusive interest flooding attacks in named data networking using wavelet analysis. 557-562 - Chang Liu, Zygmunt J. Haas:
Multi-hop routing protocols for RFID systems with tag-to-tag communication. 563-568 - Shamsad Parvin, Abderrahmen Mtibaa, Hong Huang, Satyajayant Misra, S. M. Yahea Mahbub, Ali Alshehri, Ramin Zahedi:
STAR: STAble routing for hidden interfering primary user problems in mobile cognitive radio networks. 569-574 - Paulo Alexandre Regis, Shamik Sengupta:
Distributed split-path routing strategy for multi-hop mesh networks. 575-580 - Brian Adamson, Joseph P. Macker, Jeffery W. Weston:
Elastic multicast: Design extensions and experimentation results. 581-586 - Michael J. Hirsch, Azar Sadeghnejad, Héctor J. Ortiz-Peña:
Shortest paths for routing information over temporally dynamic communication networks. 587-591 - Nathaniel B. Soule, Benjamin Toll, Colleen T. Rock, Emily H. Do, Jonathan Price, Joseph P. Loyall, Joseph P. McEttrick, James R. Milligan:
Enabling real-time global reach using a gateway building framework. 592-598 - Salman M. Al-Shehri, Pavel Loskot, Tolga Numanoglu, Mehmet Mert:
Comparing tactical and commercial MANETs design strategies and performance evaluations. 599-604 - Sebastián Echeverría, Grace A. Lewis, Marc Novakouski, Jeff Boleng:
Delay-tolerant data sharing in tactical environments. 605-610 - Allen Starke, D. Kumar, M. Ford, Janise McNair, A. Bell:
A test bed study of network determinism for heterogeneous traffic using time-triggered ethernet. 611-616 - Mohammadreza Mousaei, Mojtaba Soltanalian, Besma Smida:
ComSens: Exploiting pilot diversity for pervasive integration of communication and sensing in MIMO-TDD-Frameworks. 617-622 - Muharrem Arik, Özgür B. Akan:
Utilizing sidelobe ASK based joint radar-communication system under fading. 623-628 - Joel T. Kees, Joseph M. Ernst, William C. Headley, A. A. Louis Beex:
Robust blind spectral estimation in the presence of non-Gaussian noise. 629-634 - Jonathon Cheah, Mitre San Diego:
Numerical reference frequency sample. 635-640 - Xiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh, Zilong Liu, Peng Wang:
Single-channel blind separation of co-frequency PSK signals with unknown carrier frequency offsets. 641-646 - Özgür Özdemir, Ridha Hamila, Naofal Al-Dhahir, Ismail Güvenç:
Sparsity-aware joint frame synchronization and channel estimation: Algorithm and USRP implementation. 647-652 - Catherine Lamy-Bergot, Jean-Luc Rogier, Jean-Yves Bernier, Jean-Baptiste Chantelouve, Patrice Stevens, Philippe Crambert:
Time-division approach in HF wideband: Surfing the wave to offer a better performance. 653-658 - Danda B. Rawat, Olumide Malomo, Chandra Bajracharya, Min Song:
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers. 659-665 - James Chacko, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Kapil R. Dandekar:
Independent source architecture for developing FPGA-based physical layer security techniques. 666-671 - Xian Liu:
Secrecy analysis of the cloud-Fog radio access network with poisson point process and general path-loss parameters. 672-677 - Joseph Schneible, Alex Lu:
Anomaly detection on the edge. 678-682 - Moustafa Saleh, E. Paul Ratazzi, Shouhuai Xu:
A control flow graph-based signature for packer identification. 683-688 - Benjamin Nahill, Aaron Mills, Martin Kiernicki, David A. Wilson, Michael Vai, Roger Khazan, John Sherer:
Towards a universal CDAR device: A high-performance adapter-based inline media encryptor. 689-694 - Jason A. Wampler, Chien Hsieh, Andrew Toth:
Efficient distribution of fragmented sensor data for obfuscation. 695-700 - Hasan Cam:
Online detection and control of malware infected assets. 701-706 - Bernhards Blumbergs, Risto Vaarandi:
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. 707-712 - Neelakantan Nurani Krishnan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella:
Coexistence of radar and communication systems in CBRS bands through downlink power control. 713-718 - Narueporn Nartasilpa, Daniela Tuninetti, Natasha Devroye:
Signal constellation design in the presence of radar interference and Gaussian noise. 719-724 - Hamza Soury, Besma Smida:
Optimal pilot overhead for FDD full-duplex communication and radar sensing (ComSens). 725-730 - Jouni Koivisto, Topi Tuukkanen:
Comprehensive capability meta model tested by a cognitive radio. 731-737 - Susan Watson, Jean-Benoit Larouche:
Design of a software defined radio-based tactical DSA network. 738-743 - Raghunandan M. Rao, Sean Ha, Vuk Marojevic, Jeffrey H. Reed:
LTE PHY layer vulnerability analysis and testing using open-source SDR tools. 744-749 - Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, Andrew Herschfelt, Daniel W. Bliss:
WISCA SDR network. 750-755 - Dmitry Kramarev:
Accurate symbol-level synchronization of universal software radio peripherals for physical-layer network coding applications. 756-761 - Suman Bhunia, Shamik Sengupta:
Implementation of interface agility for duplex dynamic spectrum access radio using USRP. 762-767 - Jingchao Bao, Derek Sprinz, Husheng Li:
Blockage of millimeter wave communications on rotor UAVs: Demonstration and mitigation. 768-774 - Celalettin Umit Bas, Vinod Kristem, Rui Wang, Andreas F. Molisch:
Real-time ultra-wideband frequency sweeping channel sounder for 3-18 GHz. 775-781 - Rui Wang, Celalettin Umit Bas, Seun Sangodoyin, Sooyoung Hur, Jeongho Park, Jianzhong Zhang, Andreas F. Molisch:
Stationarity region of Mm-Wave channel based on outdoor microcellular measurements at 28 GHz. 782-787 - Robert A. Hunjet, Thomas Stevens, Mathew Elliot, Bradley Fraser, Peter George:
Survivable communications and autonomous delivery service a generic swarming framework enabling communications in contested environments. 788-793 - Saritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino:
Learning information release policies for preventing intersection attacks. 794-799 - Na Pang, Dali Zhu, Gang Li, Shaowu Liu:
WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model. 800-805 - Jonathan Thews, Alan O'Donnell, Alan J. Michaels:
Design and analysis of dual helix liquid metal antenna. 806-811 - Jonathan Thews, Alan O'Donnell, Alan J. Michaels:
Design and analysis of two-dimensional parasitic liquid metal monopole array. 812-816 - Drew Overturf, Kristopher Buchanan, Jeffrey Jensen, Carlos Flores-Molina, Sara Wheeland, Gregory H. Huff:
Investigation of beamforming patterns from volumetrically distributed phased arrays. 817-822 - Robert Mitchell, Elizabeth Walkup:
Further refinements to the foundations of cyber zone defense. 823-828 - Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
3-Way game model for privacy-preserving cybersecurity information exchange framework. 829-834 - Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, John M. Shea, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. 835-840 - Alan J. Michaels, Matthew Meadows, Joseph M. Ernst:
PRNG sequence combination techniques via Galois extension fields. 841-845 - Jaeyoung Choi, Yung Yi:
Joint optimization of emergency and periodic message transmissions in vehicular networks. 846-851 - Chenchen Liu, Tiejun Lv, Weijun Tang, Hui Gao, Yueming Lu:
On the performance of mode selection for hybrid-duplex D2D communications. 852-857 - Sohraab Soltani, Yalin E. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas:
Joint network coding and backpressure algorithm for cognitive radio networks. 858-863 - Vikas Bollapragada Subrahmanya, Harlan B. Russell:
RMTS-a: A scheduling based MAC protocol with frame aggregation for multi-rate radios in an Ad Hoc network. 864-869 - Joakim Johanson Lindquister, Frank T. Johnsen, Trude Hafsoe Bloebaum:
Proxy pair optimizations for increased service reliability in DIL networks. 870-875 - Joel Anderson, Jin-Hee Cho:
Software Defined Network Based Virtual Machine Placement in Cloud Systems. 876-881 - Warren Smith, Greg Kuperman, Michael Chan, Eric Morgan, Huy Nguyen, Nabil Schear, Bich Vu, Andrew J. Weinert, Matthew Weyant, Daniel Whisman:
Cloud computing in tactical environments. 882-887 - Romain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent:
Channel estimation and equalization for CPM with application for aeronautical communications via a satellite link. 888-893 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:
Outage probability analysis of the Protected Tactical Waveform (PTW) on the return link. 894-899 - Xian Liu:
A secrecy model in satellite fading channels. 900-905
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.