The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Information Theory
1984, volume: 30, number: 4

  1. Dilip V. Sarwate
    In Memoriam: Robert Tienwen Chien (1931-1983). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:583-586 [Journal]
  2. Don Coppersmith
    Fast evaluation of logarithms in fields of characteristic two. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:587-593 [Journal]
  3. Andrew M. Odlyzko
    Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:594-600 [Journal]
  4. Yvo Desmedt, Joos Vandewalle, René Govaerts
    A critical analysis of the security of knapsack public-key algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:601-610 [Journal]
  5. Tuvi Etzion, Abraham Lempel
    On the distribution of de Bruijn sequences of given complexity. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:611-614 [Journal]
  6. Aaron D. Wyner, Henry J. Landau
    Optimum waveform signal sets with amplitude and energy constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:615-622 [Journal]
  7. Lawrence H. Ozarow
    The capacity of the white Gaussian multiple access channel with feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:623-628 [Journal]
  8. Jorma Rissanen
    Universal coding, information, prediction, and estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:629-636 [Journal]
  9. Philippe Piret
    Multiple-word correcting convolutional codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:637-643 [Journal]
  10. Patrick Dewilde, Harry Dym
    Lossless inverse scattering, digital filters, and estimation theory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:644-661 [Journal]
  11. Philippe Delsarte, Y. Kamp
    Relationship between the Karhunen-Loéve transform and the Courant-Fischer theorem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:662-0 [Journal]
  12. Jørn Justesen, Tom Høholdt
    Maxentropic Markov chains. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:665-0 [Journal]
  13. Lawrence H. Ozarow, Sik K. Leung-Yan-Cheong
    An achievable region and outer bound for the Gaussian broadcast channel with feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:667-0 [Journal]
  14. Nelson M. Blachman
    The continued fraction as an information source. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:671-0 [Journal]
  15. Cheng-Tie Chen, Saleem A. Kassam
    Robust Wiener filtering for multiple inputs with channel distortion. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:674-0 [Journal]
  16. Wojciech J. Kolodziej, Ronald R. Mohler
    Analysis of a new nonlinear filter and tracking methodology. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:677-0 [Journal]
  17. Erdal Arikan
    Some complexity results about packet radio networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:681-0 [Journal]
  18. Dilip V. Sarwate
    An upper bound on the aperiodic autocorrelation function for a maximal-length sequence. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:685-0 [Journal]
  19. Thomas J. Ferguson, J. H. Rabinowitz
    Self-synchronizing Huffman codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:687-0 [Journal]
  20. T. Berger
    Review of Information Theory: Coding Theorems for Discrete Memoryless Systems (Csiszár, I., and Körner, J.; 1981). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:693-0 [Journal]
  21. Eric Dubois, Amar Mitiche
    Review of 'Digital Picture Processing, ' 2nd edn. (Rosenfeld, A., and Kak, A.C.; 1982). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:694- [Journal]
  22. Neil J. A. Sloane
    Review of 'Secure Communications and Asymmetric Cryptosystems' (Simmons, G.J., Ed.; 1982). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:694-0 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002