Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Pierre Gérard, Olivier Sigaud |
Designing Efficient Exploration with MACS: Modules and Function Approximation. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
73 | Kelvin Sim, Vivekanand Gopalkrishnan, Hon Nian Chua, See-Kiong Ng |
MACs: Multi-Attribute Co-clusters with High Correlation Information. |
ECML/PKDD (2) |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Differentially-uniform permutation, MAC, Block cipher, AES |
73 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Threshold MACs. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
67 | Michel Abdalla, Chanathip Namprempre, Gregory Neven |
On the (Im)possibility of Blind Message Authentication Codes. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
blind MACs, provable security, blind signatures |
67 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
61 | Michael Semanko |
L-collision Attacks against Randomized MACs. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
L-collision, MACs, randomness, message authentication codes, birthday attacks |
60 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 |
Towards Secure and Practical MACs for Body Sensor Networks. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Albrecht Schmidt 0001 |
Engineering interactive ubiquitous computing systems. |
EICS |
2011 |
DBLP DOI BibTeX RDF |
|
53 | John Black, Martin Cochran |
MAC Reforgeability. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Message Authentication Codes, Birthday Attacks |
53 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
51 | |
Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005 |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Marius Marin, Leon Moonen, Arie van Deursen |
An approach to aspect refactoring based on crosscutting concern types. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Xiaoqing Wu, Barrett R. Bryant, Jeff Gray 0001, Marjan Mernik |
Pattern transformation for two-dimensional separation of concerns. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Wesley Coelho, Gail C. Murphy |
ActiveAspect: presenting crosscutting structure. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed |
Separating architectural concerns to ease program understanding. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Martin P. Robillard, Gail C. Murphy |
Just-in-time concern modeling. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Juri Memmert |
Concern patterns and analysis. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Mazen Saleh, Hassan Gomaa |
Separation of concerns in software product line engineering. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr |
Concern modeling in the concern manipulation environment. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Haitham S. Hamza |
Separation of concerns for evolving systems: a stability-driven approach. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Annie T. T. Ying, James L. Wright, Steven Abrams |
An exploration of how comments are used for marking related code fragments. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Jing Zhang 0003, Jeff Gray 0001, Yuehua Lin |
A model-driven approach to enforce crosscutting assertion checking. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Robert R. Painter, David Coppit |
A model for software plans. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Jing (Janet) Liu, Robyn R. Lutz, Jeffrey M. Thompson |
Mapping concern space to software architecture: a connector-based approach. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | David Shepherd, Lori L. Pollock, Tom Tourwé |
Using language clues to discover crosscutting concerns. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | José Juan Pazos-Arias, Jorge García Duque, Martín López Nores |
Locating crosscutting concerns in the formal specification of distributed reactive systems. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Naoyasu Ubayashi, Tetsuo Tamai |
Concern management for constructing model compilers. |
MACS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Fatiha Elghibari, Rachid Elouahbi, Fatima El Khoukhi, Layla Ezzahri, Labo Macs, Said Amali |
Intelligent model for measuring learners' satisfaction towards new contents. |
ITHET |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
46 | Kan Yasuda |
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension |
46 | Ueli M. Maurer, Johan Sjödin |
Single-Key AIL-MACs from Any FIL-MAC. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC) |
46 | Olivier Sigaud, Thierry Gourdin, Pierre-Henri Wuillemin |
Improving MACS Thanks to a Comparison with 2TBNs. |
GECCO (2) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Jee Hea An, Mihir Bellare |
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
46 | Bart Preneel, Paul C. van Oorschot |
MDx-MAC and Building Fast MACs from Hash Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
40 | Shengtian Yang, Yan Chen, Peiliang Qiu |
Linear-Codes-Based Lossless Joint Source-Channel Coding for Multiple-Access Channels. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Junichi Hoshino, Katsutoki Hamana, Shiratori Kazuto, Atsushi Nakano |
Distributed Episode Control System for Interactive Narrative Entertainment. |
ICEC |
2009 |
DBLP DOI BibTeX RDF |
narrative entertainment, massive action, episode tree, lifelike |
40 | Graciela Corral-Briones, Mario Rafael Hueda, Carmen E. Rodríguez |
Joint multiuser equalization and Group decoding for asynchronous trellis-coded multiple-access channels. |
IEEE Trans. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Anne Frenkel, Hamideh Afsarmanesh, Gert B. Eijkel, Louis O. Hertzberger |
Information Management for Material Science Applications in a Virtual Laboratory. |
DEXA |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Shingo Sato, Shoichi Hirose, Junji Shikata |
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. |
J. Internet Serv. Inf. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Shingo Sato, Shoichi Hirose, Junji Shikata |
Generic Construction of Sequential Aggregate MACs from Any MACs. |
ProvSec |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Kan Yasuda |
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension |
33 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
33 | Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu |
Security of Truncated MACs. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability |
33 | Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi, Allen Clement |
Matrix Signatures: From MACs to Digital Signatures in Distributed Systems. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Yevgeniy Dodis, Krzysztof Pietrzak |
Improving the Security of MACs Via Randomized Message Preprocessing. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Martin P. Robillard |
Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005). |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
separation of concerns, software modeling, software analysis |
33 | Ueli M. Maurer, Johan Sjödin |
Domain Expansion of MACs: Alternative Uses of the FIL-MAC. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC) |
33 | Martin P. Robillard, Peri L. Tarr |
First international workshop on the modeling and analysis of concerns in software (MACS 2005). |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
separation of concerns, software modeling, software analysis |
33 | Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway |
Improved Security Analyses for CBC MACs. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Antoine Joux, Guillaume Poupard, Jacques Stern |
New Attacks against Standardized MACs. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Karl Brincat, Chris J. Mitchell |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
cryptographic API, cryptanalysis, Message Authentication Code |
33 | Mihir Bellare, Roch Guérin, Phillip Rogaway |
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
27 | Di Ma, Gene Tsudik |
A new approach to secure logging. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack |
27 | Di Ma, Gene Tsudik |
A New Approach to Secure Logging. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
secure logging, forward secure stream integrity, MACs, signatures, truncation attack |
27 | Yevgeniy Dodis, Prashant Puniya |
Feistel Networks Made Public, and Applications. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network |
27 | Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Security Amplification for InteractiveCryptographic Primitives. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Rodrigo Martins da Silva, Nadia Nedjah, Luiza de Macedo Mourelle |
Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks Using Fractional Fixed Point Representation. |
ICANN (1) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Yi Hong 0001, Emanuele Viterbo |
Algebraic multiuser space-time block codes for 2 × 2 MIMO. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Abner Corrêa Barros, Victor Wanderley Costa de Medeiros, Viviane Lucy Santos de Souza, Paulo Sérgio Brandão do Nascimento, Ângelo Mazer, João Paulo Fernandes Barbosa, Bruno P. Neves, Ismael Santos 0001, Manoel Eusébio de Lima |
Implementation of a double-precision multiplier accumulator with exception treatment to a dense matrix multiplier module in FPGA. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
FPGA, scientific computing, floating-point, HPC |
27 | Jonathan M. Dixon, Ryan Thomas Sharpe |
Doing more with mini. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
intel mac, parallels, virtualization |
27 | Ming Yang 0003, Zhou Kang, Lishan Kang |
A Parallel Multi-algorithm Solver for Dynamic Multi-Objective TSP (DMO-TSP). |
ICIC (2) |
2008 |
DBLP DOI BibTeX RDF |
dynamic multi-objective TSP, parallel multi-algorithm, Pareto optimal front |
27 | Ananth Rao, Ion Stoica |
Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless Networks. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Byung Hee Kim, Tae Ho Cho |
Efficient selection method of message authentication codes for filtering scheme in sensor networks. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
fabricated report, sensor network, message authentication code |
27 | Jonathan Katz, Andrew Y. Lindell |
Aggregate Message Authentication Codes. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Nadia Nedjah, Rodrigo Martins da Silva, Luiza de Macedo Mourelle, Marcus Vinícius Carvalho da Silva |
Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks. |
ICANN (2) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ivana Maric, Roy D. Yates, Gerhard Kramer |
Capacity of Interference Channels With Partial Transmitter Cooperation. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Carol Currie Sobczak, James Kessler, David Eldridge |
The dual os classroom: if you build it, will they come? |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
boot camp, deep freeze, intel dual core, winbatch, parallels, imaging, deployment, support, classroom technology |
27 | Gautam A. Gupta, Stavros Toumpis |
Power Allocation Over Parallel Gaussian Multiple Access and Broadcast Channels. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yu Liu, Charles G. Boncelet Jr. |
The CRC-NTMAC for Noisy Message Authentication. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Md. Abdul Hamid, Mustafizur Rahman 0001, Choong Seon Hong |
Energy Conserving Security Mechanism for Wireless Sensor Network. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jens-Peter Kaps, Kaan Yüksel, Berk Sunar |
Energy Scalable Universal Hashing. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
scalability, low-power, provable security, low-energy, message authentication codes, Universal hashing |
27 | Fan Ye 0003, Haiyun Luo, Songwu Lu, Lixia Zhang 0001 |
Statistical en-route filtering of injected false data in sensor networks. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Simon R. Blackburn, Kenneth G. Paterson |
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox |
27 | Marc Fischlin |
Progressive Verification: The Case of Message Authentication: (Extended Abstract). |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
27 | R. Luo, Demetrios Belis, R. M. Edwards 0001, Gordon A. Manson |
A simulation design for link connection-oriented wireless mesh networks. |
MWCN |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Rinku Rani Das, Rajalekshmi TR, Sruthi Pallathuvalappil, Alex Pappachen James |
FETs for Analog Neural MACs. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Yusuke Naito 0001 |
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Yihan Zhang 0001 |
Zero-Error Communication Over Adversarial MACs. |
IEEE Trans. Inf. Theory |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gangadhar Karevvanavar, Rajshekhar V. Bhat |
Importance-Aware Fresh Delivery of Versions over Energy Harvesting MACs. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Soshi Shimada, Franziska Mueller 0001, Jan Bednarík, Bardia Doosti, Bernd Bickel, Danhang Tang, Vladislav Golyanik, Jonathan Taylor 0001, Christian Theobalt, Thabo Beeler |
MACS: Mass Conditioned 3D Hand and Object Motion Synthesis. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Vitaly Kiryukhin |
About "k-bit security" of MACs based on hash function Streebog. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser |
Putting the Online Phase on a Diet: Covert Security from Short MACs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 |
Quantum Attacks on Beyond-Birthday-Bound MACs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl |
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 |
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Jiehui Nan, Honggang Hu, Ping Zhang 0020, Yiyuan Luo |
Quantum attacks against BBB secure PRFs or MACs built from public random permutations. |
Quantum Inf. Process. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 |
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. |
ASIACRYPT (3) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Peihong Yuan, Ken R. Duffy, Muriel Médard |
Time-Shift Coding for Uncoordinated MACs. |
LATINCOM |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser |
Putting the Online Phase on a Diet: Covert Security from Short MACs. |
CT-RSA |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Melissa Chase, F. Betül Durak, Serge Vaudenay |
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs. |
CRYPTO (2) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gholamreza Ramezan, Manvir Schneider, Mel McCann |
MACS: A Multi-Asset Coin Selection Algorithm for UTXO-based Blockchains. |
Blockchain |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Brauchle, Veronika Gstaiger, Seyed Majid Azimi, Manuel Muehlhaus, Florian Nikodem, Patrick Dern, Derek Griffith |
MACS-HAP: Design and Image Processing Features of the DLR HAP Camera System. |
IGARSS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Vasileios Asteriou, Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Georgios Papadimitriou 0001, Petros Nicopolitidis |
LoRaWAN-Based Adaptive MACs for Event Response Applications. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Mehrasa Ahmadipour, Michèle A. Wigger, Mari Kobayashi |
Coding for Sensing: An Improved Scheme for Integrated Sensing and Communication over MACs. |
CoRR |
2022 |
DBLP BibTeX RDF |
|