Search

Your search keyword '"Communications Numériques (COMNUM)"' showing total 413 results

Search Constraints

Start Over You searched for: Author "Communications Numériques (COMNUM)" Remove constraint Author: "Communications Numériques (COMNUM)"
413 results on '"Communications Numériques (COMNUM)"'

Search Results

1. Side-Channel Expectation-Maximization Attacks

2. Kissing number of codes: A survey

3. Partie 1 : La technologie 5G

4. La véritable (et méconnue) théorie de l'information de Shannon

5. Estimation of the Ricean $K$ Factor in the Presence of Shadowing

6. Cache-Aided Polar Coding: From Theory to Implementation

7. Receiver-Based Experimental Estimation of Power Losses in Optical Networks

8. Cooperative Encoding and Decoding of Mixed Delay Traffic under Random-User Activity

9. Linear Programming Bounds on the Kissing Number of q-ary Codes

10. Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

11. Towards Finding Best Linear Codes for Side-Channel Protections

12. Priority-Resource-Limited JT-CoMP Scheme for Small Dense Networks

13. SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks

14. This is IT: A Primer on Shannon’s Entropy and Information

15. Bent Sequences over Hadamard Codes for Physically Unclonable Functions

16. Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret

17. Estimation de pertes de puissances pour les réseaux optiques

18. Information Leakages in Code-based Masking: A Unified Quantification Approach

19. Snake: A Stochastic Proximal Gradient Algorithm for Regularized Problems Over Large Graphs

20. Best Information is Most Successful

21. Blind Neural Belief Propagation Decoder for Linear Block Codes

22. Smart Antenna Assignment is Essential in Full-Duplex Communications

23. En phase et quadrature

24. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks

25. Variations on a Theme by Massey

26. BAYESIAN NODE CLASSIFICATION FOR NOISY GRAPHS

27. Designs in finite metric spaces: a probabilistic approach

28. Power allocation in Uplink Multiband Satellite System with Nonlinearity-Aware Receiver

29. Cache Updating Strategy Minimizing the Age of Information with Time-Varying Files’ Popularities

30. Persistent Fault Analysis with Few Encryptions

31. Sum-capacity of Uplink Multiband Satellite Communications with Nonlinear Impairments

32. KM Learning for Millimeter-Wave Beam Alignment and Tracking: Predictability and Interpretability

33. Benefits of Local Cooperation in Sectorized Cellular Networks under a Complexity Constraint

34. Distributed DNN based Processing for Uplink Could- RAN

35. A Primer on Alpha-Information Theory with Application to Leakage in Secrecy Systems

36. Dual Optimization for Kolmogorov Model Learning Using Enhanced Gradient Descent

37. Bayesian Information Gain to Design Interaction

38. Information theoretic distinguishers for timing attacks with partial profiles: Solving the empty bin issue

39. A feedback information-theoretic transmission scheme (FITTS) for modeling trajectory variability in aimed movements

40. Rényi Entropy Power and Normal Transport

41. Precoding in Massive MU-MIMO Systems Based on New CSI Accuracy Indicator Reporting

42. Sculptissimo

43. Sculptissimo

44. Sculptissimo

45. Sculptissimo

46. Sculptissimo

47. On the decoding of Barnes-Wall lattices

48. How Relevant is Hick's Law for HCI?

49. Rényi Entropy Estimation for Secure Silicon Fingerprints

50. Multiplexing Gains under Mixed-Delay Constraints on Wyner’s Soft-Handoff Model

Catalog

Books, media, physical & digital resources