Department of Electrical and Information Technology
5151 – 5200 of 5358
- show: 50
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 1992
-
Mark
The inverse scattering problem for a homogeneous bi-isotropic slab using transient data
1992) In Technical Report LUTEDX/(TEAT-7022)/1-13/(1992)(
- Book/Report › Report
-
Mark
Implementation of a Digital MF-Filter
1992) Nordic Radio Symposium 1992 (NRS´92)(
- Contribution to conference › Paper, not in proceeding
-
Mark
Signal Displacement and Signal Loss in MR Imaging due to Small Metallic Implants
1992)(
- Book/Report › Report
-
Mark
Transient wave propagation in composite media: A Green functions approach
1992) In Technical Report LUTEDX/(TEAT-7021)/1-24/(1992)(
- Book/Report › Report
-
Mark
Model-Based Fault Diagnosis Using MFM
1992) IFAC Symposium on On-Line Fault Detection and Supervision in the Chemical Process Industries, 1992(
- Contribution to conference › Paper, not in proceeding
-
Mark
A generalized matched filter and its applications
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Transient wave propagation in reciprocal bi-isotropic media at oblique incidence
1992) In Technical Report LUTEDX/(TEAT-7019)/1-25/(1992)(
- Book/Report › Report
-
Mark
Non-reflecting dispersive media
1992) In Technical Report LUTEDX/(TEAT-7020)/1-12/(1992)(
- Book/Report › Report
-
Mark
Model-Based Measurement Validation Using MFM
1992) IFAC Symposium on On-Line Fault Detection and Supervision in the Chemical Process Industries, 1992(
- Contribution to conference › Paper, not in proceeding
-
Mark
Transient Electromagnetic Wave Propagation in Anisotropic Dispersive Media
1992) In Technical Report LUTEDX/(TEAT-7023)/1-23/(1992)(
- Book/Report › Report
-
Mark
Kan Searle tänka?
1992) In Filosofisk tidskrift(
- Contribution to journal › Article
-
Mark
Modelling of waveform deformation and time-of-flight estimation, with application to the ultrasonic pulse-echo method
(
- Contribution to conference › Paper, not in proceeding
-
Mark
A CMOS VLSI Cell Library for Digital Signal Processing
1992)(
- Thesis › Licentiate thesis
-
Mark
Minimization of the chromatic dispersion over a broad wavelength range in a single-mode optical fiber
1992) In Technical Report LUTEDX/(TEAT-7018)/1-15/(1992)(
- Book/Report › Report
-
Mark
Implementation of a system for validation of algoritms used in digital radio communication schemes
(
- Contribution to conference › Paper, not in proceeding
-
Mark
On the invariance of the general constraint lengths
1992) Workshop on Information Theory(
- Contribution to conference › Paper, not in proceeding
-
Mark
Transient wave propagation in a reciprocal bi-isotropic media at oblique incidence
1992) International Symposium on Electromagnetic Theory, 1992(
- Contribution to conference › Paper, not in proceeding
-
Mark
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound
(
- Contribution to journal › Article
- 1991
-
Mark
Method of moments and the use of multipole expansion
(
- Contribution to journal › Article
-
Mark
Knowledge-Based Real-Time Control Systems : IT4 Project: Phase II
1991)(
- Book/Report › Book
-
Mark
Konsten att datorisera ett bibliotek utan att egentligen anstränga sig
1991) In Biblioteksbladet(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Strengthening Simmon's bound on impersonation
(
- Contribution to journal › Article
-
Mark
Overload control of SPC systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Direct and inverse scattering problems in dispersive media - Green's functions and invariant imbedding techniques
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
On overload control of high-speed switching nodes
1991) NATO Advanced Research Workshop on Architecture and Performance Issues of High-Capacity Local and Metropolitan Area Networks 72. p.423-438(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Model-Based Alarm Analysis Using MFM
1991) In Technical Reports TFRT-7470(
- Book/Report › Report
-
Mark
Source and Channel Coding: An Algorithmic Approach
1991)(
- Book/Report › Book
-
Mark
Controller synthesis for application specific digital signal processors
1991)(
- Thesis › Licentiate thesis
-
Mark
Three-dimensional subterranean target identification by use of optimization techniques
1991) In Technical Report LUTEDX/(TEAT-7013)/1-20/(1991)(
- Book/Report › Report
-
Mark
Model-Based Alarm Analysis Using MFM
1991) 3rd IFAC International Workshop on Artificial Intelligence in Real-Time Control(
- Contribution to conference › Paper, not in proceeding
-
Mark
A linear algebra approach to minimal convolutional encoders
1991) International Winter Meeting on Coding and Information Theory, 1991(
- Contribution to conference › Paper, not in proceeding
-
Mark
A construction of authentication codes with total secrecy
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Registration of surface structures using airborne focused ultrasound
(
- Contribution to journal › Article
-
Mark
Moment-method calculations on multiple apertures using singular basis functions
1991) In Technical Report LUTEDX/(TEAT-7017)/1-29/(1991),(
- Book/Report › Report
-
Mark
Moment-method calculations of scattering by a square plate using singular basis functions and multipole expansions
1991) In Technical Report LUTEDX/(TEAT-7014)/1-28/(1991),(
- Book/Report › Report
-
Mark
Model-Based Fault Diagnosis Using MFM
1991) SAIS '91(
- Contribution to conference › Paper, not in proceeding
-
Mark
An Expert System Interface for an Identification Program
(
- Contribution to journal › Article
-
Mark
Scattering of transient electromagnetic waves in reciprocal bi-isotropic media
1991) In Technical Report LUTEDX/(TEAT-7015)/1-17/(1991)(
- Book/Report › Report
-
Mark
Strengthening Simmons' bound on impersonation
1991) Fifth Joint Soviet-Swedish International Workshop on Information Theory: Convolutional Codes; Multi-User Communication(
- Contribution to conference › Paper, not in proceeding
-
Mark
Submodules of F[x]^n and convolutional codes
1991) First China-Japan International Symposium on Ring Theory(
- Contribution to conference › Paper, not in proceeding
-
Mark
Controller synthesis for application specific digital signal processors
1991) Fourth Annual IEEE International ASIC Conference and Exhibit(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Estimating the computational cut-off rate for the Gilbert-Elliott channel
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Controller synthesis for digital signal processors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Wave splitting and imbedding equations for a spherically symmetric dispersive medium
1991) In Technical Report LUTEDX/(TEAT-7012)/1-13/(1991)(
- Book/Report › Report
-
Mark
Estimating the computational cut-off rate for the Gilbert-Elliott channel
1991) Fifth Joint Soviet-Swedish International Workshop on Information Theory: Convolutional Codes; Multi-User Communication(
- Contribution to conference › Paper, not in proceeding
-
Mark
Time-domain wave splitting of Maxwell's equations
1991) In Technical Report LUTEDX/(TEAT-7016)/1-25/(1991)(
- Book/Report › Report
-
Mark
A lower bound on the probability of deception in multiple authentication
1991) 1991 IEEE International Symposium on Information Theory, ISIT 1991 In IEEE International Symposium on Information Theory - Proceedings p.180-180(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On a fast correlation attack on certain streaxn ciphers
1991) Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1991 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 547 LNCS. p.176-185(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1990
-
Mark
Knowledge-Based Real-Time Control Systems : IT4 Project: Phase I
1990)(
- Book/Report › Book