Search alternatives:
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
codes » code (Expand Search), modes (Expand Search), comes (Expand Search)
pore » more (Expand Search)
years » year (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
codes » code (Expand Search), modes (Expand Search), comes (Expand Search)
pore » more (Expand Search)
years » year (Expand Search)
-
181
Multiuser detection and code timing estimation for CDMA systems
Published 2008“…It covers two different research areas: near-far resistant multiuser detection and robust code timing estimation.…”
Get full text
Thesis -
182
Bit allocation techniques for video coding and broadcasting applications
Published 2013“…Bit allocation is a classical problem in video coding and it plays an essential role in achieving better coding efficiency and better visual quality. …”
Get full text
Thesis -
183
Lattice code design for the Rayleigh fading wiretap channel
Published 2011“…It has been shown recently that coding for the Gaussian Wire tap Channel can be done with nested lattices. …”
Get full text
Get full text
Conference Paper -
184
China and the South China Sea : time for code of conduct?
Published 2012“…The region urgently needs a Code of Conduct that is specifically designed for the prevention of armed conflict in the disputed areas.…”
Get full text
Get full text
Commentary -
185
-
186
Hippocampal neurons code individual episodic memories in humans
Published 2023“…However, how human hippocampal single neurons code multi-element associations remains unknown. …”
Journal article -
187
The teaching peer-review process (TPRP) resource pack: the quick ‘how to’ guide for educators seeking to develop their practice
Published 2024“…In recent years, the quality of teaching at London Metropolitan University (LMU) has been highly ranked. …”
Get full text
Monograph -
188
Does negative parenting behavior lead to later peer victimization? A longitudinal co-twin control study
Published 2024“…At the population level, exposure to negative parenting behavior was associated with increased likelihood of peer victimization (5-year-old: Beta=0.03, 95% confidence interval [CI] = 0.01–0.05; 11-year-old: Beta=0.02, 95% CI =0.01, 0.03). …”
Journal article -
189
Broadcasting in Asia : twenty-five years from now
Published 2008Get full text
Get full text
Conference Paper -
190
15 years of Adjoint Algorithmic Differentiation (AAD) in finance
Published 2024“…In this paper, we provide a tutorial of this technique, illustrate how it is immediately applicable for Monte Carlo and Partial Differential Equations applications, the two main numerical techniques used for option pricing, and review the most significant literature in quantitative finance of the past fifteen years.…”
Journal article -
191
-
192
-
193
Applying population mechanistic modelling to find determinants of CAR-T dynamics in month-one lymphoma patients -- Dataset
Published 2024“…Supplementary Dataset for the paper:<br> Applying population mechanistic modelling to find determinants of CAR-T dynamics in month-one lymphoma patients…”
Dataset -
194
Do you know what I'm thinking about? Examining children's mental states understanding in conversations with peers.
Published 2010“…The present study investigates theory of mind (ToM) development in bilingual children. Fifteen 3-year-old and seventeen 5-year-old Singaporean bilingual children were recruited from a local childcare centre. …”
Get full text
Final Year Project (FYP) -
195
Lattice Encoding of Cyclic Codes from Skew-polynomial Rings
Published 2015“…We propose a construction of lattices from cyclic codes from skew-polynomial rings. This construction may be seen as a variation of Construction A of lattices from linear codes, obtained from quotients of orders in cyclic division algebras. …”
Get full text
Get full text
Conference Paper -
196
On the algebraic structure of quasi-cyclic codes IV : repeated roots
Published 2013“…A trace formula for quasi-cyclic codes over rings of characteristic not coprime with the co-index is derived. …”
Get full text
Get full text
Journal Article -
197
QR code security authentication attendance system (part I)
Published 2023“…With the advancement in technology, QR code seem to be an efficient solution for attendance taking. …”
Get full text
Final Year Project (FYP) -
198
Blind detection of interlever parameters for block and convolutional coded sequences
Published 2012“…Blind detection of the interleaver period and the code rate becomes crucial.…”
Get full text
Final Year Project (FYP) -
199
Code auto-completion by intelligent auto-copy-paste-modify
Published 2014“…Developers often find a code snippet online and implement it in their own program. …”
Get full text
Final Year Project (FYP) -
200
Secure code execution on cloud-based infrastructure with application containers
Published 2017“…Working with source code wrote by others is always a challenging task. …”
Get full text
Final Year Project (FYP)