callback( { "result":{ "query":":facetid:toc:\"db/conf/isspit/isspit2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.15" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"86", "@dc":"86", "@oc":"86", "@id":"43409855", "text":":facetid:toc:db/conf/isspit/isspit2013.bht" } }, "hits":{ "@total":"86", "@computed":"86", "@sent":"86", "@first":"0", "hit":[{ "@score":"1", "@id":"4194864", "info":{"authors":{"author":[{"@pid":"97/5641","text":"Valentine A. Aalo"},{"@pid":"94/2721","text":"Kostas P. Peppas"},{"@pid":"66/2371","text":"George P. Efthymoglou"},{"@pid":"05/10823","text":"Mohammed Alwakeel"},{"@pid":"15/10892","text":"Sami S. Alwakeel"}]},"title":"Performance of CA-CFAR receivers in alpha-stable clutter.","venue":"ISSPIT","pages":"130-134","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AaloPEAA13","doi":"10.1109/ISSPIT.2013.6781867","ee":"https://doi.org/10.1109/ISSPIT.2013.6781867","url":"https://dblp.org/rec/conf/isspit/AaloPEAA13"}, "url":"URL#4194864" }, { "@score":"1", "@id":"4194865", "info":{"authors":{"author":[{"@pid":"143/9118","text":"Nimisha Agarwal"},{"@pid":"143/9006-2","text":"Ayush Kumar 0002"},{"@pid":"125/2492","text":"Juhi Bhadviya"},{"@pid":"74/5676","text":"Giovanni Ramponi"}]},"title":"Effects of different prediction schemes on lossless invisible watermarking.","venue":"ISSPIT","pages":"64-68","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AgarwalKBR13","doi":"10.1109/ISSPIT.2013.6781855","ee":"https://doi.org/10.1109/ISSPIT.2013.6781855","url":"https://dblp.org/rec/conf/isspit/AgarwalKBR13"}, "url":"URL#4194865" }, { "@score":"1", "@id":"4194866", "info":{"authors":{"author":[{"@pid":"144/1135","text":"Mohsen Ahangar"},{"@pid":"130/7869","text":"Mostafa Ghorbandoost"},{"@pid":"79/7884","text":"Hamid Sheikhzadeh"},{"@pid":"27/338","text":"Kaamran Raahemifar"},{"@pid":"130/7887","text":"Abdoreza Sabzi Shahrebabaki"},{"@pid":"130/7889","text":"Jamal Amini"}]},"title":"Voice conversion based on State Space Model and considering global variance.","venue":"ISSPIT","pages":"416-421","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AhangarGSRSA13","doi":"10.1109/ISSPIT.2013.6781917","ee":"https://doi.org/10.1109/ISSPIT.2013.6781917","url":"https://dblp.org/rec/conf/isspit/AhangarGSRSA13"}, "url":"URL#4194866" }, { "@score":"1", "@id":"4194867", "info":{"authors":{"author":[{"@pid":"27/7514","text":"Raja Naeem Akram"},{"@pid":"m/ConstantinosMarkantonakis","text":"Konstantinos Markantonakis"}]},"title":"Smart cards: State-of-the-art to future directions.","venue":"ISSPIT","pages":"154-162","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AkramM13","doi":"10.1109/ISSPIT.2013.6781871","ee":"https://doi.org/10.1109/ISSPIT.2013.6781871","url":"https://dblp.org/rec/conf/isspit/AkramM13"}, "url":"URL#4194867" }, { "@score":"1", "@id":"4194868", "info":{"authors":{"author":[{"@pid":"11/9179","text":"Masuma Akter"},{"@pid":"117/1912","text":"Andrew J. Lambert"},{"@pid":"75/4744","text":"Mark R. Pickering"},{"@pid":"01/10772","text":"Jennie M. Scarvell"},{"@pid":"124/7187","text":"Paul N. Smith"}]},"title":"A non-invasive method for kinematic analysis of knee joints.","venue":"ISSPIT","pages":"386-391","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AkterLPSS13","doi":"10.1109/ISSPIT.2013.6781912","ee":"https://doi.org/10.1109/ISSPIT.2013.6781912","url":"https://dblp.org/rec/conf/isspit/AkterLPSS13"}, "url":"URL#4194868" }, { "@score":"1", "@id":"4194869", "info":{"authors":{"author":[{"@pid":"140/7607","text":"Maha Alodeh"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Data aware user selection in cognitive downlink MISO precoding systems.","venue":"ISSPIT","pages":"356-361","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AlodehCO13","doi":"10.1109/ISSPIT.2013.6781907","ee":"https://doi.org/10.1109/ISSPIT.2013.6781907","url":"https://dblp.org/rec/conf/isspit/AlodehCO13"}, "url":"URL#4194869" }, { "@score":"1", "@id":"4194870", "info":{"authors":{"author":[{"@pid":"130/7889","text":"Jamal Amini"},{"@pid":"130/7887","text":"Abdoreza Sabzi Shahrebabaki"},{"@pid":"135/9040","text":"Navid Shokouhi"},{"@pid":"79/7884","text":"Hamid Sheikhzadeh"},{"@pid":"27/338","text":"Kaamran Raahemifar"},{"@pid":"144/0887","text":"Mehdi Eslami"}]},"title":"Speech analysis/synthesis by Gaussian mixture approximation of the speech spectrum for voice conversion.","venue":"ISSPIT","pages":"428-433","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AminiSSSRE13","doi":"10.1109/ISSPIT.2013.6781919","ee":"https://doi.org/10.1109/ISSPIT.2013.6781919","url":"https://dblp.org/rec/conf/isspit/AminiSSSRE13"}, "url":"URL#4194870" }, { "@score":"1", "@id":"4194871", "info":{"authors":{"author":[{"@pid":"37/10527","text":"Heyfa Ammar-Badri"},{"@pid":"65/4665","text":"Amel Benazza-Benyahia"}]},"title":"Hierarchical preprocessing for improving the blotch detection performances.","venue":"ISSPIT","pages":"237-242","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/Ammar-BadriB13","doi":"10.1109/ISSPIT.2013.6781886","ee":"https://doi.org/10.1109/ISSPIT.2013.6781886","url":"https://dblp.org/rec/conf/isspit/Ammar-BadriB13"}, "url":"URL#4194871" }, { "@score":"1", "@id":"4194872", "info":{"authors":{"author":[{"@pid":"a/RedaAAmmar","text":"Reda Ammar"},{"@pid":"117/5563","text":"Thérèse Smith"}]},"title":"Developing time constraints in Petri net models of biochemical processes via computation structure modeling.","venue":"ISSPIT","pages":"34-39","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AmmarS13","doi":"10.1109/ISSPIT.2013.6781850","ee":"https://doi.org/10.1109/ISSPIT.2013.6781850","url":"https://dblp.org/rec/conf/isspit/AmmarS13"}, "url":"URL#4194872" }, { "@score":"1", "@id":"4194873", "info":{"authors":{"author":[{"@pid":"144/0914","text":"Forough Arabshahi"},{"@pid":"144/1030","text":"Sadaf Monajemi"},{"@pid":"79/7884","text":"Hamid Sheikhzadeh"},{"@pid":"27/338","text":"Kaamran Raahemifar"},{"@pid":"49/1010","text":"Reza Faraji-Dana"}]},"title":"A frequency domain MVDR beamformer for UWB microwave breast cancer imaging in dispersive mediums.","venue":"ISSPIT","pages":"362-367","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ArabshahiMSRF13","doi":"10.1109/ISSPIT.2013.6781908","ee":"https://doi.org/10.1109/ISSPIT.2013.6781908","url":"https://dblp.org/rec/conf/isspit/ArabshahiMSRF13"}, "url":"URL#4194873" }, { "@score":"1", "@id":"4194874", "info":{"authors":{"author":[{"@pid":"144/0974","text":"Mohammad H. Asghari"},{"@pid":"36/5502","text":"Bahram Jalali"}]},"title":"Image compression using the Anamorphic Stretch Transform.","venue":"ISSPIT","pages":"233-236","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/AsghariJ13","doi":"10.1109/ISSPIT.2013.6781885","ee":"https://doi.org/10.1109/ISSPIT.2013.6781885","url":"https://dblp.org/rec/conf/isspit/AsghariJ13"}, "url":"URL#4194874" }, { "@score":"1", "@id":"4194875", "info":{"authors":{"author":[{"@pid":"144/1001","text":"Mahdia Bakalem"},{"@pid":"124/2487","text":"Nadjia Benblidia"},{"@pid":"92/1142","text":"Samy Ait-Aoudia"}]},"title":"A comparative image auto-annotation.","venue":"ISSPIT","pages":"86-91","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/BakalemBA13","doi":"10.1109/ISSPIT.2013.6781859","ee":"https://doi.org/10.1109/ISSPIT.2013.6781859","url":"https://dblp.org/rec/conf/isspit/BakalemBA13"}, "url":"URL#4194875" }, { "@score":"1", "@id":"4194876", "info":{"authors":{"author":[{"@pid":"124/2155","text":"Haythem Balti"},{"@pid":"e/AdelSaidElmaghraby","text":"Adel Said Elmaghraby"}]},"title":"Speech emotion detection using time dependent self organizing maps.","venue":"ISSPIT","pages":"470-478","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/BaltiE13","doi":"10.1109/ISSPIT.2013.6781926","ee":"https://doi.org/10.1109/ISSPIT.2013.6781926","url":"https://dblp.org/rec/conf/isspit/BaltiE13"}, "url":"URL#4194876" }, { "@score":"1", "@id":"4194877", "info":{"authors":{"author":[{"@pid":"41/1070","text":"Petros S. Bithas"},{"@pid":"33/4608","text":"Athanasios A. Rontogiannis"}]},"title":"Performance analysis of mobile communication networks in the presence of composite fading, noise and interference.","venue":"ISSPIT","pages":"52-57","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/BithasR13","doi":"10.1109/ISSPIT.2013.6781853","ee":"https://doi.org/10.1109/ISSPIT.2013.6781853","url":"https://dblp.org/rec/conf/isspit/BithasR13"}, "url":"URL#4194877" }, { "@score":"1", "@id":"4194878", "info":{"authors":{"author":[{"@pid":"40/8947","text":"Emmanuel Bratsolis"},{"@pid":"33/1940","text":"Sotirios Gyftakis"},{"@pid":"64/779","text":"Eleni Charou"},{"@pid":"00/5783","text":"Nikolaos Vassilas"}]},"title":"Comparative analysis of classification techniques for building block extraction using aerial imagery and LiDAR data.","venue":"ISSPIT","pages":"80-85","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/BratsolisGCV13","doi":"10.1109/ISSPIT.2013.6781858","ee":"https://doi.org/10.1109/ISSPIT.2013.6781858","url":"https://dblp.org/rec/conf/isspit/BratsolisGCV13"}, "url":"URL#4194878" }, { "@score":"1", "@id":"4194879", "info":{"authors":{"author":[{"@pid":"144/0905","text":"Fatih Caglar"},{"@pid":"02/10823","text":"Bulent Cavusoglu"}]},"title":"Rotation invariant features of wavelet transform for texture retrieval.","venue":"ISSPIT","pages":"368-373","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/CaglarC13","doi":"10.1109/ISSPIT.2013.6781909","ee":"https://doi.org/10.1109/ISSPIT.2013.6781909","url":"https://dblp.org/rec/conf/isspit/CaglarC13"}, "url":"URL#4194879" }, { "@score":"1", "@id":"4194880", "info":{"authors":{"author":[{"@pid":"52/4689","text":"Jean-Luc Danger"},{"@pid":"86/2396","text":"Sylvain Guilley"},{"@pid":"37/4331","text":"Philippe Hoogvorst"},{"@pid":"70/11314","text":"Cédric Murdica"},{"@pid":"41/6833","text":"David Naccache"}]},"title":"Dynamic countermeasure against the Zero Power Analysis.","venue":"ISSPIT","pages":"140-147","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/DangerGHMN13","doi":"10.1109/ISSPIT.2013.6781869","ee":"https://doi.org/10.1109/ISSPIT.2013.6781869","url":"https://dblp.org/rec/conf/isspit/DangerGHMN13"}, "url":"URL#4194880" }, { "@score":"1", "@id":"4194881", "info":{"authors":{"author":[{"@pid":"124/2662","text":"Chrysovalantis Datsios"},{"@pid":"65/1103","text":"Georgios Keramidas"},{"@pid":"47/331","text":"Dimitrios N. Serpanos"},{"@pid":"144/1046","text":"P. Soufrilas"}]},"title":"Performance and power trade-offs for cryptographic applications in embedded processors.","venue":"ISSPIT","pages":"92-95","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/DatsiosKSS13","doi":"10.1109/ISSPIT.2013.6781860","ee":"https://doi.org/10.1109/ISSPIT.2013.6781860","url":"https://dblp.org/rec/conf/isspit/DatsiosKSS13"}, "url":"URL#4194881" }, { "@score":"1", "@id":"4194882", "info":{"authors":{"author":[{"@pid":"52/10071","text":"Dionysios Diamantopoulos"},{"@pid":"72/3098","text":"Christoforos E. Economakos"},{"@pid":"s/DimitriosSoudris","text":"Dimitrios Soudris"},{"@pid":"57/5096","text":"George Economakos"}]},"title":"A new design paradigm for floating point DSP applications based on ESL/HLS and FPGAs?","venue":"ISSPIT","pages":"404-409","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/DiamantopoulosESE13","doi":"10.1109/ISSPIT.2013.6781915","ee":"https://doi.org/10.1109/ISSPIT.2013.6781915","url":"https://dblp.org/rec/conf/isspit/DiamantopoulosESE13"}, "url":"URL#4194882" }, { "@score":"1", "@id":"4194883", "info":{"authors":{"author":[{"@pid":"89/4888","text":"Christos Douligeris"},{"@pid":"47/331","text":"Dimitrios Serpanos"}]},"title":"Welcome message from the general co-chairs.","venue":"ISSPIT","pages":"21","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/DouligerisS13","doi":"10.1109/ISSPIT.2013.6781848","ee":"https://doi.org/10.1109/ISSPIT.2013.6781848","url":"https://dblp.org/rec/conf/isspit/DouligerisS13"}, "url":"URL#4194883" }, { "@score":"1", "@id":"4194884", "info":{"authors":{"author":[{"@pid":"68/8106","text":"Mamdouh F. Fahmy"},{"@pid":"17/4591","text":"Gamal Fahmy"},{"@pid":"22/8106","text":"Omar M. Fahmy"}]},"title":"Image enhancement using E-spline functions.","venue":"ISSPIT","pages":"261-266","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FahmyFF13","doi":"10.1109/ISSPIT.2013.6781890","ee":"https://doi.org/10.1109/ISSPIT.2013.6781890","url":"https://dblp.org/rec/conf/isspit/FahmyFF13"}, "url":"URL#4194884" }, { "@score":"1", "@id":"4194885", "info":{"authors":{"author":[{"@pid":"17/4591","text":"Gamal Fahmy"},{"@pid":"12/248","text":"Marc Ihle"}]},"title":"B-spline based perfect reconstruction of non band limited noisy signals.","venue":"ISSPIT","pages":"175-179","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FahmyI13","doi":"10.1109/ISSPIT.2013.6781875","ee":"https://doi.org/10.1109/ISSPIT.2013.6781875","url":"https://dblp.org/rec/conf/isspit/FahmyI13"}, "url":"URL#4194885" }, { "@score":"1", "@id":"4194886", "info":{"authors":{"author":[{"@pid":"68/8106","text":"Mamdouh F. Fahmy"},{"@pid":"144/0882","text":"Mina Adel Thabet Bishay"}]},"title":"An enhanced Bspline based Zernike Moment evaluations with watermarking applications.","venue":"ISSPIT","pages":"186-191","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FahmyT13","doi":"10.1109/ISSPIT.2013.6781877","ee":"https://doi.org/10.1109/ISSPIT.2013.6781877","url":"https://dblp.org/rec/conf/isspit/FahmyT13"}, "url":"URL#4194886" }, { "@score":"1", "@id":"4194887", "info":{"authors":{"author":[{"@pid":"68/8106","text":"Mamdouh F. Fahmy"},{"@pid":"144/0882","text":"Mina Adel Thabet Bishay"}]},"title":"A fingerprint segmentation technique based on Morphological processing.","venue":"ISSPIT","pages":"215-220","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FahmyT13a","doi":"10.1109/ISSPIT.2013.6781882","ee":"https://doi.org/10.1109/ISSPIT.2013.6781882","url":"https://dblp.org/rec/conf/isspit/FahmyT13a"}, "url":"URL#4194887" }, { "@score":"1", "@id":"4194888", "info":{"authors":{"author":[{"@pid":"72/5148","text":"Anastasios Fragopoulos"},{"@pid":"24/3583","text":"John V. Gialelis"},{"@pid":"47/331","text":"Dimitrios N. Serpanos"}]},"title":"Content management and protection in Smart Cities IP - Based backbone Wireless Sensors Networks.","venue":"ISSPIT","pages":"119-123","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FragopoulosGS13","doi":"10.1109/ISSPIT.2013.6781865","ee":"https://doi.org/10.1109/ISSPIT.2013.6781865","url":"https://dblp.org/rec/conf/isspit/FragopoulosGS13"}, "url":"URL#4194888" }, { "@score":"1", "@id":"4194889", "info":{"authors":{"author":[{"@pid":"123/8682","text":"Konstantinos Fysarakis"},{"@pid":"36/5854","text":"Charalampos Manifavas"},{"@pid":"19/4489","text":"Ioannis Papaefstathiou"},{"@pid":"144/0992","text":"Anastasios Adamopoulos"}]},"title":"A lightweight anonymity & location privacy service.","venue":"ISSPIT","pages":"124-129","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/FysarakisMPA13","doi":"10.1109/ISSPIT.2013.6781866","ee":"https://doi.org/10.1109/ISSPIT.2013.6781866","url":"https://dblp.org/rec/conf/isspit/FysarakisMPA13"}, "url":"URL#4194889" }, { "@score":"1", "@id":"4194890", "info":{"authors":{"author":[{"@pid":"144/0875","text":"J. Maeso Garcia"},{"@pid":"26/11444","text":"Fernando Jorge Hernández"},{"@pid":"52/4594","text":"Begoña García Zapirain Soto"},{"@pid":"18/197","text":"Amaia Méndez Zorrilla"},{"@pid":"144/0993","text":"Begonya Fernandez-Ruanova"},{"@pid":"144/1123","text":"A. Alday Jurado"},{"@pid":"144/1076","text":"J. X. Llano Hernaiz"}]},"title":"Teleassistance outdoor system for the elderly based on Android devices.","venue":"ISSPIT","pages":"9-14","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/GarciaHSZFJH13","doi":"10.1109/ISSPIT.2013.6781846","ee":"https://doi.org/10.1109/ISSPIT.2013.6781846","url":"https://dblp.org/rec/conf/isspit/GarciaHSZFJH13"}, "url":"URL#4194890" }, { "@score":"1", "@id":"4194891", "info":{"authors":{"author":[{"@pid":"30/10405","text":"Soukayna Ghandour-Haidar"},{"@pid":"14/6634","text":"Laurent Ros"},{"@pid":"92/3006","text":"Jean-Marc Brossier"}]},"title":"3-D Mobile-to-Mobile channel tracking with first-order autoregressive model-based Kalman filter.","venue":"ISSPIT","pages":"464-469","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/Ghandour-HaidarRB13","doi":"10.1109/ISSPIT.2013.6781925","ee":"https://doi.org/10.1109/ISSPIT.2013.6781925","url":"https://dblp.org/rec/conf/isspit/Ghandour-HaidarRB13"}, "url":"URL#4194891" }, { "@score":"1", "@id":"4194892", "info":{"authors":{"author":[{"@pid":"36/5408","text":"George-Othon Glentis"},{"@pid":"18/2946","text":"Yannis Kopsinis"},{"@pid":"63/3141","text":"Kristina Georgoulakis"},{"@pid":"46/4218","text":"Chris Matrakidis"}]},"title":"Electronic dispersion compensation of fiber links using sparsity induced volterra equalizers.","venue":"ISSPIT","pages":"255-260","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/GlentisKGM13","doi":"10.1109/ISSPIT.2013.6781889","ee":"https://doi.org/10.1109/ISSPIT.2013.6781889","url":"https://dblp.org/rec/conf/isspit/GlentisKGM13"}, "url":"URL#4194892" }, { "@score":"1", "@id":"4194893", "info":{"authors":{"author":[{"@pid":"136/8769","text":"Kalyan Kumar Halder"},{"@pid":"18/1696","text":"Murat Tahtali"},{"@pid":"55/4292","text":"Sreenatha G. Anavatti"}]},"title":"A new pixel shiftmap prediction method based on Generalized Regression Neural Network.","venue":"ISSPIT","pages":"309-314","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/HalderTA13","doi":"10.1109/ISSPIT.2013.6781899","ee":"https://doi.org/10.1109/ISSPIT.2013.6781899","url":"https://dblp.org/rec/conf/isspit/HalderTA13"}, "url":"URL#4194893" }, { "@score":"1", "@id":"4194894", "info":{"authors":{"author":[{"@pid":"136/8769","text":"Kalyan Kumar Halder"},{"@pid":"18/1696","text":"Murat Tahtali"},{"@pid":"55/4292","text":"Sreenatha G. Anavatti"}]},"title":"A new image restoration approach for imaging through the atmosphere.","venue":"ISSPIT","pages":"350-355","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/HalderTA13a","doi":"10.1109/ISSPIT.2013.6781906","ee":"https://doi.org/10.1109/ISSPIT.2013.6781906","url":"https://dblp.org/rec/conf/isspit/HalderTA13a"}, "url":"URL#4194894" }, { "@score":"1", "@id":"4194895", "info":{"authors":{"author":[{"@pid":"11/6049","text":"Athanasios C. Iossifides"},{"@pid":"p/GeorgeDPapadopoulos","text":"George D. Papadopoulos"},{"@pid":"90/5258","text":"Nikos Deligiannis"}]},"title":"Performance of complex orthogonal M-ary transmission with Amicable Hadamard matrices over diversity Rayleigh fading channels.","venue":"ISSPIT","pages":"410-415","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/IossifidesPD13","doi":"10.1109/ISSPIT.2013.6781916","ee":"https://doi.org/10.1109/ISSPIT.2013.6781916","url":"https://dblp.org/rec/conf/isspit/IossifidesPD13"}, "url":"URL#4194895" }, { "@score":"1", "@id":"4194896", "info":{"authors":{"author":[{"@pid":"136/4919","text":"Rizwan Ishaq"},{"@pid":"52/4594","text":"Begoña García Zapirain"}]},"title":"Esophageal Speech enhancement using modified voicing source.","venue":"ISSPIT","pages":"210-214","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/IshaqZ13","doi":"10.1109/ISSPIT.2013.6781881","ee":"https://doi.org/10.1109/ISSPIT.2013.6781881","url":"https://dblp.org/rec/conf/isspit/IshaqZ13"}, "url":"URL#4194896" }, { "@score":"1", "@id":"4194897", "info":{"authors":{"author":[{"@pid":"49/9475","text":"Azarakhsh Jalalvand"},{"@pid":"49/603","text":"Kris Demuynck"},{"@pid":"42/4663","text":"Jean-Pierre Martens"}]},"title":"Feature enhancement with a Reservoir-based Denoising Auto Encoder.","venue":"ISSPIT","pages":"227-232","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/JalalvandDM13","doi":"10.1109/ISSPIT.2013.6781884","ee":"https://doi.org/10.1109/ISSPIT.2013.6781884","url":"https://dblp.org/rec/conf/isspit/JalalvandDM13"}, "url":"URL#4194897" }, { "@score":"1", "@id":"4194898", "info":{"authors":{"author":[{"@pid":"127/6939","text":"Dionysios S. Kalogerias"},{"@pid":"11/10646","text":"Shunqiao Sun"},{"@pid":"65/3664","text":"Athina P. Petropulu"}]},"title":"Sparse sensing in colocated MIMO radar: A matrix completion approach.","venue":"ISSPIT","pages":"496-502","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KalogeriasSP13","doi":"10.1109/ISSPIT.2013.6781930","ee":"https://doi.org/10.1109/ISSPIT.2013.6781930","url":"https://dblp.org/rec/conf/isspit/KalogeriasSP13"}, "url":"URL#4194898" }, { "@score":"1", "@id":"4194899", "info":{"authors":{"author":[{"@pid":"171/7080","text":"Sajjad Karimi"},{"@pid":"94/11540","text":"Behnam Molaee-Ardekani"},{"@pid":"27/6191","text":"Mohammad B. Shamsollahi"},{"@pid":"301/5649","text":"Christopher Leroy"},{"@pid":"165/4557","text":"Philippe Derambure"}]},"title":"Automatic ocular correction in EEG recordings using maximum likelihood estimation.","venue":"ISSPIT","pages":"164-169","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KarimiMSLD13","doi":"10.1109/ISSPIT.2013.6781873","ee":"https://doi.org/10.1109/ISSPIT.2013.6781873","url":"https://dblp.org/rec/conf/isspit/KarimiMSLD13"}, "url":"URL#4194899" }, { "@score":"1", "@id":"4194900", "info":{"authors":{"author":[{"@pid":"143/7218","text":"Hossam M. Kasem"},{"@pid":"68/5461","text":"Maha El-Sabrouty"}]},"title":"A comparative study of audio compression based on compressed sensing and Sparse Fast Fourier transform (SFFT): Performance and challenges.","venue":"ISSPIT","pages":"452-457","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KasemE13","doi":"10.1109/ISSPIT.2013.6781923","ee":"https://doi.org/10.1109/ISSPIT.2013.6781923","url":"https://dblp.org/rec/conf/isspit/KasemE13"}, "url":"URL#4194900" }, { "@score":"1", "@id":"4194901", "info":{"authors":{"author":[{"@pid":"21/633","text":"Dimitrios Katselis"},{"@pid":"p/PanagiotisPapadimitratos","text":"Panos Papadimitratos"}]},"title":"On secret key generation through multipath for wireless networks.","venue":"ISSPIT","pages":"148-153","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KatselisP13","doi":"10.1109/ISSPIT.2013.6781870","ee":"https://doi.org/10.1109/ISSPIT.2013.6781870","url":"https://dblp.org/rec/conf/isspit/KatselisP13"}, "url":"URL#4194901" }, { "@score":"1", "@id":"4194902", "info":{"authors":{"author":[{"@pid":"17/8777","text":"Stamos Katsigiannis"},{"@pid":"m/DimitriosEMaroulis","text":"Dimitris Maroulis"}]},"title":"Parallel computing techniques for performance enhancement of a cDNA microarray gridding algorithm.","venue":"ISSPIT","pages":"446-451","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KatsigiannisM13","doi":"10.1109/ISSPIT.2013.6781922","ee":"https://doi.org/10.1109/ISSPIT.2013.6781922","url":"https://dblp.org/rec/conf/isspit/KatsigiannisM13"}, "url":"URL#4194902" }, { "@score":"1", "@id":"4194903", "info":{"authors":{"author":[{"@pid":"128/5614","text":"Omed S. Khalind"},{"@pid":"15/2711","text":"Benjamin Aziz"}]},"title":"Single-mismatch 2LSB embedding steganography.","venue":"ISSPIT","pages":"283-286","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KhalindA13","doi":"10.1109/ISSPIT.2013.6781894","ee":"https://doi.org/10.1109/ISSPIT.2013.6781894","url":"https://dblp.org/rec/conf/isspit/KhalindA13"}, "url":"URL#4194903" }, { "@score":"1", "@id":"4194904", "info":{"authors":{"author":[{"@pid":"144/1121","text":"Naveed Sarfaraz Khattak"},{"@pid":"144/1039","text":"Tabinda Sarwar"},{"@pid":"55/435","text":"Fahim Arif"}]},"title":"Single image magnification with edge enhancement.","venue":"ISSPIT","pages":"321-326","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KhattakSA13","doi":"10.1109/ISSPIT.2013.6781901","ee":"https://doi.org/10.1109/ISSPIT.2013.6781901","url":"https://dblp.org/rec/conf/isspit/KhattakSA13"}, "url":"URL#4194904" }, { "@score":"1", "@id":"4194905", "info":{"authors":{"author":[{"@pid":"201/8666","text":"Mohammad Omar Khyam"},{"@pid":"26/3692","text":"Md. Jahangir Alam"},{"@pid":"117/1912","text":"Andrew J. Lambert"},{"@pid":"128/3737","text":"Craig R. Benson"},{"@pid":"75/4744","text":"Mark R. Pickering"}]},"title":"High precision multiple ultrasonic transducer positioning using a robust optimization approach.","venue":"ISSPIT","pages":"192-197","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KhyamALBP13","doi":"10.1109/ISSPIT.2013.6781878","ee":"https://doi.org/10.1109/ISSPIT.2013.6781878","url":"https://dblp.org/rec/conf/isspit/KhyamALBP13"}, "url":"URL#4194905" }, { "@score":"1", "@id":"4194906", "info":{"authors":{"author":[{"@pid":"144/0924","text":"Daichi Kitamura"},{"@pid":"87/629","text":"Hiroshi Saruwatari"},{"@pid":"144/1032","text":"Kosuke Yagi"},{"@pid":"50/2173","text":"Kiyohiro Shikano"},{"@pid":"40/786","text":"Yu Takahashi"},{"@pid":"17/8054","text":"Kazunobu Kondo"}]},"title":"Robust music signal separation based on supervised nonnegative matrix factorization with prevention of basis sharing.","venue":"ISSPIT","pages":"392-397","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KitamuraSYSTK13","doi":"10.1109/ISSPIT.2013.6781913","ee":"https://doi.org/10.1109/ISSPIT.2013.6781913","url":"https://dblp.org/rec/conf/isspit/KitamuraSYSTK13"}, "url":"URL#4194906" }, { "@score":"1", "@id":"4194907", "info":{"authors":{"author":[{"@pid":"23/10534","text":"Andreas Kotsopoulos"},{"@pid":"10/204","text":"Theodore Antonakopoulos 0001"}]},"title":"Architecture and implementation of an adaptive nanopositioning controller for fast spiral scanning.","venue":"ISSPIT","pages":"479-483","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/KotsopoulosA13","doi":"10.1109/ISSPIT.2013.6781927","ee":"https://doi.org/10.1109/ISSPIT.2013.6781927","url":"https://dblp.org/rec/conf/isspit/KotsopoulosA13"}, "url":"URL#4194907" }, { "@score":"1", "@id":"4194908", "info":{"authors":{"author":[{"@pid":"144/0933","text":"Bahareh Langari"},{"@pid":"34/6509","text":"Saeed Vaseghi"},{"@pid":"144/1112","text":"Seyed Kamran Pedram"}]},"title":"Multi-resolution edge-guided image gap restoration.","venue":"ISSPIT","pages":"374-379","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/LangariVP13","doi":"10.1109/ISSPIT.2013.6781910","ee":"https://doi.org/10.1109/ISSPIT.2013.6781910","url":"https://dblp.org/rec/conf/isspit/LangariVP13"}, "url":"URL#4194908" }, { "@score":"1", "@id":"4194909", "info":{"authors":{"author":[{"@pid":"30/8131","text":"Yuxi Liu"},{"@pid":"h/DimitriosHatzinakos","text":"Dimitrios Hatzinakos"}]},"title":"Biometric identification based on Transient Evoked Otoacoustic Emission.","venue":"ISSPIT","pages":"267-271","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/LiuH13","doi":"10.1109/ISSPIT.2013.6781891","ee":"https://doi.org/10.1109/ISSPIT.2013.6781891","url":"https://dblp.org/rec/conf/isspit/LiuH13"}, "url":"URL#4194909" }, { "@score":"1", "@id":"4194910", "info":{"authors":{"author":[{"@pid":"308/2727","text":"Nikos Loukeris"},{"@pid":"144/0999","text":"Iordanis Eleftheriadis"},{"@pid":"144/1049","text":"Efstratios Livanis"}]},"title":"A novel approach on hybrid Support Vector Machines into optimal portfolio selection.","venue":"ISSPIT","pages":"46-51","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/LoukerisEL13","doi":"10.1109/ISSPIT.2013.6781852","ee":"https://doi.org/10.1109/ISSPIT.2013.6781852","url":"https://dblp.org/rec/conf/isspit/LoukerisEL13"}, "url":"URL#4194910" }, { "@score":"1", "@id":"4194911", "info":{"authors":{"author":[{"@pid":"48/1165","text":"Khalid Mahmood"},{"@pid":"39/3095","text":"Gunes Karabulut Kurt"}]},"title":"Mode selection rules for device-to-device communication: Design criteria and performance metrics.","venue":"ISSPIT","pages":"315-320","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MahmoodK13","doi":"10.1109/ISSPIT.2013.6781900","ee":"https://doi.org/10.1109/ISSPIT.2013.6781900","url":"https://dblp.org/rec/conf/isspit/MahmoodK13"}, "url":"URL#4194911" }, { "@score":"1", "@id":"4194912", "info":{"authors":{"author":[{"@pid":"144/0897","text":"S. Masoudi"},{"@pid":"144/1105","text":"Nasim Montazeri"},{"@pid":"27/6191","text":"Mohammad B. Shamsollahi"},{"@pid":"52/7412","text":"Di Ge"},{"@pid":"14/6112","text":"Alain Beuchee"},{"@pid":"30/7332","text":"Patrick Pladys"},{"@pid":"43/2986","text":"Alfredo I. Hernández"}]},"title":"Early detection of apnea-bradycardia episodes in preterm infants based on coupled hidden Markov model.","venue":"ISSPIT","pages":"243-248","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MasoudiMSGBPH13","doi":"10.1109/ISSPIT.2013.6781887","ee":"https://doi.org/10.1109/ISSPIT.2013.6781887","url":"https://dblp.org/rec/conf/isspit/MasoudiMSGBPH13"}, "url":"URL#4194912" }, { "@score":"1", "@id":"4194913", "info":{"authors":{"author":[{"@pid":"122/4749","text":"Alexander Alonso Molinero"},{"@pid":"18/197","text":"Amaia Méndez Zorrilla"},{"@pid":"52/4594","text":"Begoña García Zapirain"}]},"title":"Kalman filter predictions applied to glottal closure instant detection.","venue":"ISSPIT","pages":"221-226","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MolineroZZ13","doi":"10.1109/ISSPIT.2013.6781883","ee":"https://doi.org/10.1109/ISSPIT.2013.6781883","url":"https://dblp.org/rec/conf/isspit/MolineroZZ13"}, "url":"URL#4194913" }, { "@score":"1", "@id":"4194914", "info":{"authors":{"author":[{"@pid":"144/0996","text":"Seyed Sadegh Mohseni Salehi Monfared"},{"@pid":"144/0910","text":"Elnaz Lashgari"},{"@pid":"144/0889","text":"Amir Akbarian Aghdam"},{"@pid":"21/6529","text":"Babak Hossein Khalaj"}]},"title":"Method as a preprocessing stage for tracking sperms progressive motility.","venue":"ISSPIT","pages":"170-174","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MonfaredLAK13","doi":"10.1109/ISSPIT.2013.6781874","ee":"https://doi.org/10.1109/ISSPIT.2013.6781874","url":"https://dblp.org/rec/conf/isspit/MonfaredLAK13"}, "url":"URL#4194914" }, { "@score":"1", "@id":"4194915", "info":{"authors":{"author":[{"@pid":"144/1091","text":"Raziyeh Mosayebi"},{"@pid":"79/7884","text":"Hamid Sheikhzadeh"},{"@pid":"27/338","text":"Kaamran Raahemifar"}]},"title":"Subband blind source separation for convolutive mixture of speech signals based on dynamic modeling.","venue":"ISSPIT","pages":"299-304","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MosayebiSR13","doi":"10.1109/ISSPIT.2013.6781897","ee":"https://doi.org/10.1109/ISSPIT.2013.6781897","url":"https://dblp.org/rec/conf/isspit/MosayebiSR13"}, "url":"URL#4194915" }, { "@score":"1", "@id":"4194916", "info":{"authors":{"author":[{"@pid":"45/9914","text":"Eleftheria A. Mylona"},{"@pid":"10/968","text":"Michalis A. Savelonas"},{"@pid":"m/DimitriosEMaroulis","text":"Dimitris Maroulis"}]},"title":"Automated parameterization of active contours: A brief survey.","venue":"ISSPIT","pages":"344-349","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/MylonaSM13","doi":"10.1109/ISSPIT.2013.6781905","ee":"https://doi.org/10.1109/ISSPIT.2013.6781905","url":"https://dblp.org/rec/conf/isspit/MylonaSM13"}, "url":"URL#4194916" }, { "@score":"1", "@id":"4194917", "info":{"authors":{"author":[{"@pid":"144/1031","text":"Ryu Nagayasu"},{"@pid":"72/5817","text":"Nari Tanabe"},{"@pid":"78/3416","text":"Toshihiro Furukawa"}]},"title":"2-D block Kalman filter with colored driving source for image restoration using adaptive image modeling.","venue":"ISSPIT","pages":"277-282","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/NagayasuTF13","doi":"10.1109/ISSPIT.2013.6781893","ee":"https://doi.org/10.1109/ISSPIT.2013.6781893","url":"https://dblp.org/rec/conf/isspit/NagayasuTF13"}, "url":"URL#4194917" }, { "@score":"1", "@id":"4194918", "info":{"authors":{"author":[{"@pid":"119/3664","text":"Stefan Nitz"},{"@pid":"54/5424","text":"Carsten Kleiner"},{"@pid":"k/ArneKoschel","text":"Arne Koschel"},{"@pid":"07/5735","text":"Irina Astrova"}]},"title":"Applying event-driven architecture to mobile computing.","venue":"ISSPIT","pages":"58-63","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/NitzKKA13","doi":"10.1109/ISSPIT.2013.6781854","ee":"https://doi.org/10.1109/ISSPIT.2013.6781854","url":"https://dblp.org/rec/conf/isspit/NitzKKA13"}, "url":"URL#4194918" }, { "@score":"1", "@id":"4194919", "info":{"authors":{"author":[{"@pid":"144/1082","text":"Andreas Papalambrou"},{"@pid":"24/3583","text":"John V. Gialelis"},{"@pid":"47/331","text":"Dimitrios N. Serpanos"}]},"title":"Increasing security in wireless e-health systems.","venue":"ISSPIT","pages":"15-20","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/PapalambrouGS13","doi":"10.1109/ISSPIT.2013.6781847","ee":"https://doi.org/10.1109/ISSPIT.2013.6781847","url":"https://dblp.org/rec/conf/isspit/PapalambrouGS13"}, "url":"URL#4194919" }, { "@score":"1", "@id":"4194920", "info":{"authors":{"author":[{"@pid":"98/3107","text":"Constantin Papaodysseus"},{"@pid":"144/1015","text":"Constantinos Chalatsis"},{"@pid":"13/3350","text":"Dimitris Arabadjis"},{"@pid":"04/11435","text":"Solomon Zannos"},{"@pid":"84/11434","text":"Fotios Giannopoulos"},{"@pid":"10/5095","text":"Panayiotis Rousopoulos"},{"@pid":"143/4048","text":"E. Kalfa"}]},"title":"A general, novel methodology for studying the generation of finite precision error in any algorithm.","venue":"ISSPIT","pages":"380-385","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/PapaodysseusCAZGRK13","doi":"10.1109/ISSPIT.2013.6781911","ee":"https://doi.org/10.1109/ISSPIT.2013.6781911","url":"https://dblp.org/rec/conf/isspit/PapaodysseusCAZGRK13"}, "url":"URL#4194920" }, { "@score":"1", "@id":"4194921", "info":{"authors":{"author":[{"@pid":"72/5534","text":"Michael Paraskevas"},{"@pid":"144/1087","text":"V. Athanasopoulos"},{"@pid":"91/9173","text":"Thomas Zarouchas"},{"@pid":"33/3198","text":"Spiros Louvros"}]},"title":"Exploiting metropolitan optical networks for high speed interconnections at schools.","venue":"ISSPIT","pages":"102-107","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ParaskevasAZL13","doi":"10.1109/ISSPIT.2013.6781862","ee":"https://doi.org/10.1109/ISSPIT.2013.6781862","url":"https://dblp.org/rec/conf/isspit/ParaskevasAZL13"}, "url":"URL#4194921" }, { "@score":"1", "@id":"4194922", "info":{"authors":{"author":[{"@pid":"144/1112","text":"Seyed Kamran Pedram"},{"@pid":"34/6509","text":"Saeed Vaseghi"},{"@pid":"144/0933","text":"Bahareh Langari"}]},"title":"Audio packet loss concealment using motion-compensated spectral extrapolation.","venue":"ISSPIT","pages":"434-439","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/PedramVL13","doi":"10.1109/ISSPIT.2013.6781920","ee":"https://doi.org/10.1109/ISSPIT.2013.6781920","url":"https://dblp.org/rec/conf/isspit/PedramVL13"}, "url":"URL#4194922" }, { "@score":"1", "@id":"4194923", "info":{"authors":{"author":[{"@pid":"87/573","text":"Spyros E. Polykalas"},{"@pid":"03/279","text":"George N. Prezerakos"},{"@pid":"07/6957","text":"Agisilaos Konidaris"}]},"title":"An algorithm based on Google Trends' data for future prediction. Case study: German elections.","venue":"ISSPIT","pages":"69-73","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/PolykalasPK13","doi":"10.1109/ISSPIT.2013.6781856","ee":"https://doi.org/10.1109/ISSPIT.2013.6781856","url":"https://dblp.org/rec/conf/isspit/PolykalasPK13"}, "url":"URL#4194923" }, { "@score":"1", "@id":"4194924", "info":{"authors":{"author":[{"@pid":"119/9593","text":"Kristopher Reese"},{"@pid":"144/1042","text":"Russell Bessette"},{"@pid":"144/1103","text":"Pricilla Hancock"}]},"title":"KnowYourColors: Visual dashboards for blood metrics and healthcare analytics.","venue":"ISSPIT","pages":"2-8","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ReeseBH13","doi":"10.1109/ISSPIT.2013.6781845","ee":"https://doi.org/10.1109/ISSPIT.2013.6781845","url":"https://dblp.org/rec/conf/isspit/ReeseBH13"}, "url":"URL#4194924" }, { "@score":"1", "@id":"4194925", "info":{"authors":{"author":[{"@pid":"27/7048","text":"Ibon Ruiz Oleagordia"},{"@pid":"52/4594","text":"Begoña García Zapirain"}]},"title":"Enhancement of Shimmer in oesophageal speech using different wavelets.","venue":"ISSPIT","pages":"180-185","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/RuizZ13","doi":"10.1109/ISSPIT.2013.6781876","ee":"https://doi.org/10.1109/ISSPIT.2013.6781876","url":"https://dblp.org/rec/conf/isspit/RuizZ13"}, "url":"URL#4194925" }, { "@score":"1", "@id":"4194926", "info":{"authors":{"author":[{"@pid":"56/9556","text":"Sajib Saha"},{"@pid":"18/1696","text":"Murat Tahtali"},{"@pid":"117/1912","text":"Andrew J. Lambert"},{"@pid":"75/4744","text":"Mark R. Pickering"}]},"title":"Perceptual dissimilarity metric: A full reference objective image quality measure to quantify the degradation of perceptual image quality.","venue":"ISSPIT","pages":"327-332","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SahaTLP13","doi":"10.1109/ISSPIT.2013.6781902","ee":"https://doi.org/10.1109/ISSPIT.2013.6781902","url":"https://dblp.org/rec/conf/isspit/SahaTLP13"}, "url":"URL#4194926" }, { "@score":"1", "@id":"4194927", "info":{"authors":{"author":[{"@pid":"56/9556","text":"Sajib Saha"},{"@pid":"18/1696","text":"Murat Tahtali"},{"@pid":"117/1912","text":"Andrew J. Lambert"},{"@pid":"75/4744","text":"Mark R. Pickering"}]},"title":"Compressed sensing inspired rapid algebraic reconstruction technique for computed tomography.","venue":"ISSPIT","pages":"398-403","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SahaTLP13a","doi":"10.1109/ISSPIT.2013.6781914","ee":"https://doi.org/10.1109/ISSPIT.2013.6781914","url":"https://dblp.org/rec/conf/isspit/SahaTLP13a"}, "url":"URL#4194927" }, { "@score":"1", "@id":"4194928", "info":{"authors":{"author":[{"@pid":"s/SartajSahni","text":"Sartaj Sahni"},{"@pid":"52/4594","text":"Begoña García Zapirain"},{"@pid":"07/6574","text":"Kostas Berberidis"},{"@pid":"79/5692","text":"Ioannis Krikidis"}]},"title":"IEEE ISSPIT 2013: Message from the TPC chairs.","venue":"ISSPIT","pages":"163","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SahniZBK13","doi":"10.1109/ISSPIT.2013.6781872","ee":"https://doi.org/10.1109/ISSPIT.2013.6781872","url":"https://dblp.org/rec/conf/isspit/SahniZBK13"}, "url":"URL#4194928" }, { "@score":"1", "@id":"4194929", "info":{"authors":{"author":[{"@pid":"43/10139","text":"Rafal Samborski"},{"@pid":"14/6581","text":"Mariusz Ziólko"}]},"title":"Speaker localization in conferencing systems employing phase features and wavelet transform.","venue":"ISSPIT","pages":"333-337","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SamborskiZ13","doi":"10.1109/ISSPIT.2013.6781903","ee":"https://doi.org/10.1109/ISSPIT.2013.6781903","url":"https://dblp.org/rec/conf/isspit/SamborskiZ13"}, "url":"URL#4194929" }, { "@score":"1", "@id":"4194930", "info":{"authors":{"author":[{"@pid":"46/10413","text":"Konstantinos Sasloglou"},{"@pid":"69/292","text":"Ian A. Glover"},{"@pid":"26/2175","text":"Vangelis Gazis"},{"@pid":"46/6434","text":"Panayotis Kikiras"},{"@pid":"97/3048","text":"Kostas Mathioudakis"},{"@pid":"19/5959","text":"Ivan Andonovic"}]},"title":"Empirical channel models for optimized communications in a network of unmanned ground vehicles.","venue":"ISSPIT","pages":"113-118","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SasloglouGGKMA13","doi":"10.1109/ISSPIT.2013.6781864","ee":"https://doi.org/10.1109/ISSPIT.2013.6781864","url":"https://dblp.org/rec/conf/isspit/SasloglouGGKMA13"}, "url":"URL#4194930" }, { "@score":"1", "@id":"4194931", "info":{"authors":{"author":[{"@pid":"04/9099","text":"Noraini Seman"},{"@pid":"77/4277","text":"Nursuriati Jamil"},{"@pid":"144/0965","text":"Raseeda Hamzah"}]},"title":"Dynamic Connection Strategies (DyConS) for spoken Malay speech recognition.","venue":"ISSPIT","pages":"40-45","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SemanJH13","doi":"10.1109/ISSPIT.2013.6781851","ee":"https://doi.org/10.1109/ISSPIT.2013.6781851","url":"https://dblp.org/rec/conf/isspit/SemanJH13"}, "url":"URL#4194931" }, { "@score":"1", "@id":"4194932", "info":{"authors":{"author":[{"@pid":"59/9478","text":"Akram Shokri"},{"@pid":"144/1047","text":"Mohammad Hossein Davarpour"},{"@pid":"36/9367","text":"Ahmad Akbari"},{"@pid":"29/6018","text":"Babak Nasersharif"}]},"title":"Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter.","venue":"ISSPIT","pages":"272-276","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ShokriDAN13","doi":"10.1109/ISSPIT.2013.6781892","ee":"https://doi.org/10.1109/ISSPIT.2013.6781892","url":"https://dblp.org/rec/conf/isspit/ShokriDAN13"}, "url":"URL#4194932" }, { "@score":"1", "@id":"4194933", "info":{"authors":{"author":[{"@pid":"144/0972","text":"Wujiahemaiti Simayi"},{"@pid":"135/9689","text":"Mayire Ibrayim"},{"@pid":"25/3975","text":"Dilmurat Tursun"},{"@pid":"13/3035","text":"Askar Hamdulla"}]},"title":"Research on on-line Uyghur character recognition technology based on center distance feature.","venue":"ISSPIT","pages":"293-298","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SimayiITH13","doi":"10.1109/ISSPIT.2013.6781896","ee":"https://doi.org/10.1109/ISSPIT.2013.6781896","url":"https://dblp.org/rec/conf/isspit/SimayiITH13"}, "url":"URL#4194933" }, { "@score":"1", "@id":"4194934", "info":{"authors":{"author":[{"@pid":"136/4255","text":"Anastasios Stasinopoulos"},{"@pid":"86/6966","text":"Christoforos Ntantogian"},{"@pid":"11/3573","text":"Christos Xenakis"}]},"title":"The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks.","venue":"ISSPIT","pages":"135-139","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/StasinopoulosNX13","doi":"10.1109/ISSPIT.2013.6781868","ee":"https://doi.org/10.1109/ISSPIT.2013.6781868","url":"https://dblp.org/rec/conf/isspit/StasinopoulosNX13"}, "url":"URL#4194934" }, { "@score":"1", "@id":"4194935", "info":{"authors":{"author":[{"@pid":"65/2709","text":"Yi Sun"},{"@pid":"98/3588","text":"Xiaojun Jing"},{"@pid":"76/8195","text":"Songlin Sun"},{"@pid":"51/944-1","text":"Hai Huang 0001"}]},"title":"The Subaperture Secondary Range Compression Algorithm for near space squint SAR.","venue":"ISSPIT","pages":"338-343","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/SunJS013","doi":"10.1109/ISSPIT.2013.6781904","ee":"https://doi.org/10.1109/ISSPIT.2013.6781904","url":"https://dblp.org/rec/conf/isspit/SunJS013"}, "url":"URL#4194935" }, { "@score":"1", "@id":"4194936", "info":{"authors":{"author":[{"@pid":"13/6717","text":"S. Amir Hossein A. E. Tabatabaei"},{"@pid":"45/1339","text":"Christoph Ruland"}]},"title":"The analysis of an NMF-based perceptual image hashing scheme.","venue":"ISSPIT","pages":"108-112","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/TabatabaeiR13","doi":"10.1109/ISSPIT.2013.6781863","ee":"https://doi.org/10.1109/ISSPIT.2013.6781863","url":"https://dblp.org/rec/conf/isspit/TabatabaeiR13"}, "url":"URL#4194936" }, { "@score":"1", "@id":"4194937", "info":{"authors":{"author":[{"@pid":"47/10771","text":"Ilias Theodorakopoulos"},{"@pid":"41/1873-2","text":"George Economou"},{"@pid":"88/4176","text":"Spiros Fotopoulos"},{"@pid":"87/6144","text":"Apostolos Ifantis"}]},"title":"On-line signature recognition via fusion of dynamic features into dissimilarity space.","venue":"ISSPIT","pages":"440-445","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/TheodorakopoulosEFI13","doi":"10.1109/ISSPIT.2013.6781921","ee":"https://doi.org/10.1109/ISSPIT.2013.6781921","url":"https://dblp.org/rec/conf/isspit/TheodorakopoulosEFI13"}, "url":"URL#4194937" }, { "@score":"1", "@id":"4194938", "info":{"authors":{"author":[{"@pid":"12/8235","text":"Mikko Uitto"},{"@pid":"07/4441","text":"Janne Vehkaperä"}]},"title":"Enhanced quality adaptation strategies for Scalable Video.","venue":"ISSPIT","pages":"74-79","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/UittoV13","doi":"10.1109/ISSPIT.2013.6781857","ee":"https://doi.org/10.1109/ISSPIT.2013.6781857","url":"https://dblp.org/rec/conf/isspit/UittoV13"}, "url":"URL#4194938" }, { "@score":"1", "@id":"4194939", "info":{"authors":{"author":[{"@pid":"94/2349","text":"Maria Varsamou"},{"@pid":"144/0987","text":"Ilias Zacharias"},{"@pid":"10/204","text":"Theodore Antonakopoulos 0001"}]},"title":"Correlated noise estimation and error correction in parallel storage channels.","venue":"ISSPIT","pages":"484-489","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/VarsamouZA13","doi":"10.1109/ISSPIT.2013.6781928","ee":"https://doi.org/10.1109/ISSPIT.2013.6781928","url":"https://dblp.org/rec/conf/isspit/VarsamouZA13"}, "url":"URL#4194939" }, { "@score":"1", "@id":"4194940", "info":{"authors":{"author":[{"@pid":"22/6647","text":"Evangelos Vlachos"},{"@pid":"28/1143","text":"Aris S. Lalos"},{"@pid":"07/6574","text":"Kostas Berberidis"}]},"title":"Regularized MMSE ICI equalization for OFDM systems over doubly selective channels.","venue":"ISSPIT","pages":"458-463","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/VlachosLB13","doi":"10.1109/ISSPIT.2013.6781924","ee":"https://doi.org/10.1109/ISSPIT.2013.6781924","url":"https://dblp.org/rec/conf/isspit/VlachosLB13"}, "url":"URL#4194940" }, { "@score":"1", "@id":"4194941", "info":{"authors":{"author":[{"@pid":"71/9540","text":"Fangzhou Wang"},{"@pid":"144/1024","text":"Xi Pan"}]},"title":"A novel algorithm for wideband acoustic sources localization using multiple spherical arrays.","venue":"ISSPIT","pages":"249-254","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/WangP13","doi":"10.1109/ISSPIT.2013.6781888","ee":"https://doi.org/10.1109/ISSPIT.2013.6781888","url":"https://dblp.org/rec/conf/isspit/WangP13"}, "url":"URL#4194941" }, { "@score":"1", "@id":"4194942", "info":{"authors":{"author":[{"@pid":"85/9555-3","text":"Yikai Wang 0003"},{"@pid":"77/1243","text":"Wei Xia"},{"@pid":"65/2987","text":"Zishu He"}]},"title":"Polarimetric statistical MIMO radar for target detection based on quaternion technique.","venue":"ISSPIT","pages":"287-292","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/WangXH13","doi":"10.1109/ISSPIT.2013.6781895","ee":"https://doi.org/10.1109/ISSPIT.2013.6781895","url":"https://dblp.org/rec/conf/isspit/WangXH13"}, "url":"URL#4194942" }, { "@score":"1", "@id":"4194943", "info":{"authors":{"author":[{"@pid":"144/1115","text":"Spyridoula D. Xenaki"},{"@pid":"08/381","text":"Konstantinos Koutroumbas"},{"@pid":"33/4608","text":"Athanasios A. Rontogiannis"}]},"title":"Adaptive possibilistic clustering.","venue":"ISSPIT","pages":"422-427","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/XenakiKR13","doi":"10.1109/ISSPIT.2013.6781918","ee":"https://doi.org/10.1109/ISSPIT.2013.6781918","url":"https://dblp.org/rec/conf/isspit/XenakiKR13"}, "url":"URL#4194943" }, { "@score":"1", "@id":"4194944", "info":{"authors":{"author":[{"@pid":"46/9177","text":"Mohammed Sidi Yakoub"},{"@pid":"00/3729","text":"Roger Nkambou"},{"@pid":"54/288","text":"Sid-Ahmed Selouani"}]},"title":"Phone classification using HMM/SVM system and normalization technique.","venue":"ISSPIT","pages":"96-101","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/YakoubNS13","doi":"10.1109/ISSPIT.2013.6781861","ee":"https://doi.org/10.1109/ISSPIT.2013.6781861","url":"https://dblp.org/rec/conf/isspit/YakoubNS13"}, "url":"URL#4194944" }, { "@score":"1", "@id":"4194945", "info":{"authors":{"author":[{"@pid":"88/9797","text":"Martin Zamkotsian"},{"@pid":"94/2721","text":"Kostas P. Peppas"},{"@pid":"144/1062","text":"George Fovakis"},{"@pid":"69/6650","text":"Fotis I. Lazarakis"},{"@pid":"92/7288-1","text":"Antonis A. Alexandridis"},{"@pid":"29/6957","text":"Kostas Dangakis"},{"@pid":"20/485","text":"Panayotis G. Cottis"}]},"title":"Wireless SPIHT-encoded image transmission employing hierarchical modulation: A DSP implementation.","venue":"ISSPIT","pages":"490-495","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ZamkotsianPFLADC13","doi":"10.1109/ISSPIT.2013.6781929","ee":"https://doi.org/10.1109/ISSPIT.2013.6781929","url":"https://dblp.org/rec/conf/isspit/ZamkotsianPFLADC13"}, "url":"URL#4194945" }, { "@score":"1", "@id":"4194946", "info":{"authors":{"author":[{"@pid":"22/10044","text":"Bingxuan Zhao"},{"@pid":"17/6488","text":"Shigenobu Sasaki"}]},"title":"Geo-location-assisted real time in-band spectrum sensing for cognitive radio networks.","venue":"ISSPIT","pages":"204-209","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ZhaoS13","doi":"10.1109/ISSPIT.2013.6781880","ee":"https://doi.org/10.1109/ISSPIT.2013.6781880","url":"https://dblp.org/rec/conf/isspit/ZhaoS13"}, "url":"URL#4194946" }, { "@score":"1", "@id":"4194947", "info":{"authors":{"author":[{"@pid":"54/2097","text":"Yufeng Zheng"},{"@pid":"e/AdelSaidElmaghraby","text":"Adel Said Elmaghraby"}]},"title":"Simulation of face recognition at a distance by scaling down images.","venue":"ISSPIT","pages":"198-203","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ZhengE13","doi":"10.1109/ISSPIT.2013.6781879","ee":"https://doi.org/10.1109/ISSPIT.2013.6781879","url":"https://dblp.org/rec/conf/isspit/ZhengE13"}, "url":"URL#4194947" }, { "@score":"1", "@id":"4194948", "info":{"authors":{"author":[{"@pid":"144/1058","text":"Sen Zhong"},{"@pid":"77/1243","text":"Wei Xia"},{"@pid":"65/2987","text":"Zishu He"}]},"title":"Approximate maximum likelihood time differences estimation in the presence of frequency and phase consistence errors.","venue":"ISSPIT","pages":"305-308","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspit/ZhongXH13","doi":"10.1109/ISSPIT.2013.6781898","ee":"https://doi.org/10.1109/ISSPIT.2013.6781898","url":"https://dblp.org/rec/conf/isspit/ZhongXH13"}, "url":"URL#4194948" }, { "@score":"1", "@id":"4249605", "info":{"title":"IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013","venue":"ISSPIT","publisher":"IEEE Computer Society","year":"2013","type":"Editorship","key":"conf/isspit/2013","ee":"https://ieeexplore.ieee.org/xpl/conhome/6775579/proceeding","url":"https://dblp.org/rec/conf/isspit/2013"}, "url":"URL#4249605" } ] } } } )