1. Ubiquitous communications updated technical annex 2000

    Lagendijk, RL., 2000, Delft: Ubiquitous Communications. 69 p.

    Research output: Book/ReportReportScientific

  2. Ubiquitous communications annual report 1999: End-to-end analysis of wireless and internet video streaming?

    Lagendijk, RL., 2000, Delft: Ubiquitous Communications. 32 p.

    Research output: Book/ReportReportScientific

  3. Two-band amplitude scale estimation for qantization-based watermarking

    Wang, J., Shterev, ID. & Langendijk, E., 2005, Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems. s.n. (ed.). Piscataway: IEEE Society, p. 137-140 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  4. Turbo-code based wyner-zic video compression

    Westerlaken, RP., Klein Gunnewiek, R. & Lagendijk, RL., 2005, Proceedings of the 26th symposium on information theory in the Benelux. s.n. (ed.). Enschede: WIC, p. 113-120 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  5. Tribler: a social-based peer-to-peer system

    Pouwelse, JA., Garbacki, PJ., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, DHJ., Reinders, MJT., van Steen, MR. & Sips, HJ., 2008, In : Concurrency and Computation: Practice & Experience. 20, 2, p. 127-138 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  6. Tribler: a social-based peer-to-peer system

    Pouwelse, JA., Garbacki, PJ., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, DHJ., Reinders, MJT., van Steen, M. & Sips, HJ., 2006, website. s.n. (ed.). USA: Microsoft Research, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  7. Transport capacity of wireless networks:benefits from multi-acces computation coding

    Goseling, J., Gastpar, MC. & Weber, JH., 2009, Proceedings of the 30th symposium on information theory in the Benelux. SN (ed.). s.l.: s.n., p. 225-232 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  8. Transparency enhancing tools (TETs): an overview

    Janic, M., Veugen, PJM. & Wijbenga, JP., 2013, Proceedings of the 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST). Bella, G. & Lenzini, G. (eds.). NY, NY, USA: IEEE Society, p. 18-25 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. Transforming strings to vector spaces using prototype selection

    Spillmann, B., Neuhaus, M., Bunke, H., Pekalska, EM. & Duin, RPW., 2006, Structural, syntactic and statistical pattern recognition. Yeung, DY., Kwok, JT., Fred, A., Roli, F. & de Ridder, D. (eds.). Berlin-Heidelberg: Springer, p. 287-296 10 p. (Lecture Notes in Computer Science; vol. 4109).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  10. Transfer Learning of Artist Group Factors to Musical Genre Classification

    Kim, J., Won, M., Serra, X. & Liem, C. C. S., 2018, WWW'18 Companion Proceedings of the The Web Conference 2018. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, p. 1929-1934 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Previous 1...5 6 7 8 9 10 11 12 ...161 Next

ID: 20548