Author of the publication

Least-Squares Zero-Forcing User-Ordered Successive Interference Cancellation for Multi-User STBC Systems.

, , , and . IEICE Transactions, 88-C (12): 2330-2337 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating anycast in the domain name system., , and . INFOCOM, page 1681-1689. IEEE, (2013)Incorporating Metadata into Data Mining with Ontology., , and . IEICE Transactions, 90-D (6): 983-985 (2007)A New Fair Queueing Algorithm with Dynamic Service Probability Adjustment., , and . IEICE Transactions, 90-A (11): 2635-2640 (2007)Practical Hierarchical Identity Based Encryption Scheme without Random Oracles., , and . IEICE Transactions, 92-A (6): 1494-1499 (2009)A Cloud Provider's View of EDNS Client-Subnet Adoption., , and . TMA, page 129-136. IEEE, (2019)Least-Squares Zero-Forcing User-Ordered Successive Interference Cancellation for Multi-User STBC Systems., , , and . IEICE Transactions, 88-C (12): 2330-2337 (2005)Newly-Built Iterative Receiver and Hardware Implementation for V-BLAST., , , and . IEICE Transactions, 90-B (2): 377-380 (2007)Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences., , , and . ACSAC, page 215-224. IEEE Computer Society, (2008)Mapping the expansion of Google's serving infrastructure., , , , , and . Internet Measurement Conference, page 313-326. ACM, (2013)Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud., , , , and . CoRR, (2019)