Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Vectorially Combined Distributed Power Amplifiers for Software-Defined Radio Applications

    Narendra, K., Limiti, E., Paoloni, C., Collantes, J-M., Jansen, R. & Yarman, S., 10/2012, In: IEEE Transactions on Microwave Theory and Techniques. 60, 10, p. 3189-3200 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Vectorially combined distributed power amplifier with load pull impedance determination

    Narendra, K., Limiti, E., Paoloni, C., Collantes, J. M., Jansen, R. H. & Yarman, B. S., 5/08/2010, In: Electronics Letters. 46, 16, p. 1137-1138 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Variable-Rate Low-Density Parity Check Codes For DVB-S2 Applications

    Pandya, N. & Honary, B., 4/12/2006, IET Seminar on Digital Video Broadcasting over Satellite: Present and Future. London: IET Press, p. 15-19 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Variable-Rate LDPC Codes based on structured matrices for DVB-S2 Applications

    Pandya, N. & Honary, B., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications Limited, p. 368-373 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Variable-Rate Capacity-Approaching LDPC Codes for HF Communications

    Pandya, N. & Honary, B., 07/2006, The 10th Institution of Engineering and Technology International Conference on Ionospheric Radio Systems & Techniques (IRST 2006). London, UK : IET Press, p. 123-127 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Variable aperture horn antenna for millimeter wave wireless communications

    Billa, L., Paoloni, C., Letizia, R. & Lewis, E., 27/02/2020, 2019 12th UK-Europe-China Workshop on Millimeter Waves and Terahertz Technologies (UCMMT). IEEE, p. 1-4 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    VARD2: a tool for dealing with spelling variation in historical corpora

    Baron, A. & Rayson, P., 05/2008. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  8. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Validities and Abilities in Criminal Profiling: A Critique of the Studies Conducted by Richard Kocsis and His Colleagues.

    Bennell, C., Jones, N., Taylor, P. J. & Snook, B., 06/2006, In: International Journal of Offender Therapy and Comparative Criminology. 50, 3, p. 344-360 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Validating the Sensor Network Calculus by Simulations

    Roedig, U., Gollan, N. & Schmitt, J., 10/2007, WICON '07 Proceedings of the 3rd international conference on Wireless internet. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Vol. 34. 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...3 4 5 6 7 8 9 10 ...255 Next

Back to top