Boche, Holger, 1966-
Boche, Holger
Holger Boche
Boche, Holger, 19..-....
Boche, H.
VIAF ID: 120104851 (Personal)
Permalink: http://viaf.org/viaf/120104851
Preferred Forms
- 200 _ | ‡a Boche ‡b Holger
- 100 1 _ ‡a Boche, H.
-
- 100 1 _ ‡a Boche, Holger
-
-
-
-
-
- 100 1 _ ‡a Boche, Holger ‡d 1966-
- 100 1 _ ‡a Boche, Holger ‡d 1966-
- 100 1 _ ‡a Boche, Holger ‡d 1966-
- 100 1 _ ‡a Boche, Holger, ‡d 19..-....
-
- 100 0 _ ‡a Holger Boche
4xx's: Alternate Name Forms (9)
5xx's: Related Names (1)
Works
Title | Sources |
---|---|
Advanced Topics in System and Signal Theory A Mathematical Approach | |
Adversarial Behavior in Network Games | |
Algorithmic Computability of the Signal Bandwidth | |
Analyse des Verhaltens von Frequenzabtastverfahren beim Entwurf zeitdiskreter Filter | |
Banach–Steinhaus theory revisited: Lineability and spaceability | |
Bayesian mechanisms for wireless network security | |
Calculating the Hilbert Transform on Spaces With Energy Concentration: Convergence and Divergence Regions | |
Classical-Quantum Channels: Secret Message Transmission under Attacks | |
Communication Under Channel Uncertainty: An Algorithmic Perspective and Effective Construction | |
Communication With Unreliable Entanglement Assistance | |
Complexity Blowup in Simulating Analog Linear Time-Invariant Systems on Digital Computers | |
Compressed Sensing and its Applications : MATHEON Workshop 2013 | |
Concave resource allocation problems for interference coupled wireless systems | |
Coordinated Online Learning for Multiagent Systems With Coupled Constraints and Perturbed Utility Observations | |
Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge | |
Distributional Behavior of Convolution Sum System Representations | |
Efficient wireless scheduling with limited channel feedback and performance guarantees | |
Einfluss von Fensterverfahren auf die Systemcharakteristiken von Digitalfiltern | |
Erratum to: Entanglement Transmission and Generation under Channel Uncertainty: Universal Quantum Channel Coding | |
Erzeugung geheimer Schlüssel mit perfekter Sicherheit;Quellenunsicherheit und Störsenderangriffe | |
Extending Quantum Links: Modules for Fiber- and Memory-Based Quantum Repeaters | |
Finite Blocklength Codes for Secure Communication | |
Game Theory in Signal Processing and Communications | |
A General Theory for SIR Balancing | |
Identification Capacity of Channels With Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability | |
Information theoretic security and privacy of information systems | |
Interference Calculus A General Framework for Interference Management and Network Utility Optimization | |
Joint Opportunistic Scheduling and Selective Channel Feedback | |
Klassischen-Quanten Kanäle: Sichere Nachrichtenübertragung unter Attacke | |
Kodes endicher Blocklänge für sichere Kommunikation | |
Majorization and Matrix-monotone Functions in Wireless Communication | |
Mechanisms and games for dynamic spectrum allocation | |
Microscopic, Mesoscopic, and Macroscopic Learning Algorithms and Effects in Multi-Agent Systems | |
Mikroskopische, mesoskopische und makroskopische Lernalgorithmen und Effekte in Mehragentensysteme | |
Neue Untersuchungen zu den konjugierten Shannonschen Abtast-Reihen | |
Neuere Beiträge zur Theorie der Funktionaltransformationen und ihre Anwendungen | |
Nichtäquidistante Abtastung bandbegrenzter Signale und deren Rekonstruktion | |
On the Algorithmic Solvability of Spectral Factorization and Applications | |
On the Solvability of the Peak Value Problem for Bandlimited Signals With Applications | |
Optimal Tone Reservation for CDMA Systems | |
PAPR and the Density of Information Bearing Signals in OFDM | |
Physical-layer security for the internet of things | |
Pricing mechanisms for multi-carrier wireless systems | |
Problem der analytischen Fortsetzbarkeit in der Theorie der Laplace-Transformation | |
Problem von A. Papoulis bezüglich der bandbegrenzten Interpolation | |
QoS-based resource allocation and transceiver optimization, c2006: | |
Quantenkommunikationsnetze | |
Quantum Channel State Masking | |
Rekonstruierbarkeit der elektrischen und magnetischen Permeabilität aus Messwerten | |
Resource allocation in wireless networks theory and algorithms | |
SCC '08 | |
Secret Key Generation with Perfect Secrecy; Source Uncertainty and Jamming Attacks | |
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks | |
Secure Storage Capacity Under Rate Constraints—Continuity and Super Activation | |
Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs | |
Seventh International ITG Conference on Source and Channel Coding (SCC '08) | |
Turing Meets Circuit Theory: Not Every Continuous-Time LTI System Can be Simulated on a Digital Computer | |
Über die Realisierbarkeit linearer Filterentwurfsverfahren | |
Uncertainty in Identification Systems | |
Unifying View on Min-Max Fairness, Max-Min Fairness, and Utility Optimization in Cellular Networks | |
Universal pricing mechanism for utility maximization for interference coupled systems | |
Universelle Codes für Broadcast-Systeme mit Physical Layer Security und ihre algorithmische Berechenbarkeit in der Quanteninformationstheorie | |
Untersuchungen zu den optischen Systemen zur Ermittlung der Fourier-Transformation und der Hilbert-Transformation | |
Untersuchungen zum Konvergenzverhalten von Interpolationsprozessen für beliebige Gebiete | |
Untersuchungen zur Approximation im Komplexen | |
Zum Verhalten einiger neuartiger Abtast-Reihen in der Nachrichten- und Messtechnik |