Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LS detection guided NLMS estimation of sparse systems., and . ICASSP (2), page 861-864. IEEE, (2004)A blind detection-guided approach for normalised multi-modulus crosstalk estimator in sparse multi-user DSL channels., , , and . Digit. Signal Process., 20 (3): 653-663 (2010)Quantifying the effects of dimension on the convergence rate of the LMS adaptive FIR estimator., , and . IEEE Trans. Signal Process., 46 (10): 2611-2615 (1998)Non-Gaussian interference characterisation with application to current radio astronomy technique., , , and . ISSPA (2), page 355-358. IEEE, (2003)0-7803-7946-2.Augmenting attack graphs to represent data link and network layer vulnerabilities., , and . MILCOM, page 1010-1015. IEEE, (2016)A Detection Guided Normalized Least-Mean-Squares Adaptive Partial Crosstalk Canceller for Multi-User DSL Environments., , , , and . IEEE Signal Process. Lett., 16 (6): 489-492 (2009)Scaffolding Task Planning Using Abstract Parsons Problems., , , , , and . WCCE, volume 685 of IFIP Advances in Information and Communication Technology, page 591-602. Springer, (2022)Aggregating vulnerability metrics in enterprise networks using attack graphs., , , , , , and . J. Comput. Secur., 21 (4): 561-597 (2013)Do Enhanced Compiler Error Messages Help Students?: Results Inconclusive., , and . SIGCSE, page 465-470. ACM, (2017)Non-cooperative bistatic SAR imaging system: spatial resolution analysis., , , , and . IGARSS, page 1446-1448. IEEE, (2003)