Search

Your search keyword '"Clancy, Thomas Charles III"' showing total 95 results

Search Constraints

Start Over You searched for: Author "Clancy, Thomas Charles III" Remove constraint Author: "Clancy, Thomas Charles III"
95 results on '"Clancy, Thomas Charles III"'

Search Results

1. System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks

2. Processing of communications signals using machine learning

3. Processing of communications signals using machine learning

4. A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem

5. System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks

6. A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem

7. System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks

8. Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security

9. A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions

10. Intrusion Detection System for Applications using Linux Containers

11. Intrusion Detection System for Applications using Linux Containers

12. Distributed Storage Systems with Secure and Exact Repair - New Results

13. Distributed Storage Systems with Secure and Exact Repair - New Results

14. Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security

15. Vulnerability of LTE to Hostile Interference

16. Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

17. Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation

18. Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

19. Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation

20. Machine Learning for Millimeter Wave Wireless Systems: Network Design and Optimization

21. New Techniques for Time-Reversal-Based Ultra-wideband Microwave Pulse Compression in Reverberant Cavities

22. Distributed Machine Learning for Autonomous and Secure Cyber-physical Systems

23. Distributed Wireless Resource Management in the Internet of Things

24. Intelligent Knowledge Distribution for Multi-Agent Communication, Planning, and Learning

25. Differential Dependency Network and Data Integration for Detecting Network Rewiring and Biomarkers

26. A Defense-In-Depth Security Architecture for Software Defined Radio Systems

27. Mathematical Modeling and Deconvolution for Molecular Characterization of Tissue Heterogeneity

28. Silicon-Based PALNA Transmit/Receive Circuits for Integrated Millimeter Wave Phased Arrays

29. Power-Performance-Predictability: Managing the Three Cornerstones of Resource Constrained Real-Time System Design

30. Robust Speech Filter And Voice Encoder Parameter Estimation using the Phase-Phase Correlator

31. Analysis of Firmware Security in Embedded ARM Environments

32. Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems

33. Solutions for Internet of Things Security Challenges: Trust and Authentication

34. Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation

35. Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality

36. Modeling and Analysis of Non-Linear Dependencies using Copulas, with Applications to Machine Learning

37. Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems

38. Processing of communications signals using machine learning

39. OneSwitch Data Center Architecture

40. Software-Defined Radio Implementation of Two Physical Layer Security Techniques

41. Learning from Data in Radio Algorithm Design

42. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity

43. Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems

44. Securing Cloud Containers through Intrusion Detection and Remediation

45. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery

46. Fundamentals of Cache Aided Wireless Networks

47. Multi-Platform Molecular Data Integration and Disease Outcome Analysis

48. System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks

49. Antifragile Communications

50. Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements

Catalog

Books, media, physical & digital resources