Search Results - "HOŁUBOWICZ, W"

Refine Results
  1. 1

    Good multi-T phase codes under bandwidth and complexity constraints by Holubowicz, W., Bobrowski, R.

    Published in IEEE transactions on information theory (01-09-1994)
    “…Multi-T phase codes are an equivalent realization of multi-h phase codes within the class of continuous phase modulations (CPM). The authors present, in the…”
    Get full text
    Journal Article
  2. 2

    Optimum parameter combinations for multi-h phase codes by Holubowicz, W.

    Published in IEEE transactions on communications (01-11-1990)
    “…It has been believed that the superiority of multi-h phase codes over constant-h continuous-phase frequency shift keying (CPFSK) schemes is based entirely on…”
    Get full text
    Journal Article
  3. 3

    Optimization of trellis coded TFM via matched codes by Morales-Moreno, F., Holubowicz, W., Pasupathy, S.

    Published in IEEE transactions on communications (01-02-1994)
    “…A matched code is a convolutional code chosen in such a way that when combined with modulation with memory the resulting receiver for the coded modulation has…”
    Get full text
    Journal Article
  4. 4

    Convolutional coding of binary CPM schemes with no increase in receiver complexity by Holubowicz, W., Morales-Moreno, F.

    Published in IEEE transactions on communications (01-02-1995)
    “…In this paper, we deal with convolutionally encoded MSK, DMSK and TFM signals. The matched convolutional encoding technique is used which was shown earlier to…”
    Get full text
    Journal Article
  5. 5

    Land mobile radio systems in Poland by Holubowicz, W., Bortnik, T.

    “…The current situation of land mobile radio (LMR) systems in Poland is described. This includes paging, dispatch, trunking, and cellular systems. Frequency plan…”
    Get full text
    Journal Article
  6. 6

    Mobile radio systems in the countries of Eastern and Central Europe by Holubowicz, W.

    “…In this paper, an overview of the current situation in the area of land mobile radio systems in the countries of Eastern and Central europe is given. First, as…”
    Get full text
    Conference Proceeding
  7. 7

    Simulation study of multi-T phase codes by Holubowicz, W., Cassara, F.

    Published in IEEE transactions on communications (01-10-1990)
    “…Multi-h and multi-T phase codes, two classes of continuous phase modulation (CPM) with cyclically varying values of modulation index, are compared. The multi-h…”
    Get full text
    Journal Article
  8. 8
  9. 9

    1990s-the decade of pan-European digital standards in wireless communications by Holubowicz, W.

    “…The key characteristic features of such pan-European wireless communication standards as GSM (cellular systems), DECT (cordless telephony), TETRA (trunking),…”
    Get full text
    Conference Proceeding
  10. 10

    Trellis coding of Gaussian filtered MSK by Tyczka, P., Holubowicz, W.

    “…Trellis coding of Gaussian minimum shift keying (GMSK) is considered. The structure of combinations of rate 1/2 and 2/3 binary convolutional encoders and GMSK…”
    Get full text
    Conference Proceeding
  11. 11

    Reduced complexity algorithms in multistage decoding of multilevel codes by Bobrowski, R., Holubowicz, W.

    “…We investigate the applicability of simplified decoders of convolutional codes to the case of multilevel coding. The objective is to examine the use of reduced…”
    Get full text
    Conference Proceeding
  12. 12

    Distance spectrum of the turbo-codes by Podemski, R., Holubowicz, W., Berrou, C., Glavieux, A.

    “…An analytical approach to newly invented turbo codes (TC) is presented. That approach is based on evaluating the properties of TC by means of the minimum…”
    Get full text
    Conference Proceeding
  13. 13

    Optimum parameter combinations for multi- < e1 > h < /e1 > phase codes by Holubowicz, W

    Published in IEEE transactions on communications (01-11-1990)
    “…It has been believed that the superiority of multi- < e1 > h < /e1 > phase codes over constant- < e1 > h < /e1 > continuous-phase frequency shift keying…”
    Get full text
    Journal Article
  14. 14

    Managing Lessons Learnt from daily missions: Methodology and tool by Holubowicz, W., Dymowski, W., Springer, T.

    “…The paper is aimed to present an approach to managing military experience and the software tool dedicated for this purpose. This approach (SIMS Lesson Learnt…”
    Get full text
    Conference Proceeding
  15. 15

    Methodology for gathering data concerning incidents in cyberspace by Flizikowski, A., Zych, J., Holubowicz, W.

    “…This paper introduces a cyber incident observation sheet. It is meant to support the process of gathering cyber incident data from attacks targeted against…”
    Get full text
    Conference Proceeding
  16. 16

    Simulation study of multi- < e1 > T < /e1 > phase codes by Holubowicz, W, Cassara, F

    Published in IEEE transactions on communications (01-10-1990)
    “…Multi- < e1 > h < /e1 > and multi- < e1 > T < /e1 > phase codes, two classes of continuous phase modulation (CPM) with cyclically varying values of modulation…”
    Get full text
    Journal Article
  17. 17

    The TALOS Project -- Autonomous Robotic Patrol Vehicles by Tanas, M., Taberski, G., Holubowicz, W., Samp, K., Spronska, A., Główka, J., Macias, M.

    “…This paper describes the TALOS, which is an experimental system designed to test suitability of automatic vehicles to nearly autonomously (i.e. without…”
    Get full text
    Conference Proceeding
  18. 18

    The TALOS project. EU wide robotic border guard system by Tanas, M., Holubowicz, W., Adamczyk, A., Taberski, G.

    “…This paper describes the TALOS project, which is a new way to use autonomous robotic vehicles to strengthen the security of land borders of the European Union…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20

    Intrusion Detection System Based on Matching Pursuit by Renk, R., Saganowski, L., Holubowicz, W., Choras, M.

    “…In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. We propose to use mean…”
    Get full text
    Conference Proceeding