Search Results - "Holubowicz, W."
-
1
Good multi-T phase codes under bandwidth and complexity constraints
Published in IEEE transactions on information theory (01-09-1994)“…Multi-T phase codes are an equivalent realization of multi-h phase codes within the class of continuous phase modulations (CPM). The authors present, in the…”
Get full text
Journal Article -
2
Optimum parameter combinations for multi-h phase codes
Published in IEEE transactions on communications (01-11-1990)“…It has been believed that the superiority of multi-h phase codes over constant-h continuous-phase frequency shift keying (CPFSK) schemes is based entirely on…”
Get full text
Journal Article -
3
Optimization of trellis coded TFM via matched codes
Published in IEEE transactions on communications (01-02-1994)“…A matched code is a convolutional code chosen in such a way that when combined with modulation with memory the resulting receiver for the coded modulation has…”
Get full text
Journal Article -
4
Convolutional coding of binary CPM schemes with no increase in receiver complexity
Published in IEEE transactions on communications (01-02-1995)“…In this paper, we deal with convolutionally encoded MSK, DMSK and TFM signals. The matched convolutional encoding technique is used which was shown earlier to…”
Get full text
Journal Article -
5
Land mobile radio systems in Poland
Published in IEEE journal on selected areas in communications (01-09-1994)“…The current situation of land mobile radio (LMR) systems in Poland is described. This includes paging, dispatch, trunking, and cellular systems. Frequency plan…”
Get full text
Journal Article -
6
Mobile radio systems in the countries of Eastern and Central Europe
Published in 5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Wireless Networks - Catching the Mobile Future (1994)“…In this paper, an overview of the current situation in the area of land mobile radio systems in the countries of Eastern and Central europe is given. First, as…”
Get full text
Conference Proceeding -
7
Simulation study of multi-T phase codes
Published in IEEE transactions on communications (01-10-1990)“…Multi-h and multi-T phase codes, two classes of continuous phase modulation (CPM) with cyclically varying values of modulation index, are compared. The multi-h…”
Get full text
Journal Article -
8
Multi-T realization of multi- h phase codes (Corresp.)
Published in IEEE transactions on information theory (01-01-1985)Get full text
Journal Article -
9
1990s-the decade of pan-European digital standards in wireless communications
Published in 1996 IEEE International Conference on Personal Wireless Communications Proceedings and Exhibition. Future Access (1996)“…The key characteristic features of such pan-European wireless communication standards as GSM (cellular systems), DECT (cordless telephony), TETRA (trunking),…”
Get full text
Conference Proceeding -
10
Trellis coding of Gaussian filtered MSK
Published in Proceedings of 1995 IEEE International Symposium on Information Theory (1995)“…Trellis coding of Gaussian minimum shift keying (GMSK) is considered. The structure of combinations of rate 1/2 and 2/3 binary convolutional encoders and GMSK…”
Get full text
Conference Proceeding -
11
Reduced complexity algorithms in multistage decoding of multilevel codes
Published in Proceedings of 1995 IEEE International Symposium on Information Theory (1995)“…We investigate the applicability of simplified decoders of convolutional codes to the case of multilevel coding. The objective is to examine the use of reduced…”
Get full text
Conference Proceeding -
12
Distance spectrum of the turbo-codes
Published in Proceedings of 1995 IEEE International Symposium on Information Theory (1995)“…An analytical approach to newly invented turbo codes (TC) is presented. That approach is based on evaluating the properties of TC by means of the minimum…”
Get full text
Conference Proceeding -
13
Optimum parameter combinations for multi- < e1 > h < /e1 > phase codes
Published in IEEE transactions on communications (01-11-1990)“…It has been believed that the superiority of multi- < e1 > h < /e1 > phase codes over constant- < e1 > h < /e1 > continuous-phase frequency shift keying…”
Get full text
Journal Article -
14
Managing Lessons Learnt from daily missions: Methodology and tool
Published in 2012 Military Communications and Information Systems Conference (MCC) (01-10-2012)“…The paper is aimed to present an approach to managing military experience and the software tool dedicated for this purpose. This approach (SIMS Lesson Learnt…”
Get full text
Conference Proceeding -
15
Methodology for gathering data concerning incidents in cyberspace
Published in 2012 Military Communications and Information Systems Conference (MCC) (01-10-2012)“…This paper introduces a cyber incident observation sheet. It is meant to support the process of gathering cyber incident data from attacks targeted against…”
Get full text
Conference Proceeding -
16
Simulation study of multi- < e1 > T < /e1 > phase codes
Published in IEEE transactions on communications (01-10-1990)“…Multi- < e1 > h < /e1 > and multi- < e1 > T < /e1 > phase codes, two classes of continuous phase modulation (CPM) with cyclically varying values of modulation…”
Get full text
Journal Article -
17
The TALOS Project -- Autonomous Robotic Patrol Vehicles
Published in 2012 European Intelligence and Security Informatics Conference (01-08-2012)“…This paper describes the TALOS, which is an experimental system designed to test suitability of automatic vehicles to nearly autonomously (i.e. without…”
Get full text
Conference Proceeding -
18
The TALOS project. EU wide robotic border guard system
Published in 2011 16th International Conference on Methods & Models in Automation & Robotics (01-08-2011)“…This paper describes the TALOS project, which is a new way to use autonomous robotic vehicles to strengthen the security of land borders of the European Union…”
Get full text
Conference Proceeding -
19
Hamming distance spectra of turbo-codes: Codage de canal
Published in Annales des télécommunications (1995)Get full text
Journal Article -
20
Intrusion Detection System Based on Matching Pursuit
Published in 2008 First International Conference on Intelligent Networks and Intelligent Systems (01-11-2008)“…In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. We propose to use mean…”
Get full text
Conference Proceeding