TY - CONF TI - Enabling improved speaker recognition by voice quality estimation T2 - 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) SP - 595 EP - 599 AU - A. L. Bartos AU - D. J. Nelson PY - 2011 KW - interference suppression KW - signal denoising KW - signal detection KW - speaker recognition KW - MIT/LL SID module KW - SNR level KW - automated speaker identification KW - improved speaker recognition KW - interference mitigation KW - noise mitigation KW - received signal SNR KW - signal to noise ratio KW - speaker models KW - speech activity detection KW - voice quality estimation process KW - Load modeling KW - Signal to noise ratio KW - Speech KW - Speech processing KW - Training KW - Training data KW - EER KW - Equal Error Rate KW - LID KW - Language ID KW - SAD KW - SID KW - SNR KW - Signal to Noise Ratio KW - Speaker ID KW - Speech Activity Detection KW - VAD KW - VQE KW - Voice Quality Estimate KW - voice Activity Detection DO - 10.1109/ACSSC.2011.6190071 JO - 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) IS - SN - 1058-6393 VO - VL - JA - 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) Y1 - 6-9 Nov. 2011 ER - TY - JOUR TI - GenCyber: Inspiring the Next Generation of Cyber Stars T2 - IEEE Security & Privacy SP - 84 EP - 86 AU - T. Ladabouche AU - S. LaFountain PY - 2016 KW - computer science education KW - security of data KW - teaching KW - GenCyber program KW - US cybersecurity professionals KW - cybersecurity awareness KW - Computer science education KW - Computer security KW - GenCyber KW - cybersecurity KW - education KW - privacy KW - security DO - 10.1109/MSP.2016.107 JO - IEEE Security & Privacy IS - 5 SN - 1540-7993 VO - 14 VL - 14 JA - IEEE Security & Privacy Y1 - Sept.-Oct. 2016 ER - TY - JOUR TI - On-Line Subtraction of the Cardiac Activity from the Esophageal Electromyogram of the Diaphragm T2 - IEEE Transactions on Biomedical Engineering SP - 115 EP - 118 AU - E. P. Mueller AU - R. V. Lourenco PY - 1968 KW - Carbon dioxide KW - Cities and towns KW - Electric variables measurement KW - Electrical resistance measurement KW - Esophagus KW - Helium KW - Lungs KW - Mechanical variables measurement KW - Muscles KW - Ventilation DO - 10.1109/TBME.1968.4502547 JO - IEEE Transactions on Biomedical Engineering IS - 2 SN - 0018-9294 VO - BME-15 VL - BME-15 JA - IEEE Transactions on Biomedical Engineering Y1 - April 1968 ER - TY - CONF TI - Multilevel Secure Ad-Hoc Infrastructure Supporting Coalition Force Operations T2 - MILCOM 2007 - IEEE Military Communications Conference SP - 1 EP - 7 AU - G. Uchenick AU - W. M. Vanfleet PY - 2007 KW - Acoustic sensors KW - Bandwidth KW - Data security KW - Force sensors KW - Information security KW - Intelligent sensors KW - Magnetic sensors KW - Sensor fusion KW - Target recognition KW - Unmanned aerial vehicles DO - 10.1109/MILCOM.2007.4455307 JO - MILCOM 2007 - IEEE Military Communications Conference IS - SN - 2155-7578 VO - VL - JA - MILCOM 2007 - IEEE Military Communications Conference Y1 - 29-31 Oct. 2007 ER - TY - CONF TI - Network access control (NAC): An open source analysis of architectures and requirements T2 - 44th Annual 2010 IEEE International Carnahan Conference on Security Technology SP - 94 EP - 102 AU - G. J. Serrao PY - 2010 KW - authorisation KW - computer network security KW - open systems KW - NAC products KW - endpoint security KW - interoperability KW - network access control KW - network security KW - open source analysis KW - Access control KW - Authentication KW - Computer architecture KW - Protocols KW - Servers KW - Software KW - Authentication KW - Integrity KW - Network Access Control KW - Trusted Computing Group (TCG) KW - Trusted Network Connect (TNC) DO - 10.1109/CCST.2010.5678694 JO - 44th Annual 2010 IEEE International Carnahan Conference on Security Technology IS - SN - 1071-6572 VO - VL - JA - 44th Annual 2010 IEEE International Carnahan Conference on Security Technology Y1 - 5-8 Oct. 2010 ER - TY - JOUR TI - The Damage Equivalence of Electrons, Protons, Alphas and Gamma Rays in Rad-Hard MOS Devices T2 - IEEE Transactions on Nuclear Science SP - 4363 EP - 4367 AU - E. G. Stassinopoulos AU - O. Van Gunten AU - G. J. Brucker AU - A. R. Knudson AU - T. M. Jordan PY - 1983 KW - Aluminum KW - Electrons KW - Gamma rays KW - Inverters KW - MOS devices KW - Packaging KW - Protons KW - Radiation hardening KW - Temperature KW - Testing DO - 10.1109/TNS.1983.4333138 JO - IEEE Transactions on Nuclear Science IS - 6 SN - 0018-9499 VO - 30 VL - 30 JA - IEEE Transactions on Nuclear Science Y1 - Dec. 1983 ER - TY - CONF TI - Visualizing the Performance of Computational Linguistics Algorithms T2 - 2006 IEEE Symposium On Visual Analytics Science And Technology SP - 151 EP - 157 AU - S. G. Eick AU - J. Mauger AU - A. Ratner PY - 2006 KW - computational linguistics KW - document handling KW - portals KW - program visualisation KW - software performance evaluation KW - AJAX KW - ROC curves KW - SVG visualization components KW - analysis portal KW - computational linguistics algorithm performance visualization KW - confusion matrices KW - document classification KW - document clustering KW - document visualizations KW - interactive reports KW - scalable vector graphics KW - thin-client Web-based components KW - Algorithm design and analysis KW - Clustering algorithms KW - Computational linguistics KW - Content based retrieval KW - Information retrieval KW - Performance analysis KW - Portals KW - Storage automation KW - Text analysis KW - Visualization KW - AJAX KW - ROC curves KW - SVG KW - confusion matrices KW - document categorization KW - thin-client DO - 10.1109/VAST.2006.261417 JO - 2006 IEEE Symposium On Visual Analytics Science And Technology IS - SN - VO - VL - JA - 2006 IEEE Symposium On Visual Analytics Science And Technology Y1 - Oct. 31 2006-Nov. 2 2006 ER - TY - JOUR TI - A Complexity Measure T2 - IEEE Transactions on Software Engineering SP - 308 EP - 320 AU - T. J. McCabe PY - 1976 KW - Basis KW - complexity measure KW - control flow KW - decomposition KW - graph theory KW - independence KW - linear KW - modularization KW - programming KW - reduction KW - software KW - testing KW - Fluid flow measurement KW - Graph theory KW - Linear programming KW - National security KW - Software engineering KW - Software maintenance KW - Software measurement KW - Software systems KW - Software testing KW - System testing KW - Basis KW - complexity measure KW - control flow KW - decomposition KW - graph theory KW - independence KW - linear KW - modularization KW - programming KW - reduction KW - software KW - testing DO - 10.1109/TSE.1976.233837 JO - IEEE Transactions on Software Engineering IS - 4 SN - 0098-5589 VO - SE-2 VL - SE-2 JA - IEEE Transactions on Software Engineering Y1 - Dec. 1976 ER - TY - JOUR TI - The Damage Equivalence of Electrons, Protons, and Gamma Rays in MOS Devices T2 - IEEE Transactions on Nuclear Science SP - 1966 EP - 1969 AU - G. J. Brucker AU - E. G. Stassinopoulos AU - O. Van Gunten AU - L. S. August AU - T. M. Jordan PY - 1982 KW - Dosimetry KW - Electrons KW - Gamma rays KW - Inverters KW - Laboratories KW - Large scale integration KW - MOS devices KW - Protons KW - Testing KW - Voltage DO - 10.1109/TNS.1982.4336479 JO - IEEE Transactions on Nuclear Science IS - 6 SN - 0018-9499 VO - 29 VL - 29 JA - IEEE Transactions on Nuclear Science Y1 - Dec. 1982 ER - TY - JOUR TI - In Memory of Thomas E. Tremain 1934-1995 T2 - IEEE Transactions on Speech and Audio Processing SP - 1 EP - AU - J. P. Campbell PY - 1996 KW - Obituaries KW - Tremain, Thomas E. DO - 10.1109/TSA.1996.481447 JO - IEEE Transactions on Speech and Audio Processing IS - 1 SN - 1063-6676 VO - 4 VL - 4 JA - IEEE Transactions on Speech and Audio Processing Y1 - Jan. 1996 ER - TY - CONF TI - A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict T2 - 2012 4th International Conference on Cyber Conflict (CYCON 2012) SP - 1 EP - 13 AU - R. Fanelli AU - G. Conti PY - 2012 KW - Internet KW - law KW - military computing KW - collateral damage KW - cyber operations KW - cyber warfare KW - lawful armed conflict context KW - Cyberspace KW - Force KW - Information systems KW - Kinetic theory KW - Law KW - Sea measurements KW - Weapons KW - collateral damage KW - cyber operations KW - law of armed conflict KW - targeting DO - JO - 2012 4th International Conference on Cyber Conflict (CYCON 2012) IS - SN - 2325-5366 VO - VL - JA - 2012 4th International Conference on Cyber Conflict (CYCON 2012) Y1 - 5-8 June 2012 ER - TY - CONF TI - Electrostatic Gate Protection using an Arc Gap Device T2 - 11th Reliability Physics Symposium SP - 198 EP - 202 AU - L. W. Linholm AU - R. F. Plachy PY - 1973 KW - Dielectrics KW - Diodes KW - Electrostatics KW - Impedance KW - Laboratories KW - MOS devices KW - Protection KW - Resistors KW - Testing KW - Voltage DO - 10.1109/IRPS.1973.362596 JO - 11th Reliability Physics Symposium IS - SN - 0735-0791 VO - VL - JA - 11th Reliability Physics Symposium Y1 - April 1973 ER - TY - JOUR TI - Note on computing autocorrelations T2 - IEEE Transactions on Acoustics, Speech, and Signal Processing SP - 76 EP - 77 AU - W. Blankinship PY - 1974 KW - Autocorrelation KW - Automation KW - Displays KW - National security KW - Registers DO - 10.1109/TASSP.1974.1162534 JO - IEEE Transactions on Acoustics, Speech, and Signal Processing IS - 1 SN - 0096-3518 VO - 22 VL - 22 JA - IEEE Transactions on Acoustics, Speech, and Signal Processing Y1 - Feb 1974 ER - TY - CONF TI - A cloud-based approach to big graphs T2 - 2015 IEEE High Performance Extreme Computing Conference (HPEC) SP - 1 EP - 8 AU - P. Burkhardt AU - C. A. Waring PY - 2015 KW - Big Data KW - cloud computing KW - graph theory KW - software fault tolerance KW - Big data KW - Graph500 benchmark KW - Petabyte graph scalability KW - big graphs KW - cloud-based approach KW - fault-tolerance KW - graph scalability KW - irregular data access KW - network analysis KW - physical memory capacity KW - Big data KW - Computational modeling KW - Data structures KW - Fault tolerance KW - Fault tolerant systems KW - Memory management KW - Scalability KW - Cloud computing KW - Distributed computing KW - Graph algorithms KW - MapReduce DO - 10.1109/HPEC.2015.7396313 JO - 2015 IEEE High Performance Extreme Computing Conference (HPEC) IS - SN - VO - VL - JA - 2015 IEEE High Performance Extreme Computing Conference (HPEC) Y1 - 15-17 Sept. 2015 ER - TY - JOUR TI - Character Sum Factorizations Yield Sequences With Ideal Two-Level Autocorrelation T2 - IEEE Transactions on Information Theory SP - 3276 EP - 3304 AU - K. T. Arasu AU - J. F. Dillon AU - K. J. Player PY - 2015 KW - binary sequences KW - set theory KW - ternary codes KW - binary family KW - block designs KW - character sum factorizations yield sequences KW - generalized weighing matrices KW - ideal two-level autocorrelation KW - p-ary sequences KW - ternary family KW - Additives KW - Context KW - Convolution KW - Correlation KW - Fourier transforms KW - Polynomials KW - Character sum KW - Gauss sum KW - Stickelberger congruence KW - character sum KW - gauss sum KW - ideal two-level autocorrelation KW - p-ary sequence KW - relative difference set KW - stickelberger congruence DO - 10.1109/TIT.2015.2418204 JO - IEEE Transactions on Information Theory IS - 6 SN - 0018-9448 VO - 61 VL - 61 JA - IEEE Transactions on Information Theory Y1 - June 2015 ER - TY - JOUR TI - Privacy and Protection in Operating Systems T2 - Computer SP - 43 EP - 46 AU - D. K. Branstan PY - 1973 KW - Computer security KW - Control systems KW - Data privacy KW - Hardware KW - History KW - Kernel KW - National security KW - Operating systems KW - Protection KW - Tree data structures DO - 10.1109/C-M.1973.217017 JO - Computer IS - 1 SN - 0018-9162 VO - 6 VL - 6 JA - Computer Y1 - Jan. 1973 ER - TY - CONF TI - Noninterference equations for nondeterministic systems T2 - Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. SP - 3 EP - 14 AU - S. Pinsky AU - E. Zieglar PY - 2001 KW - Algebra KW - Automata KW - Equations KW - Information security KW - Interference constraints KW - National security KW - Protection KW - Sufficient conditions KW - US Government DO - 10.1109/CSFW.2001.930132 JO - Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. IS - SN - 1063-6900 VO - VL - JA - Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. Y1 - 2001 ER - TY - CONF TI - Linear predictive coding systems T2 - Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '76. SP - 474 EP - 478 AU - T. Tremain PY - 1976 KW - Analysis of variance KW - Buffer storage KW - Equations KW - Government KW - Linear predictive coding KW - Predictive coding KW - Signal processing KW - Speech analysis KW - Speech synthesis KW - Symmetric matrices DO - 10.1109/ICASSP.1976.1170021 JO - Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '76. IS - SN - VO - 1 VL - 1 JA - Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '76. Y1 - Apr 1976 ER - TY - CONF TI - Presentation 9. Attribute assurance for attribute based access control T2 - 2014 IT Professional Conference SP - 1 EP - 3 AU - A. Friedman AU - V. C. Hu PY - 2014 KW - authorisation KW - open systems KW - ABAC KW - AP KW - Department of Defense and Intelligence Community KW - ICPG KW - Intelligence Community Policy Guidance KW - LOAA KW - access management KW - attribute assurance KW - attribute based access control KW - attribute confidentiality KW - attribute integrity KW - attribute provider KW - attribute repositories KW - attribute retrieval KW - attribute update KW - attribute-based authorization KW - critical assets protection KW - environmental attributes KW - interoperability KW - level of attribute assurance KW - object attributes KW - subject attributes KW - Access control KW - Communities KW - Educational institutions KW - NIST KW - National security DO - 10.1109/ITPRO.2014.7029296 JO - 2014 IT Professional Conference IS - SN - VO - VL - JA - 2014 IT Professional Conference Y1 - 22-22 May 2014 ER - TY - CONF TI - VAST Challenge 2012: Visual analytics for big data T2 - 2012 IEEE Conference on Visual Analytics Science and Technology (VAST) SP - 251 EP - 255 AU - K. Cook AU - G. Grinstein AU - M. Whiting AU - M. Cooper AU - P. Havig AU - K. Liggett AU - B. Nebesh AU - C. L. Paul PY - 2012 KW - Visual analytics KW - contest KW - evaluation KW - human information interaction KW - metrics KW - sense making DO - 10.1109/VAST.2012.6400529 JO - 2012 IEEE Conference on Visual Analytics Science and Technology (VAST) IS - SN - VO - VL - JA - 2012 IEEE Conference on Visual Analytics Science and Technology (VAST) Y1 - 14-19 Oct. 2012 ER - TY - JOUR TI - A New Concept in Computing T2 - Proceedings of the IRE SP - 516 EP - 523 AU - R. L. Wigington PY - 1959 KW - Aggregates KW - Capacitors KW - Circuits KW - Filters KW - Hysteresis KW - Logic devices KW - Microwave propagation KW - Nonlinear distortion KW - Propagation delay KW - Radio frequency DO - 10.1109/JRPROC.1959.287311 JO - Proceedings of the IRE IS - 4 SN - 0096-8390 VO - 47 VL - 47 JA - Proceedings of the IRE Y1 - April 1959 ER - TY - CONF TI - A control measure framework to limit collateral damage and propagation of cyber weapons T2 - 2013 5th International Conference on Cyber Conflict (CYCON 2013) SP - 1 EP - 16 AU - D. Raymond AU - G. Conti AU - T. Cross AU - R. Fanelli PY - 2013 KW - computer network security KW - invasive software KW - military computing KW - weapons KW - Morris worm KW - collateral damage KW - computer network KW - control measure framework KW - cyber weapon propagation KW - cyber weaponry KW - damage prevention KW - detection prevention KW - kinetic attack KW - malicious software KW - warfighting domain KW - weapons KW - Cyberspace KW - Grippers KW - Malware KW - Military computing KW - Software KW - Weapons KW - collateral damage KW - cyber operations KW - law of armed conflict KW - malware controls DO - JO - 2013 5th International Conference on Cyber Conflict (CYCON 2013) IS - SN - 2325-5366 VO - VL - JA - 2013 5th International Conference on Cyber Conflict (CYCON 2013) Y1 - 4-7 June 2013 ER - TY - CONF TI - An approximate theory of RF shielded enclosures T2 - 2012 IEEE International Symposium on Electromagnetic Compatibility SP - 629 EP - 634 AU - D. C. Stallings PY - 2012 KW - approximation theory KW - electromagnetic shielding KW - electronics packaging KW - RF isolation KW - RF shielded enclosure KW - approximation theory KW - electronic device system KW - Antenna measurements KW - Equations KW - Mathematical model KW - Receiving antennas KW - Transmission line antennas KW - Transmitting antennas DO - 10.1109/ISEMC.2012.6350933 JO - 2012 IEEE International Symposium on Electromagnetic Compatibility IS - SN - 2158-110X VO - VL - JA - 2012 IEEE International Symposium on Electromagnetic Compatibility Y1 - 6-10 Aug. 2012 ER - TY - JOUR TI - Recovery of Damage in Rad-Hard MOS Devices during and after Irradiation by Electrons, Protons, Alphas, and Gamma Rays T2 - IEEE Transactions on Nuclear Science SP - 4157 EP - 4161 AU - G. J. Brucker AU - O. Van Gunten AU - E. G. Stassinopoulos AU - P. Shapiro AU - L. S. August AU - T. M. Jordan PY - 1983 KW - Electrons KW - Gamma rays KW - Large scale integration KW - MOS devices KW - Performance analysis KW - Physics computing KW - Protons KW - Radiation hardening KW - Testing KW - Threshold voltage DO - 10.1109/TNS.1983.4333100 JO - IEEE Transactions on Nuclear Science IS - 6 SN - 0018-9499 VO - 30 VL - 30 JA - IEEE Transactions on Nuclear Science Y1 - Dec. 1983 ER - TY - CONF TI - Computing without wires (or even a net): the pitfalls, potentials, and practicality of wireless networking T2 - Seventeenth Annual Computer Security Applications Conference SP - 463 EP - 464 AU - T. J. Havighurst AU - A. Entrichel AU - J. Bergman AU - J. Willis AU - H. Little PY - 2001 KW - Bluetooth KW - Communication system security KW - Cryptography KW - Handheld computers KW - National security KW - Personal digital assistants KW - Protection KW - Wireless LAN KW - Wireless networks KW - Wires DO - 10.1109/ACSAC.2001.991563 JO - Seventeenth Annual Computer Security Applications Conference IS - SN - VO - VL - JA - Seventeenth Annual Computer Security Applications Conference Y1 - 10-14 Dec. 2001 ER - TY - CONF TI - Leveraging 2nd life as a communications media: An effective tool for security awareness training T2 - IEEE International Professonal Communication 2013 Conference SP - 1 EP - 7 AU - B. Endicott-Popovsky AU - R. J. Hinrichs AU - D. Frincke PY - 2013 KW - avatars KW - computer games KW - security of data KW - trusted computing KW - Avatar KW - University of Washington KW - communications media KW - cybersecurity island KW - educational program KW - end-of-term student project KW - global citizenship KW - online security KW - second life environment KW - security awareness training KW - virtual worlds KW - Avatars KW - Buildings KW - Business KW - Communities KW - Computer security KW - Educational institutions KW - Avatar KW - citizenship KW - virtual worlds DO - 10.1109/IPCC.2013.6623945 JO - IEEE International Professonal Communication 2013 Conference IS - SN - 2158-091X VO - VL - JA - IEEE International Professonal Communication 2013 Conference Y1 - 15-17 July 2013 ER - TY - CONF TI - The SIMON and SPECK lightweight block ciphers T2 - 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) SP - 1 EP - 6 AU - R. Beaulieu AU - S. Treatman-Clark AU - D. Shors AU - B. Weeks AU - J. Smith AU - L. Wingers PY - 2015 KW - cryptography KW - SIMON KW - SPECK KW - cryptographic design KW - lightweight block ciphers KW - security KW - Algorithm design and analysis KW - Ciphers KW - Hardware KW - Schedules KW - Software KW - Internet of Things KW - SIMON KW - SPECK KW - block cipher KW - lightweight DO - 10.1145/2744769.2747946 JO - 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) IS - SN - 0738-100X VO - VL - JA - 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) Y1 - 8-12 June 2015 ER - TY - CONF TI - Reducing manpower intensive tasks through automation of security technologies T2 - Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology SP - 331 EP - 339 AU - R. T. Carback PY - 1995 KW - access control KW - personnel KW - access control KW - automation KW - biometric identification KW - facilities access control KW - office keys KW - security technologies KW - security threats KW - Access control KW - Appropriate technology KW - Biometrics KW - Government KW - Information security KW - Office automation KW - Personnel KW - Protection KW - Risk management KW - Technology management DO - 10.1109/CCST.1995.524932 JO - Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology IS - SN - VO - VL - JA - Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology Y1 - 18-20 Oct 1995 ER - TY - JOUR TI - Graph Twiddling in a MapReduce World T2 - Computing in Science & Engineering SP - 29 EP - 41 AU - J. Cohen PY - 2009 KW - distributed processing KW - graph theory KW - MapReduce cycles KW - cloud computing approach KW - distributed processing KW - graph processing KW - graph twiddling KW - Cloud computing KW - Computer networks KW - Distributed computing KW - Distributed processing KW - Hardware KW - Humans KW - National security KW - Packaging KW - Robustness KW - Sorting KW - Hadoop KW - MapReduce KW - cloud computing KW - clustering KW - cycles KW - graphs KW - networks KW - social network analysis KW - trusses DO - 10.1109/MCSE.2009.120 JO - Computing in Science & Engineering IS - 4 SN - 1521-9615 VO - 11 VL - 11 JA - Computing in Science & Engineering Y1 - July-Aug. 2009 ER - TY - JOUR TI - Radiation Effects on MOS Devices: Dosimetry, Annealing, Irradiation Sequence, and Sources T2 - IEEE Transactions on Nuclear Science SP - 1880 EP - 1884 AU - E. G. Stassinopoulos AU - G. J. Brucker AU - O. Van Gunten AU - A. R. Knudson AU - T. M. Jordan PY - 1983 KW - Annealing KW - Calcium KW - Dosimetry KW - Electrons KW - Energy measurement KW - Energy states KW - Insulation KW - MOS devices KW - Manganese KW - Radiation effects DO - 10.1109/TNS.1983.4332665 JO - IEEE Transactions on Nuclear Science IS - 3 SN - 0018-9499 VO - 30 VL - 30 JA - IEEE Transactions on Nuclear Science Y1 - June 1983 ER - TY - CONF TI - A Comparison of Stationary and Cyclostationary TDOA Estimators T2 - MILCOM 2006 - 2006 IEEE Military Communications conference SP - 1 EP - 7 AU - D. E. Gisselquist PY - 2006 KW - correlation methods KW - direction-of-arrival estimation KW - filtering theory KW - interference (signal) KW - sensor fusion KW - time-of-arrival estimation KW - Gardner's spectral coherence alignment algorithm KW - SPECCOA KW - cross correlation methods KW - cyclostationary TDOA estimators KW - digital communications signals KW - interference KW - mean square error KW - multicycle methods KW - narrowband noise environment KW - optimal stationary methods KW - sensors KW - Coherence KW - Correlation KW - Digital communication KW - Filters KW - Interference KW - Narrowband KW - National security KW - Signal processing KW - Transmitters KW - Working environment noise DO - 10.1109/MILCOM.2006.302105 JO - MILCOM 2006 - 2006 IEEE Military Communications conference IS - SN - 2155-7578 VO - VL - JA - MILCOM 2006 - 2006 IEEE Military Communications conference Y1 - 23-25 Oct. 2006 ER -